AGENDA AT A GLANCE
START TIME | SESSION DETAILS |
---|---|
09:00 AM | Welcome & registration |
10:00 AM | Keynote | Race Against Threats: Resilience in the Era of Modern Threats The Risk to Resilience keynote session unpacks a forward-looking analysis of the latest threat research and threat predictions exposing emerging tactics, techniques, and the current characteristics of the cyber threat landscape. Cybersecurity leaders and defenders will gain insights into the adversary's playbook, learning about novel vectors such as AI-driven attacks and evolutions in ransomware. The session is designed to empower cybersecurity professionals with knowledge to anticipate and meet the challenge of these advanced threats. |
10:30 AM | CISO | On The Fast Track: Winning Strategies for Cyber Consolidation and Communication Access the strategic advantages of minimizing tool sprawl and consolidating visibility and security controls. |
11:00 AM | SOC | Supercharged Defense: Rapid Detection & Response Dive deep into innovative threat detection, investigation and response strategies to modernize SOC and security team performance using the tools already in your kit. We will explore of the latest innovations and impact of generative AI to improve SOC and security performance and how integrated telemetry from native and third-party feeds are working together to accelerate threat identification and yield more complete response. The session includes immersive, scenario-based lessons to deliver practical guidance on how to leverage technology, process, automation, and integration to improve security outcomes. |
11:30 AM | Coffee Break |
12:00 PM |
Ops | Minimize Your Attack Surface: Revolutionizing IT Operations Strategies
What are the opportunities to proactively improve your cybersecurity posture? In this session, explore the impact of real-time attack surface risk management to optimize operational strategies and address modern cyber risks. |
12:30 PM | Cloud | Mitigating Risks and Threats in the Cloud Navigate the cloud security realm in this session focused on mitigating risks and neutralizing threats across multi-cloud environments. Identifying cloud assets is tough and determining which assets require high priority attention can be even more challenging. We'll dissect the layers of cloud exposure management, container security, file security, and workload security, each a cornerstone in building a robust defense-in-depth strategy for cloud infrastructure required for digital modernization projects. |
1:00 PM | Why SOCs Fail A Journey Through Common mistakes offers a captivating exploration into the often-overlooked challenges of establishing and managing Security Operations Centers, both in-house and outsourced. Through a series of engaging real-life case studies, the presentation sheds light on frequent mistakes and misconceptions, transforming them into valuable learning opportunities. You will be equipped with actionable insights on avoiding these pitfalls, enhancing your SOCs' operational efficiency and strategic effectiveness. This enlightening journey promises not just a reflection on past errors but a roadmap towards achieving excellence in cybersecurity operations. |
1:15 PM | BEC Trends Business Email Compromise (BEC) has been around for quite a while and is a very profitable attack vector for cybercriminals. The challenge is the email message typically will request an employee to perform a job function they normally do via a well crafted socially engineered message that does not contain a link or an attachment. This may cause messaging security solutions that focus on those to be bypassed. BEC can target financial, HR, legal or other job functions that allow them to obtain what they need. Recently BEC |
1:30 PM | Lunch |