KEYNOTES
Eduardo Joia | (Chief Technology Officer (CTO) at Truist Financial)
Deploying Agile to Transform a Company’s Culture, Enabling speed, Employee Empowerment, Innovation and Inclusion
Ryan Linn | (Security Strategist at Its A Secret)
Ira Winkler | (President at Secure Mentem)
SPONSOR PRESENTATIONS
Access IT Group | Completing Security Visibility with NDR
Armis – Agentless Device Security: Making the Invisible Visible
Curtis Simpson (CISO at ARMIS)
Avertium – Supercharge your Defense Strategies
Axonius – Time Travel, Cybersecurity & Asset Management: What the Past & Future Can Teach Us Today
Check Point – Humans are the Weakest Link
Cisco DUO – Making Remote, Work
Mark Royall | (Senior Technical Solutions Architect at Cisco – DUO Security)
Cisco Umbrella – How to think like a cybercriminal (so you can outsmart them)
Daniel Bates | (Technical Solutions Architect at Cisco Systems)
Cyber Ark – Come and Knock on My Door: The New Attack Pathway Starts at Home
Chris Maroun (Global Director, Solutions Engineering at CyberArk)
Digital Shadows – Cybercrime finds a way, a look at this year’s cybercrime trends
Rick Holland (CISO and VP, Strategy at Digital Shawdows)
ePlus – What Requirements Should Every CIO Consider for an IDM/IAM Solution
F5 Networks – What you can’t see WILL hurt you! Strategies for defending against encrypted malware
Guide Point Security – Addressing Third Party Risk in your GRC Program
NetSkope – Minimizing Your Risk Through Zero Trust Maturity
Optiv – Measuring Risk in 2020 Which device will be YOUR weakest link?
Forescout & Optiv – A fireside chat with successful stories of Visibility, Compliance and Control
ProofPoint Part 1 – The Human Target : How Threat Actors Choose Their Mark
Proofpoint Part 2 – People‑Risk Explorer – Identify, Assess and Mitigate People-Based Cybersecurity Risks
Rapid7 – A Hitchhiker’s Guide to the 2020 National • Industry • Cloud Exposure Report
Recorded Future – Elections and Ransomware
rmsource – MDR Strategy – How to Cover All the Bases
SailPoint – Rethinking your Identity Program
StrongKey – Adopting Passwordless Authentication for Optimum User Experience
Norman Field (Solutions Architect at Strong Key)
The Teneo Group – See. Segment. Secure. Getting Visibility Into Your IoT Environment
Craig Johnson (VP Business Development at The Teneo Group)
Eric Berkman (Sr. Director World Wide Channels at The Teneo Group)
Trend Micro – Sweeping the Leg with IPS
Varonis – Microsoft Teams Explosion: How to Prevent Data Leaks
DAY 1 PRESENTATIONS
How to Drive Change and Manage an Effective Awareness & Training Program through a Global Pandemic
Better Together: How Purple Teaming Sharpens Your Security Defenses
Analyzing the Crime Scene: A Way for Analysts to View Security Investigations
Decentralized Identity: The Future?
Web Shell Hunting – Hands On
How to Achieve Cloud Security Monitoring at Scale
Vinay Bansal (Cloud Security Architect at Cisco Systems)
Siddhartha Rao (Information Security Analyst at Cisco Systems)
What cybersecurity professionals need to know about communicating to stakeholders, the media, and the public
LEADERSHIP TRACK – PRESENTATIONS
Balancing The Tug of War: How CIOs and CISOs Can Partner for Better IT
Seat at the Table: Security Leadership Through Tabletop Exercises
Gina Yacone (Cybersecurity Consultant at Agio)
Common Cloud Attack Scenarios and Solutions
Jon Clay (Director, Global Threat Communications at Trend Micro)
Zero to SOC2 in One Year (Or Less)
Leading and managing Cyber risk for the business before, during, and after COVID-19
DAY 2 PRESENTATIONS
Third Party Threat Hunting
Lessons Learned and Incident Response from Afar
Beyond BYOD: Bringing Your Own Office, Lessons Learned Working Remote in 2020
Current Landscape of Mid-Market Threat Intelligence
Oh, the Humanity! Social Engineering in the 21st Century
Protecting Hybrid Legacy ICS Networks
Not Another Framework: Cutting Through The Noise
Data Breaches & The North Carolina Identity Theft Act
Preventing & Detecting Cloud Security Incidents
Disruptionware on the Rise
Blockchain the Savior
Applying Data Analytics for Cybersecurity
ToR of the WiLD SiD3 of the Internet-Dark Web, Deep Web and Dark Net
“Anti-Forensics”: Reversing a Leading Phone Forensics Tool
Ten Things I Wish Every Developer Knew About Security
Tales from the [en] Crypt
CCPA & the New United States Privacy Laws
Psychology of the Phish: Leveraging the Seven Principles of Influence
A-Hunting We Will Go! Adventures in Endpoint Threat Detection
Secure SDLC Lessons Learned
Cyberbiosecurity: Protecting Biomedical and Patient Data in the Cloud
Muskan Bansal (Biomedical Researcher at Center for Study of Biological Complexity, Virginia Commonwealth University)
Vinay Bansal (Principle Engineer at Cisco Systems)
In the Beginning There Was Chaos – Telework Explosion 2020
