Top 5 Use Cases for Endpoint Protection in Operational Technology

  Presented by VPLS

The Air Gap: A Double-edged Sword

Endpoints are frequently the target of initial compromise or attacks. It can take just minutes, if not seconds, to compromise the endpoints, putting industrial environments at risk. One recent study found that 30% of breaches involved malware being installed on endpoints.

Operational Technology (OT) endpoints are particularly vulnerable given the legacy technology powering environments like our manufacturing plants, power stations, and other critical infrastructure. Many organizations rely on an air gap for cybersecurity to protect their industrial environments.

Unfortunately, the air gap is a double-edged sword. While it may help insulate and shrink the attack surface, like all prevention measures, it is not 100%.

Join this presentation to explore how you can:

  • Stop breaches and prevent data loss and ransomware damage with no dwell time.
  • Eliminate alert fatigue and optimize operations with customizable, standardized incident response processes.
  • Ensure business continuity in the event of a security incident, keeping systems online.
  • Reduce the cost of legacy EDR solutions, enabling response and remediation without negatively impacting business.

Responsible Administration: The Admin Insider (Threat)

  Presented by One Identity

System Administrators are critical people to every organization. They design, build, and maintain all the parts and pieces that enable business, whether that’s retail, healthcare, or even a government agency. Ensuring sysadmin tasks are performed as securely as possible without hampering their ability to keep our business running is a delicate balance. These “insiders” not only know how the systems operate but have the credentials and privileges to operate them.

In this session, we will demonstrate an Active Directory breach using pass-the-hash and discuss ways to enable the System Administrators to operate in a way that not only protects the business from threats but also enables them to perform the intricate tasks they accomplish daily to keep business flowing under the covers.

The Digital Transformation of Education

  Presented by INTERFACE Advisory Council

As the Hawaii State Department of Education responds to the changing situation of the “New Normal”, we have accelerated the modernization of our legacy systems. By focusing on automation and software as a service, the Department has been able to meet the rapidly evolving needs of telework and distance learning. By focusing on the work that is good enough, a technology transformation that was already well under way has been able to accelerate and meet the needs of students across the state.

Presenter:
Brook Conner • Assistant Superintendent & CIO, Hawaii Department of Education

First Quarter of Containment

  Presented by Malwarebytes

All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.

Vulnerability Management: Work Smarter Not Harder “The Data Problem”

Presented by Kenna Security

With an exponential increase in the volume and velocity of new vulnerabilities, it is no wonder that today’s InfoSec and operations teams find it difficult, if not impossible, to meet the increasing demands of remediation. This doesn’t even include internal corporate policies or politics which present significant barriers as well. It is not uncommon to discuss a prospective customer’s VM program with them, only to find out that they are using spreadsheets to manage the load. They then hand off their “prioritized” workload to a group of admins who are not bound to the same policies or procedures. The average enterprise today has 100’s of thousands to millions of vulnerabilities spread across tens of thousands of assets. A great many of these organizations continue to rely on CVSS scoring as the only benchmark. The latest research shows us that if you base your remediation strategy on fixing CVSS 7 or greater, your efforts will yield the same effectiveness as randomly choosing any set of active vulns in your environment to address. It is about 22% effective in either scenario. The purpose of this presentation is to discuss and explore more effective ways to address such challenges and roadblocks. In particular, how does a practitioner better prioritize and communicate with their various internal colleagues to improve their workflow and posture?

How Can a Diverse Workforce Contribute to the Success of Your Business?

Moderated by INTERFACE Advisory Council

Now, more than ever, the workforce is comprised of a diverse group of talented professionals. With more women in the tech industry than ever before and a broad range of generations bringing different work styles and values to the table, ultimately organizations can benefit from having a diverse group of individuals on their team.

Join our panel discussion as we discuss the tech landscape, workforce diversity and how to hire and retain top talent to obtain the high achieving teams we desire.

Panelists:

Deveeshree Nayak • Instructor, University of Washington Tacoma

Alicia Evans • Metro Market Manager, Robert Half Technology

Integrated Risk Management

  Presented by ServiceNow

Organizations need to transform inefficient processes by combining security, IT, and risk capabilities into an integrated risk program which provides continuous monitoring, prioritization, and automation to ensure rapid identification and response to risks.

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization’s boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization’s core business strategy.

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization’s boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization’s core business strategy.