7:15am – 8:30am
8:50am – 9:20am
Former host of Georgia Business on PBS and executive security strategist, Richard Warner revealed the statistics that were conglomerated from industry leading whitepapers and illustrated the takeaways gleaned from the research.
9:20am – 9:45am
Company decisions are being driven by technologies that foster increased productivity and bring growth to the bottom line, which in turn presents opportunities for leadership teams to re-invent and transform their businesses. How does the CISO of today become the CISO of tomorrow, with capabilities to navigate through change and disruptions that impact their business?
9:45am – 10:15am
Data is a blessing and a curse. Get the right data, in the right amount, at the right time, and you are in the driver’s seat. The wrong data, too little data, too much data, or the wrong timing, and you are in the hot seat. The explosion of data and its byproduct, network traffic, create structural problems for the SOC.
In this session, attendees will learn how taking a different approach to data – one that emphasizes speed, fidelity, and the elimination of data silos – can enable more successful threat hunting and incident response. Topics covered include the impact of TLS 1.3 and encryption on data and its ripple effect on security operations, as well as best practices for threat hunting. The session will also delve into how network traffic analysis can serve as the foundation of more effective security practices, data-driven decisions, and a mature, proactive SOC.
10:15am – 10:50am
Break and Networking in the Sponsor Pavilion
10:50am – 11:10am
The Year Ahead
As the breadth and complexity of information security threats continue to increase, security leaders are increasing their focus on building an organization that is able to detect, analyze, take action, recover, and communicate. As part of this focus, developing a risk resilience environment, with input from the business units, will take center stage. Join In this interview session, CISOs will share insights on their strategies and supporting plans to continue to build a resilient environment for their companies.
11:10am – 11:40am
Navigating through Cloud Security
Understand how advanced security tools and techniques can help you take back control of your cloud apps, cloud data and rogue users.
Learn how to protect sensitive data and intellectual property inside and outside your perimeter,
See what cloud apps are being used and how to easily protect all cloud apps, not just the most popular ones
Get rid of manual auditing and quickly discover sensitive assets stored in the cloud
Mitigating the Resurgence of Ransomware Attacks with Identity Governance
Ransomware… To different extents we are all familiar with this term. Today I’d like to focus on how we have seen Identity Governance used as a part of an enterprise’s overall Security architecture to help mitigate the risk and breadth of different kinds of ransomware attacks.
12:10pm – 12:30pm
Mindset…this team knows it can deliver. What does it take to find and build a team that is invested, persistent, and knows how to overcome major challenges thrown its way? In an interview setting, CISOs will share their insights into the traits that make up “A” team members, why they are great problem solvers, and how to keep these employees motivated and challenged.
Lunch and Networking
Crypto-jacking, the hijacking of IT resources for the purpose of covert crypto-mining, made its first appearance in September of 2017. Since then it has surpassed many other cybercrimes such as ransomware and as such is of primary concern.
The right approach to protecting against this threat and indeed others, is a layered approach that implement protections at all phases of a successful crypto-jacking attack; infiltration, infecting end-points with crypto-mining software, mining and exfiltration of the cryptocurrency. No end-point is safe crypto-jacking has been uncovered on computers, smartphones and IoT devices, including physical security devices.
What is “Zero Trust” and How Can I Get There?
The term “Zero Trust” has been making the rounds since Forrester coined it as a new way to think about our security architecture. The premise is we should not trust anything inside or outside our networks and verify everything and anything trying to connect to the networks. So, what does “Zero Trust” really mean to our organizations?
Scaling the Organization
With limited resources available, CISOs are looking in new directions on how they can continue to keep pace with the demand from their companies. The focus of this session is on innovation, productivity, and other ways for security organizations to work smarter.
In this talk you will learn:
Break and Networking
Executive Roundtable Discussions
Facilitated by executives, breakout sessions with your peers on topics determined by attendees during registration.