| Today’s Theme: Anticipating ThreatsHow Should We Anticipate Unknown Threats? Creating a Proactive Organization for Swift Response
Anticipation. It’s one of the U.S. Army’s eight principles of sustainment, along with integration, responsiveness, simplicity, economy, survivability, continuity, and improvisation. On the information security battlefield, CISOs and their organizations face growing needs to better anticipate threats. The downside if they don’t? Dwell time grows — and with it — exponential damage to revenue, operations, and reputation. Join us as information security and business experts discuss how to define risk tolerance, share anticipatory risk strategies for business, and how CISOs and security leaders can enable them for success in their organizations.
|
|
1:00pm - 1:45pm
| Dealing with Disaster: Preparing for Key ThreatsJuliette Kayyem, CNN National Security Analyst & Faculty Director, Homeland Security Project and Security and Global Health Project, Harvard’s Kennedy School of Government
Security is constantly evolving to become more sophisticated, and yet it can’t keep up with the threats from bad actors including nation states. The first step for organizations is realizing that you will be the target of attacks – a reality that some CEOs and boards find hard to accept. With that realization, you can begin to prepare your defense to minimize the consequences. Join us for a conversation about assessing the threat landscape, defining risk appetite and supporting that with appropriate resources, crisis management, how physical and cyber security are once again converging, and the kind of leadership necessary to meet the challenge.
Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO, Foundry (formerly IDG Communications)
|
|
1:45pm - 2:15pm
|
Live Discussion Group with Juliette Kayyam: Meeting the Cybersecurity ChallengeJuliette Kayyem, CNN National Security Analyst & Faculty Director, Homeland Security Project and Security and Global Health Project, Harvard’s Kennedy School of Government
Ransomware, vulnerabilities, and state-sponsored attacks threaten to disrupt the business landscape. Bring your questions for a live discussion insights for what’s on the horizon and how to best to prepare your organization.
| Is Your Organization Prepared to Fix Its Reputation?: An Interactive WorkshopCaroline Beckmann, Senior Director, Trident DMG
Josh Galper, Co-Founder & Partner, Trident DMG
Breaches and intellectual property theft are becoming more commonplace, and for each incident, an organization experiences not only financial harm, but reputational damage. Join us for this workshop to learn how you can prepare your organization to move quickly when reputational damage strikes.
|
|
|
2:15pm - 2:40pm
| How to Take Control of Your Organization’s Security and Threat Prevention
- Loren Hudziak, Chrome Customer Engineer, Google
- Companies are facing unprecedented levels of IP, data, and identity sprawl beyond the enterprise firewall. Every endpoint has become an entry into businesses, and human error on the inside is a constant risk. Join us as we discuss how to take control of your security with built-in, intelligent security, granular policy controls, and automatic updates for continuous protection.
|
|
2:40pm - 3:05pm
| Anticipating Rising ThreatsDeneen DeFiore, Vice President & CISO, United Airlines
As one of the largest airlines in the world, United Airlines faces — and manages — rising threats every day. Join us to learn how they mitigate risks in an environment of unknown and rising threats.
Interviewed by: Derek Hulitzky, Former VP Content Development & Strategy, Foundry (formerly IDG Communications)
|
|
3:05pm - 3:20pm
|
Demo: Threat Intelligence and Digital Risk ProtectionAlon Arvatz, Chief Product Officer, IntSights
Rapid7 Threat Command (formerly IntSights) is an advanced external threat intelligence tool that finds and mitigates threats directly targeting your organization, employees, and customers. Join us for this demo to understand how — by proactively monitoring thousands of sources across the clear, deep, and dark web — Threat Command enables you to make informed decisions and rapidly respond to protect your business.
| Demo: New Innovations for Active Directory ProtectionJoseph Salazar, CISSP, CEH, EnCE, Technical Marketing, Attivo Networks
Join us for this short demo to find out how to gain continuous visibility to Active Directory risk with ongoing insights into exposures, overprovisioning, and misconfiguration for domains, users, and devices. You’ll see how Attivo Networks’ ADAssessor evaluates Active Directory for exposures and misconfigurations and provides guidance to remediate them – and you’ll get a glimpse of how the Attivo ADSecure solution can increase protection.
|
|
|
3:20pm - 3:30pm
| Break Time |
|
3:30pm - 4:00pm
|
Cybersecurity on the National AgendaEric Goldstein, Executive Assistant Director for Cybersecurity, CISA
As it pursues its mission of protecting and strengthening federal agencies and critical infrastructure against cyber threats, the Cybersecurity and Infrastructure Security Agency (CISA) is moving quickly. Join us for a conversation about the agency’s new initiatives, its operational collaboration with industry, and how it’s working to help prepare organizations against threats including “spillover” attacks from conflict zones like Ukraine. We will also discuss pending legislation that mandates the reporting of cyber incidents and what it means for businesses.
Interviewed by: Bob Bragdon, SVP/Managing Director Worldwide, CSO
Foundry, formerly IDG Communications
| Strategies for Finding, Growing and Retaining Security TalentTim Byrd, CISO, TIAA
Khalilah Scott, Founder, TechSecChix
Jeff Weber, Executive Director, Robert Half
There are millions of unfilled cybersecurity jobs, according to some estimates, increasing demand to unprecedented levels. At the same time, the frequency and severity of cyberattacks are also increasing, forcing organizations to stretch their security talent. Join us as our panel of experts explore short- and long-term solutions for recruiting and retaining security talent, while adding diversity to their teams.
Interviewed by: Beth Kormanik, Manager, Content Development, Foundry (formerly IDG Communications)
|
|
|
4:00pm - 4:25pm
| Ransomware: The Ultimate Test for Cyber ResiliencyChristopher Bontempo, CMO, IBM Americas
Charles Henderson, Global Head, X-Force, IBM
With its ability to shut down an entire business and prevent it from executing its mission, ransomware has become an omnipresent threat — and the ultimate test of an organization’s cyber-resilience. What are the bad actors doing? What proactive steps can you take to mitigate ransomware threats and maintain your cyber resilience? Join us to learn the latest findings from the IBM X-Force Threat Intelligence Index and the IBM X-Force Red and Incident Response teams. We’ll review the top ransomware entry points, the typical 5-step ransomware attack lifecycle, and the top approaches to protect, detect and respond to these attacks.
|
|
4:25pm - 4:50pm
|
Log4j, Open Source, and Why It’s a Big DealChris Wysopal, founder and CTO, Veracode
Lucian Constantin, Senior CSO Writer
Ever since the Apache Software Foundation revealed a huge vulnerability in its Log4j Java logging library, organizations have been scrambling to secure their technology and prevent hackers from exploiting it. Beyond the time and work lost to address this specific vulnerability, it raises bigger questions about how to deal with unknown risks in open source tools. Join us to learn the latest on Log4j, and how to prepare your organization moving forward.
| Why Time is Money with Incident ResponseMartin Bally, VP & CISO, Campbell Soup Company
What happens between an incident and your organization’s response? Dwell time grows — and with it — exponential damage to revenue, operations and reputation. Join us as we discuss strategies to minimize time from incident to response.
Interviewed by: Bob Bragdon,SVP/Managing Director Worldwide, CSO
Foundry, formerly IDG Communications
|
|
|
4:50pm-5:15pm
| Build Operational Resiliency in the Supply ChainStuart Phillips, Product Marketing Director for Cyber, Interos
Security must be considered beyond your employees, contractors, and systems. There is risk within your supply chain in the form of spyware or malware, classic criminal behavior, or problems with open source technologies. The danger affects every industry – from financial services to heavy infrastructure, and it’s something to pay attention not only when it comes to direct suppliers, but also their suppliers. This session explores the problem and tackles how to mitigate supply chain risk.
Interviewed by: Charles Pelton, Contributing Editor, CSO, Foundry, formerly IDG Communications, Inc.
|
|
5:15pm - 5:45pm
|
The Evolving Role of Cyber InsuranceLori Bailey, Chief Insurance Officer, Corvus Insurance
Trent Cooksley, Co-Founder, Cowbell Cyber
Paul McKay, Security and Risk Analyst, Forrester
A key strategy for organizations to mitigate risk is to transfer it, and cyber insurance offers organizations important ways to soften the impact of a significant attack and breach. But as attacks have become more prevalent, the insurance landscape has evolved. Join us for an update on this important area of business
Moderated by: Michael Hill, UK Editor, CSO
| IDC’s Predictions for the Future of TrustAmita Potnis, Research Director, Future of Trust, IDC
To align traditional security and risk solutions with customer success, brand, and reputation, IDC predicts that by 2025, 35 percent of organizations will replace net promoter score-like metrics with trust indices in RFPs. Join us as IDC reveals why this, and other predictions, are important for CISOs in 2022.
|
|
|
5:45pm - 5:55pm
| Mitigating Risk with Machine Identity Management and Enhanced Email SecurityAlon Nachmany, Field CISO, AppViewX
Some organizations find that security can be a barrier to their digital transformation journey. To solve for this, how can modern-day enterprises employ machine identity management and enhanced email security solutions to bridge security vulnerabilities? How do they reduce supply chain risk and address the prevalence of digital nomads? Join us for insights from a cybersecurity leader with more than 20 years of security expertise including WeWork and National Securities Corporation.
|
|
5:55pm - 6:25pm
| Fireside Chat with IDC’s 2022 Best in Future of Trust Award Winner: Public.comStephen Sikes, Chief Operations Officer, Public.com
Amita Potnis, Research Director, Future of Trust, IDC
|
|
6:25pm - 7:00pm
| Building Award-Winning Future of Trust TransformationStephen Held, Vice President and Chief Information Officer, Leo A Daly
Joan Zerkovich, SVP of Operations, American Association of Insurance Services (AAIS)
With trust emerging as a paramount concern for organizations and consumers, business leaders and technology suppliers must expand their understanding of trust and its importance to success in the digital transforming economy. Customers have an expectation of genuine ethical and moral compass of any company with whom they do business. Businesses, in turn, need to demonstrate transparency, accountability, authenticity and trustworthiness at scale by leveraging relevant technology. Join us for a discussion of these issues and more with the finalists in IDC’s Best in Future of Trust North America Awards, which recognize organizations that maintain trust amid the evolving needs of their customers.
Moderated by: Frank Dickson, Group Vice President, Security and Trust, IDC
|
|
Always On
| Always On Sessions (March 2022)Session descriptions listed in “Always On Sessions” tab above.
XDR and CTI: How they Converge to Improve Security Risk Mitigation
Alon Arvatz, Chief Product Officer, IntSights
How to Gain Operational Resilience in the Extended Supply Chain
Stuart Phillips, Product Marketing Director for Cyber, Interos
Controlling the Chaos of Collaboration: A Risk Management Perspective
Chris Plescia, Product Evangelist, Aware
Kaitlyn Debelak, Head of Customer Service, Aware
Are You Ready for Identity Security in 2022?
Carolyn Crandall, Chief Security Advocate & CMO, Attivo Networks
Tony Cole, Chief Technology Officer, Attivo Networks
Going Passwordless: Moving Beyond Username and Password
Teju Shyamsundar, Group Product Marketing Manager, Okta
Challenge the Rules of Security: Transform the Threat Surface to Proactive Control
Robert Devito, Global Director, Customer & Partner Sales Engineering, Google
Security Operations and the Convergence of Pretty Much Everything
Patrick Vowles, IBM Team Lead – North American Marketing, IBM Security
Identifying and Stopping Threats in a Zero Trust Architecture
James Young, Security Strategist, Splunk
Ward Holloway, Director of Technology Alliances, Zscaler
Best Practices for an Intelligence-Led Strategy
Jake Munroe, Senior Product Marketing Manager, Threat Intelligence & Geopolitical Intelligence, Recorded Future
Cyber Situational Awareness for Cybersecurity
Simon Aldama, Practice Director Risk Operations, Netenrich
Introduction to Commvault’s Ransomware Defense
Don Foster, Global Vice President of Sales Engineering, Commvault
|
|