Skip to content
Cybersecurity
Risk Management
April 22, 2021
11:00 AM – 5:15 PM EST | 8:00 AM – 2:15 PM PST
How do you balance cloud-based data risk tolerance and cost?
The shared responsibility model of cloud computing means companies are responsible for securing their cloud-based data, apps and infrastructure. But since not every workload demands the highest level of security, how do you balance risk tolerance and cost? This virtual trade show will highlight the latest strategies, tools and research to help you develop the right cybersecurity risk strategy for your business.
April 22, 2021
11:00 AM – 5:15 PM EST | 8:00 AM – 2:15 PM PST
AGENDA
KEYNOTE 1
Security Awareness Training: Strengthen Your Last Line of Defense
Presented by: Andy Malone, MCSE, MCT, Managing Director, Quality Training (Scotland) Ltd.
As phishing attacks rise, so do the costs. Organizations are reporting a major increase in the time allocated toward attack mitigation—a disturbing trend that’s hurting the bottom line. In many cases, your employees are your last line of defense. But with attacks on the rise, even careful employees can slip up, putting your data, resources, and reputation at risk. Better security awareness training can prevent disasters by arming employees with the knowledge to avoid common scams. In this session, we’ll explore the cyber-attack landscape and how security awareness training can strengthen your last line of defense.
Fireside Chat with Scott Wotring
Presented by: Scott Wotring and Perry Carpenter, Chief Evangelist and Strategy Officer, KnowBe4
Sponsored by
Presented by
Andy Malone
MCSE, MCT, Managing Director, Quality Training (Scotland) Ltd.
Perry Carpenter
Chief Evangelist and Strategy Officer, KnowBe4
KEYNOTE 2
How to Secure Your Riskiest Employees Working from Home
Presented by: Bill Kleyman
A year into the pandemic, many employees are still working from home. By this point, most companies have upgraded their security tools and processes to accommodate remote employees. But there are dozens of cases where standard cybersecurity prevention for remote work just isn’t enough. This session will share how to identify the riskiest remote employees and mitigate potential damage.
Fireside Chat with Scott Wotring
Presented by: Scott Wotring and Manoj Sharma, Global Head, Security Strategy, Broadcom
Sponsored by
Presented by
Bill Kleyman
Executive VP of Digital Solutions, Switch, and Contributing Editor, ITPro Today
Manoj Sharma
Global Head, Security Strategy, Broadcom
PREMIER SESSION
Affordable and Agile – Keys to Cloud Native Security
Presented by: Ben Grissinger, Sales Engineer, Cloud, Tufin

As organizations look to secure their cloud-native deployments, they find themselves investing in additional agents, cloud-native firewalls, and other security control planes required to run in public cloud environments. These hidden costs can increase ongoing cloud compute costs by 25% or more and lead to vendor lock-in.

Learn how you can affordably and securely move workloads to the cloud. This session will also cover defining, automatically generating, and managing cloud-native security policies across multi and hybrid-cloud applications and workloads by leveraging native cloud controls.

Take full advantage of cloud-native security controls and avoid the hidden tax imposed by other cloud security solutions.

Sponsored by
Presented by
Ben Grissinger
Sales Engineer, Cloud, Tufin
Robert Mechler
Principle Security Strategist, Forcepoint
PREMIER SESSION
Title Here…
Presented by: Corey Nachreiner, Chief Technology Officer, WatchGuard
Abstract here…
Sponsored by
Presented by
Corey Nachreiner
Chief Technology Officer, WatchGuard
Robert Mechler
Principle Security Strategist, Forcepoint
PREMIER SESSION
State of Zero Trust Security in Global Organizations
Presented by: Kelsey Nelson, Senior Solutions Product Marketing Manager and Sami Lane, Principal Security Architect, Okta

The recent and rapid shift to distributed work has pushed the need for a modern, zero trust approach to security to the front of many IT and security leaders’ agendas. Today, we can no longer have a network perimeter-centric view of security; instead, we need to securely enable access for all members of your workforce (employees, partners, contractors, collaborators) regardless of their location, device, or network.

In this webinar, we’ll take a look at progress made when it comes to the identity foundation of zero trust. We’ll discuss insights from a recent survey of 500 security leaders worldwide to see where organizations are currently having success, what’s changed since last year, and what hurdles they plan to tackle next — and explore the impact the recent crisis has had on those priorities as well.

Title Here…
Presented by: Name
Abstract here…
Sponsored by
Presented by

Kelsey Nelson
Senior Solutions Product Marketing Manager, Okta

Sami Lane
Principal Security Architect, Okta

PREMIER SESSION
Duo Security: The Next Level Demo
Presented by: Zoe Lindsey, Security Strategist, Duo Security at Cisco
In this session you will learn:
  • How admins can review and act on the access information provided by Device Insight
  • What considerations may affect your access strategy, and how to mature it
  • Why Trust Monitor can further reduce the workload on admins by flagging anomalous behavior
Now that you’ve seen how easy Duo Security is for users, get a more detailed walkthrough of the Duo administration panel, including the steps involved in building your first policies and options for enrolling users. You will also have the opportunity to ask questions from our technical presenter to help decide if Duo is the right strategy for your organization.
Title Here…
Presented by: Name
Abstract here…
Sponsored by
Presented by
Zoe Lindsey
Security Strategist, Duo Security at Cisco
Sami Lane
Principal Security Architect, Okta
SPOTLIGHT SESSION
Incredible Email Hacks You’d Never Expect
Presented by: Roger Grimes, Data-Driven Defense Evangelist, KnowBe4
Email is still a top attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join us as we explore some of the ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run.
You will learn:
  • How silent malware launches, remote password hash capture, and how rogue rules work
  • Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
  • Details behind clickjacking and web beacons
  • Actionable steps on how to defend against them all
If all you were worried about were phishing attempts, think again!
Sponsored by
Presented by
Roger Grimes
Data-Driven Defense Evangelist, KnowBe4
Robert Mechler
Principle Security Strategist, Forcepoint
SPOTLIGHT SESSION
Protection Across the Modern Enterprise

Presented by: Joe Burke, Chief Architect – Privileged Access Management (PAM)

Attackers actively seek out privileged accounts, credentials and/or secrets to exploit your infrastructure, operations and data.

Add in automation, hybrid datacenters, the push towards public clouds, serverless architectures and infrastructure as code, all of which creates a target rich ecosystem of privileged information to attract attackers.

Avoid the front page headline, widespread and irreparable damage, intellectual property loss, and brand equity tarnishing by reducing risk with adequate and comprehensive controls across the hybrid enterprise.

Join Joe Burke, Chief Architect for Privileged Access Management at Symantec, as he discusses how OnePAM protects the modern enterprise

Sponsored by
Presented by
Joe Burke
Chief Architect – Privileged Access Management (PAM)
Robert Mechler
Principle Security Strategist, Forcepoint
PREMIER SESSION
Security from the Edge to the Cloud (And All Points in Between)
Presented by: Kurt Roemer, Chief Security Strategist, Citrix

Working from anywhere, people have moved beyond the edge of secured networks. Your workforce, partners, and customers are increasingly using personal devices to directly access cloud-delivered resources. Trading convenience for security, they put proprietary and sensitive information at risk by using unsecured networks, unsanctioned applications, and all-purpose browsers.

To dynamically manage risks while meeting escalating governance and compliance mandates, you need a platform that provides observability, insights, and automation across the organization.

In this session, you will learn how to:

  • Engage innovative protections for the workforce, applications, APIs and content regardless of where they reside
  • Leverage endpoint inspection, device management, SASE and SD-WAN for comprehensive security at the edge
  • Ensure that all actions and transactions are continuously situationally aware and contextually risk appropriate
Sponsored by
Presented by
Kurt Roemer
Chief Security Strategist, Citrix
Robert Mechler
Principle Security Strategist, Forcepoint
PANEL
Need a Cloud Security Provider?
Here’s What to Look For
Moderated by: Sue Troy, Senior Content Director, ITPro Today
Panelists: Brien Posey, Microsoft MVP, Technical Writer and Ryan Davis, Sr. Product Marketing Manager, ExtraHop
Outsourcing your cybersecurity offers many benefits, but don’t overlook the risks. When you allow cloud security providers to handle any aspect of your organization’s security, you are trusting them to look out for your best interests and adhere to established security best practices across a variety of functions. In this panel, experts will share their experience on how to properly assess the growing market of cloud security providers.
Sponsored by
Presented by
Sue Troy
Senior Content Director, ITPro Today
Brien Posey
Microsoft MVP, Technical Writer
Ryan Davis
Sr. Product Marketing Manager, ExtraHop
John DiMaria
Assurance Investigatory Fellow, Cloud Security Alliance

Prizes & Interaction

Attend the live conference on April 22, 2021, and win! The more you participate, the more points you earn! It’s that simple. You’ll earn prize points for each activity you participate in throughout the virtual conference. Points will be calculated at the end of the live event day.
*Giveaways are limited to North American residents only. Winners are limited to one prize per calendar year for Informa Tech sponsored events.

Explorer Giveaway

30 Points

Session Viewed

25 Points

Zone Visits

20 Points

Location Chat Attended

10 Points

Documents Viewed

5 Points

Exchanged vCards

Keynote Sponsors
b4-cards
Premier Sponsors
tufin-cards
watchguard-Cards
duo-cards
okta-cards
citrix-cards
Panel Premier Sponsors
xhop-cards
csa-cards
Cybersecurity Risk Management
April 22, 2021
11:00 AM – 5:15 PM EST | 8:00 AM – 2:15 PM PST

Natalie Silvanovich
Security Researcher,
Google

Natalie Silvanovich is a security researcher on Google Project Zero. Her current focus is messaging applications and video conferencing. Previously, she worked in mobile security on the Android Security Team at Google and as a team lead of the Security Research Group at BlackBerry, where her work included finding security issues in mobile software and improving the security of mobile platforms. Outside of work, Natalie enjoys applying her hacking and reverse engineering skills to unusual targets and has spoken at several conferences on the subject of Tamagotchi hacking.

[ifso id="3297"]