John Kindervag is a 25-year veteran of the high-tech world. With Zero Trust, organizations reduce their attack surface, develop identity-first concepts in place of device IPs, build in continuous authentication, establish a trust model that removes inherent trust, and move towards the principle of least privilege and passwordless systems. Most of these identities have elevated access and are a target breach point for one of the most common forms of attack today, ransomware.

Understand how businesses are enhancing their cyber resilience and significantly limiting the damage ransomware can inflict with a Zero Trust architecture. Join leaders from Fortune 500 companies, retail, insurance, major security firms, government, academia and more, Copyright 2011-2022, EventShows, LLC. Anna Liu, for a brief presentation discussing how to successfully build a foundation towards adopting and implementing a Zero Trust strategy. Ensure that your company and team are protected by staying on top of the latest threats at the SouthEast Virtual Cybersecurity Summit. Appointed personally by the Governor, Mr. Grant leveraged the work done by Florida Cyber Task Force, which has become an advisory board with a public and private partnership, to take a brand new approach for a state-wide digital service. Learn how to leverage any identity tool as a foundational component of a complete, identity-based ecosystem to ultimately improve your overall cybersecurity posture.

Compliance isnt about checking the box, its about proactively protecting your company and providing assurance so that others trust doing business with you. Join Twingates Product Manager Team Lead, Anna Liu, for a brief presentation discussing how to successfully build a foundation towards adopting and implementing a Zero Trust strategy. Tasked with developing the states first ever enterprise approach to technology, he will share the progress this far in building Floridas technology office and why partnership is foundational to its success. How does Microsofts latest OS affect endpoint management? Exacerbating matters, those steps were often executed in a void of proper risk assessment and change management. Whether malicious or unintentional, the oft-confused carbon-based life forms (users) are worthy of a focus from this panel of experts. Identity sprawl is on the rise. How are organizations preparing to defend against inventive hackers penetrating their systems in 2022? Dive into this interactive virtual venue, and youll hear from some of the industrys leading experts from across the nation, with a particular focus on the Southeast. Assistant to the Special Agent in Charge, Tampa Field Office, Chief Information Officer at Hillsborough County Sheriff's Office, Supervisory Special Agent at Infragard MO (FBI partner). Powered by Vertoh by Showthemes. And, demonstrating trust will be the next market shaper. Senior Managing Director, Chief Security Officer at The Blackstone Group, Cybersecurity Expert & Author No Safe Harbor. All Rights Reserved. This presentation will provide a brief case study into the aforementioned vulnerabilities and identify new techniques, technologies and best practices to evaluate how, when and even if IT should take action to mitigate. New strains of ransomware are leaving organizations vulnerable too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc. Despite the addition of more and more technologies (MFA, DLP, email security, etc. A variety of initiatives can help teams align to best practices while building on their security maturity. How do we really discern between them as tools in our kit versus Weapons of Mass Distraction? During this session, well provide greater insight into which industries are: Most highly targeted by credential stuffing attacks, Most highly targeted by SQL injection attacks, Leading the way in MFA adoption to improve overall security posture. We get it, Artificial Intelligence (AI) with particular focus on Machine Learning (ML) is one way to overcome advanced threats with particular attention to scale. In fact attackers have compromised or leveraged AD in 100% of the successful ransomware attacks over the last 3 years. Processes needed prior to tool evaluation, Resources for building a Zero Trust architecture, SouthEast Virtual Cybersecurity Summit Closing.

Join Mitch Bowman, Cyber Security Director, as he unpacks some of todays most advanced ransomware threats. CISOs stand prepared to guide their organizations through Cyber Intrusion and Ransomware Events and Devon Ackermans Incident Response teams across North America handle thousands of such events each year. Director of Technical Engagement at ThreatLocker. 6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. Chief Information Officer at State of Florida, Creating Floridas First Cybersecurity Program: Lessons Learned So Far, MD & Head of Incident Response at Kroll Cyber Risk, Incident Response & The Trickle Down Effect, Cyber Security Coordinator/Advisor at US DHS/CISA, DHS-CISA Briefing: The Russia-Ukraine Conflicts Impact on the Cyber-Threat Landscape, Senior Vice President, Cybersecurity Strategy, Formerly: Asst Director, CISA; Director, NCCIC, Cybersecurity Leadership Lessons, from Hawaii to Afghanistan. And how will it affect endpoint security? Compliance is a required part of risk management. Kindervag has spoken at many security conferences and events, including ToorCon, ShmoCon and InfoSec World. Take a look at all Data Connectors has to offer here! Consolidating that information and a host of the intelligence that CISA has made available, Region 4 Cybersecurity Advisor and former Georgia State CISO Stanton Gatewood will go over the nature of the current threats posed by these and other pressing headlines. Prior to joining Forrester, Kindervag was the Senior Security Architect with security consultancy Vigilar, and he started the security practice for a Cisco Gold VAR, Flair Data Systems, where he was a Principal Security Consultant. Humans, devices, bots, and other forms of identities have more than doubled in 85% of organizations surveyed. Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. Welcome to the SouthEast Virtual Cybersecurity Summit, Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust. The Journey to Security Service Edge: The Killer Feature is Simplicity, Stopping Ransomware with Autonomous Response, Defense in Depth: New Strategies for 2022, Human-Centric Security: Protect the Person to Protect the Business, The Department of Homeland Security (DHS) Cyber Infrastructure Security Agency (CISA) first issued its Shields Up warning in mid-February. Mr. Ackerman will also walk the audience through two concepts (Castle Wall Doctrine & Krolls Intrusion Lifecycle) that he hopes will be helpful for CISOs as they convey concepts and analogies to members of their Boards, their Executive Teams, and employees of their organizations. One needs to look no farther than ProxyLogon, PrintNightmare and Log4j vulnerabilities as sublime examples of disruptive vulnerabilities. Evolving Your Organizations Security Maturity, The NIST Cybersecurity Maturity Model and how it supports broader security strategy, Sensitive data types and how they vary based on the nature of your business or the industry that you operate in, Core security initiatives to achieve greater security maturity, whether youre establishing your baseline or scaling your strategy, AI/ML and Other Leading-Edge Innovations in Cybersecurity, Compliance as a Catalyst for Reducing Risk, Challenges in Compliance and Risk Programs, Five Best Practices in starting a Risk Program, Compliance Considerations that will Improve Your Risk Posture, Top 5 Considerations When Adopting Zero Trust, With Zero Trust, organizations reduce their attack surface, develop identity-first concepts in place of device IPs, build in continuous authentication, establish a trust model that removes inherent trust, and move towards the principle of least privilege and passwordless systems. 500 Chesterfield Center Zero Trust is not a new concept, but only in recent years have organizations prioritized efforts towards adopting the architecture. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. -Recent ransomware threat trends, including double extortion and RDP attacks He has been interviewed and published in numerous magazines, including Hospitality Technology Magazine, SecurityFocus.com and Techtarget.com. Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency. WHY ATTEND THIS INTERNATIONAL CYBER SECURITY SUMMIT? But opting out of some of these cookies may have an effect on your browsing experience. Look for best practices on delegation, setting metrics, training, accountability, and building effective teams in this unique presentation from a monumental executive leader. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. As applications are now distributed, the networks and security solutions have become more complex and brittle. This session will dive into how an attack (such as ransomware) unfolds and key considerations to give before, during and after so that the post-event recovery needs of the business can be achieved. These cookies track visitors across websites and collect information to provide customized ads. You also have the option to opt-out of these cookies. This discussion at the SouthEast Virtual Cybersecurity Summit will include members of our law enforcement, federal cyber support, and other agencies alongside leaders from private industry. However, current tech stacks hardly offer ideal support for BYOD, let alone mass adoption of a mobile workforce.

Registration for qualified senior cybersecurity professionals. General Manager, Q:CYBER and Platform at QOMPLX, Inc. Future Operations Bureau Commander at Pasco Sheriff's Office. more than 90% of eventual monetary losses due to a data breach result from users. , Ben Jenkins, as we discuss endpoint evasion techniques that are undetectable by most EDR/MDR and antivirus solutions. Grant will share experiences that will benefit cybersecurity leadersbe they in the public or private sectors. Join Twingates. Serving as Floridas Chief Information Officer, Jamie Grant leads the Florida Digital Service and is responsible for the states CDO, CISO, Chief of Service Experience, and the State Data Center. Join us at the SouthEast Virtual Cybersecurity Summit to hear industry experts thoughts on this question and more! Times for this Event are in Eastern Time (EDT/EST).The Summit will be open from 11:00 AM March 30th to 5PM and 8:30 AM March 31st to 3PM. Subject to approval. Hell talk about cutting bureaucracy, budgeting, staffing, working with solution providers, and motivating teams to strive for a meaningful mission. Due to the growth of Cloud over the past ten years, organizations have moved from the data center to centers of data. Working with other agencies, important information is updated regularly at cisa.gov/shields-up. Effective compliance is a catalyst for developing a proactive, risk management program by providing effective controls and tools that assess, manage, and monitor risk. The Cyber Security Summit celebrates top leaders in industry, government, and academia for their accomplishments in cyber security. Cybersecurity is core to its mission, as the battlefield for warfare moves to the modern age. Consolidating that information and a host of the intelligence that CISA has made available, Region 4 Cybersecurity Advisor and former Georgia State CISO Stanton Gatewood will go over the nature of the current threats posed by these and other pressing headlines. Stand-alone Identity tools are unable to address this current threat surface, and must be integrated with other identity security tools to attain 360-visibility across all identities and address this growing problem in a holistic manner. They will present some of the facts from their experiences, and share best practices and practical advice for the cyber leaders in the audience to finally close the gaps related to user error. Theyll discuss processes and ideas on how cyber leaders can be less susceptible to these gaps, and thoughtful paradigms to effectuate a shift in strategy to better cope. Senior Manager, Security Solutions at Lookout. Tasked with finding the vulnerabilities and then planning and executing mitigation strategies, many IT teams had to jump into vulnerability resolution while neglecting important, but less urgent IT initiatives. Working with other agencies, important information is updated regularly at. He holds numerous industry certifications, including CISSP, CEH, QSA and CCNA. Axel Peters from baramundi software will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? And in the past two years, with teams increasingly becoming distributed or remote, there has been a greater need for Zero Trust than ever before. +1+7+20+27+30+31+32+33+34+36+39+40+41+43+44+45+46+47+48+49+51+52+53+54+55+56+57+58+60+61+62+63+64+65+66+81+82+84+86+90+91+92+93+94+95+98+211+212+213+216+218+220+221+222+223+224+225+226+227+228+229+230+231+232+233+234+235+236+237+238+239+240+241+242+243+244+245+246+248+249+250+251+252+253+254+255+256+257+258+260+261+262+263+264+265+266+267+268+269+290+291+297+298+299+350+351+352+353+354+355+356+357+358+359+370+371+372+373+374+375+376+377+378+379+380+381+382+385+386+387+389+420+421+423+500+501+502+503+504+505+506+507+508+509+590+591+592+593+594+595+596+597+598+599+670+672+673+674+675+676+677+678+679+680+681+682+683+685+686+687+688+689+690+691+692+850+852+853+855+856+870+880+886+960+961+962+963+964+965+966+967+968+970+971+972+973+974+975+976+977+992+993+994+995+996+998. Protecting citizens, assets, information and infrastructure is the building block for stable government services. That said, those terms are thrown at our executives to delight, amaze and confuse them. -How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office From individual laptops, to VPN to the WAN, the old paradigm of castles and moats is soooo 1999. Windows 11: Adapt Early or Follow Cautiously? Chesterfield, MO 63017. Join us at the SouthEast Virtual Cybersecurity Summit to learn key strategies and develop a cyber plan that can hold up against future attacks with the exclusive insights from government agencies, law enforcement, and private sector security leaders. We also use third-party cookies that help us analyze and understand how you use this website. They are on the front lines working in lockstep with victim organizations and their CISOs, augmenting Client IT and Incident Response teams, performing forensic analysis, working to contain and eject threat actors from networks and investigate incidents to identify risk to sensitive data. The world of data backup and recovery has evolved with ransomware to highlight the need for a resiliency architecture that gives an organization the ability to quickly and reliably get back up and running after a cyber attack. These cookies do not store any personal information. John Felker led some of our nations largest and most important groups within consequential missions related to security, defense and protection. By clicking Accept, you consent to the use of ALL the cookies. Threat actors, Red-Teams, and Ransomware have been abusing Active Directory for years. This category only includes cookies that ensures basic functionalities and security features of the website. We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack and takes targeted, autonomous action to stop the threat in its tracks. Knowing what types of data you have, who has access to it and how its used provides data-driven evidence that better supports decision making and demonstrates to stakeholders and auditors that youre taking appropriate steps to protect your businesss sensitive data and the privacy of your customers. Well also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats. The problems will only get worse in the future. Vice President Global IAM Strategy and Customer Advocacy at One Identity. From that body of experience, interactions and investigative results, Mr. Ackerman will walk through observed patterns that Kroll has termed The Trickle Down Effect as it relates to Nation State Actors and their Tactics, Techniques and Procedures being observed and absorbed by Organized Crime Groups and mass produced against victim organizations, like your own. Analytical cookies are used to understand how visitors interact with the website. Human error is the leading cause of data breaches, with 92% of workers feeling additional security measures impacts their work. ), and education (user awareness, phishing simulation, etc.) The proliferation of Zero-Day vulnerabilities has amplified the stress level for already burdened IT and Security staff. Terms and Conditions This website uses cookies to improve your experience while you navigate through the website. This session will dive into the changing landscape of security, the key challenges that are causing security risks to be at an all-time high, and how to secure your people to protect your business with a human-centric approach. Suite 200 This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. * The impact of the Colonial Pipeline ransomware attack in May 2021 struck panic at the pump across the Southeast, and for many organizations, it served as a reminder that cybersecurity is often the most vital yet overlooked part of their operations. Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features. Join this session for update on cybercrime, cyber-attacks, exploits, data breaches, cyber insurance, the cyber workforce gap, kinetic-warfare v. cyber-warfare, soaring ransomware PLUS live audience Q&A. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. -Real-world examples of ransomware detected by Darktrace AI including a zero-day and an attack initiated on Christmas Day. Adding fuel to this fire of complexity, network and security solutions must now address the demands of the hybrid workforce. Find out what experts have to say at the SouthEast Virtual Cybersecurity Summit!

Submit your bio for consideration to participate on our Cyber Executive RoundTable, at the SouthEast Virtual Cybersecurity Summit. Cyber security is not just pen testing or threathunting, Women in Cyber Security: Opportunity for a Career!. After joining this session, youll come away with: If its not Illegal, immoral, or unethical its on the table. We will discuss the journey to the cloud and how security tools all work together to build a unified cloud security strategy that is effective and scalable for modern enterprises. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies. Data protection, security maturity and regulatory compliance go hand in hand. Join us as we recognize these award recipients at the Visionary Leadership Awards during the annual Summit in October. He has particular expertise in the areas of wireless security, intrusion detection and prevention, and voice over IP hacking. This discussion will discuss new technologies to help you visualize the risk in your AD and add a layer of security around this very important part of enterprise infrastructure. These cookies will be stored in your browser only with your consent. Today, cybersecurity leaders are uniquely positioned to lead their peers and the organizations they serve as we are among the most sought-after, read-in, and connected executives in our respective firms. Complimentary and open to all, each hour-long webinar examines one vexing challenge facing the cybersecurity community and offers insight, knowledge and perspective from multinational business leaders and government officials. Empower the Human Cyber-Warrior: A Public-Private Partnership, Low Hanging Fruit Improving AD Security for the Easy Win, Leveraging a Single Identity Tool as a Foundation for a Unified Identity Security Framework. Director of Solutions Engineering at ThreatLocker. Patching together a depth of technical knowledge, Mr. Felker will focus on further developing information gathering practices, leadership style, and effective decision making in team-based environments that will embody your character as a leader and at the same time encourage the loyalty and compliance of staff at all levels. Digital identities control access to an ever-growing number of applications, services, and critical systems. You must agree to the Terms and Conditions. VP of Security, Audit, and Compliance at Tego Data. Women in Cyber > Taking the Cyber Security Career Path. Necessary cookies are absolutely essential for the website to function properly. . I agree to Data Connectors Understand how businesses are enhancing their cyber resilience and significantly limiting the damage ransomware can inflict with a Zero Trust architecture. Join ThreatLockers Director of Technical Engagement, Ben Jenkins, as we discuss endpoint evasion techniques that are undetectable by most EDR/MDR and antivirus solutions. The Department of Homeland Security (DHS) Cyber Infrastructure Security Agency (CISA) first issued its Shields Up warning in mid-February. Learn about how you can take a pragmatic approach to securing your multiple cloud apps and services. But are your compliance initiatives helping you bridge compliance and risk? to [emailprotected] or fill out our Call for Speakers form here. This presentation will discuss: In this talk, John will discuss how you can use Security Service Edge in a simple way to solve some of the complex network security problems no matter how large your organization. Pulling from his experiences at CISA, NCCIC, the US Coast Guard Cyber Command, and more, he will share with the Conference audience his most prescient takeaways from a lifetime of service, with a specific focus on cybersecurity.

Sitemap 7