Data Protection: Business Continuity & Disaster Recovery

  Presented by CompuNet

An open panel discussion on Data Protection: Business Continuity & Disaster Recovery. This session will focus on the navigating current trends and best practices in most environments. Bring your tough questions and topics to our engineers who specialize in BCDR.

Digital to Physical: Real-World Impact of Security Risks in Industries Using IIoT

  Presented by Trend Micro

This presentation will talk about research on radio remote controllers used in industrial settings, and how they can be used for attacks in this environment. This will shed light on how a cyberattack can inflict physical damage or harm. The goal is to inspire the audience to think outside the box in terms of what can be compromised and impose a sense of urgency in the IoT/IIoT security space.

Threats to Public Cloud Workloads

  Presented by Trend Micro

This presentation will revolve around the various threats workloads are susceptible to as more and more organizations shift from on-premise to the cloud. This will focus primarily on public cloud infrastructure but many of the concepts will apply directly to private cloud/on-prem data center infrastructure as well. The goal of the talk is to give the audience a better understanding of the vulnerabilities associated with cloud workloads and mitigation strategies.

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Emerging Trends in Cybersecurity

  Presented by Trace3

As the threat landscape rapidly expands, enterprises across all industries are seeking approaches and technologies to safeguard their interest from advanced and persistent threats. Mounting regulatory and financial penalties against a talent shortage, the need for better cybersecurity only becomes more apparent.

Startups are emerging to offer solutions that address vulnerabilities arising from the growing threat vectors introduced by the expansion of the enterprise domain. Understanding trends and technologies that are driving the future of cybersecurity is critical to both individual contributors and leaders.

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization’s boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization’s core business strategy.

Identity is the New Perimeter

  Presented by Alchemy Technology Group

Data breaches continue to dominate mainstream media, impacting millions of consumers and costing millions of dollars for the liable parties. With the acceleration of Cloud Computing and Software as a Service (SaaS) platforms, the Cyber Security world has evolved from vandalism, to theft, and now all-out war. The bad actors have become extremely creative in compromising credentials to impersonate users, infiltrate environments, and collect confidential data. The value proposition of “anytime, anywhere, any device” access sounds great in principal, but often presents extreme risk in practice. A formal identity strategy provides a backdrop to extend corporate policy well beyond the walls of the corporate office, offering flexibility to embrace evolving technology without compromising security posture. In this session Alchemy Technology Group will outline 10 principles for a successful Cyber Security strategy, with a focus on identity’s role as the new perimeter.

Leveraging AI to Defend Against Insider Threats in Your Digital Landscape

  Presented by Vanguard Infrastructures & HPE

The single largest vulnerability to a company’s intellectual property (IP) is their employee or the trusted insider; the person with the keys to the kingdom. However, recent media and government disclosures have expanded this threat to include machine compromises installed during manufacturing. So, the threat could come from the trusted insider or the machine an unwitting employee is utilizing. Too few companies have a strategy to adequately combat these vulnerabilities, mainly due to a lack of knowledge the events are taking place. Vanguard Infrastructures presents a strategy that marries observed human behaviors, demeanors, actions, etc., with artificial intelligence and machine learning to assist companies by providing data and creating visibility into network events that might be a threat to the company. This presentation’s goal is to put more power into the hands of the company to protect their IP, identify potential problem behaviors of trusted employees and machines, and assist the company in ensuring their future.

Moderator:

  • Troy Cooper • Vanguard Infrastructures CEO Co-Founder

Panel Experts:

  • Vijay Richard • Vanguard Infrastructures Exec VP Co-Founder
  • Chris Kaufman • Vanguard Infrastructures Chief AI Strategist
  • Ann Hinkle • Vanguard Infrastructure Chief of Security Services
  • Scott Olsen • HPE Enterprise Architect

SIEM: Past, Present, and Future

  Presented by Fortinet

The IT environment is in constant evolution and it’s getting more complex. As a result, organizations are investing in integrating SOCs (Security Operation Center) to improve the visibility, detection, and automated remediation of security events. In this presentation, we will review the history of SIEM and discuss selection criteria that will help organizations analyzing different SIEM tools.