Skip to content
Cybersecurity
Risk Management
April 22, 2021
11:00 AM – 5:15 PM EST | 8:00 AM – 2:15 PM PST
How do you balance cloud-based data risk tolerance and cost?
The shared responsibility model of cloud computing means companies are responsible for securing their cloud-based data, apps and infrastructure. But since not every workload demands the highest level of security, how do you balance risk tolerance and cost? This virtual trade show will highlight the latest strategies, tools and research to help you develop the right cybersecurity risk strategy for your business.
April 22, 2021
11:00 AM – 5:15 PM EST | 8:00 AM – 2:15 PM PST
AGENDA
KEYNOTE 1
Security Awareness Training: Strengthen Your Last Line of Defense
Presented by: Andy Malone, MCSE, MCT, Managing Director, Quality Training (Scotland) Ltd.
As phishing attacks rise, so do the costs. Organizations are reporting a major increase in the time allocated toward attack mitigation—a disturbing trend that’s hurting the bottom line. In many cases, your employees are your last line of defense. But with attacks on the rise, even careful employees can slip up, putting your data, resources, and reputation at risk. Better security awareness training can prevent disasters by arming employees with the knowledge to avoid common scams. In this session, we’ll explore the cyber-attack landscape and how security awareness training can strengthen your last line of defense.
Fireside Chat with Scott Wotring
Presented by: Scott Wotring and Perry Carpenter, Chief Evangelist and Strategy Officer, KnowBe4
Sponsored by
Presented by
Andy Malone
MCSE, MCT, Managing Director, Quality Training (Scotland) Ltd.
Perry Carpenter
Chief Evangelist and Strategy Officer, KnowBe4
KEYNOTE 2
How to Secure Your Riskiest Employees Working from Home
Presented by: Bill Kleyman
A year into the pandemic, many employees are still working from home. By this point, most companies have upgraded their security tools and processes to accommodate remote employees. But there are dozens of cases where standard cybersecurity prevention for remote work just isn’t enough. This session will share how to identify the riskiest remote employees and mitigate potential damage.
Fireside Chat with Scott Wotring
Presented by: Scott Wotring and Manoj Sharma, Global Head, Security Strategy, Broadcom
Sponsored by
Presented by
Bill Kleyman
Executive VP of Digital Solutions, Switch, and Contributing Editor, ITPro Today
Manoj Sharma
Global Head, Security Strategy, Broadcom
PREMIER SESSION
Affordable and Agile – Keys to Cloud Native Security
Presented by: Ben Grissinger, Sales Engineer, Cloud, Tufin

As organizations look to secure their cloud-native deployments, they find themselves investing in additional agents, cloud-native firewalls, and other security control planes required to run in public cloud environments. These hidden costs can increase ongoing cloud compute costs by 25% or more and lead to vendor lock-in.

Learn how you can affordably and securely move workloads to the cloud. This session will also cover defining, automatically generating, and managing cloud-native security policies across multi and hybrid-cloud applications and workloads by leveraging native cloud controls.

Take full advantage of cloud-native security controls and avoid the hidden tax imposed by other cloud security solutions.

Sponsored by
Presented by
Ben Grissinger
Sales Engineer, Cloud, Tufin
Robert Mechler
Principle Security Strategist, Forcepoint
PREMIER SESSION
Title Here…
Presented by: Corey Nachreiner, Chief Technology Officer, WatchGuard
Abstract here…
Sponsored by
Presented by
Corey Nachreiner
Chief Technology Officer, WatchGuard
Robert Mechler
Principle Security Strategist, Forcepoint
PREMIER SESSION
State of Zero Trust Security in Global Organizations
Presented by: Kelsey Nelson, Senior Solutions Product Marketing Manager and Sami Lane, Principal Security Architect, Okta

The recent and rapid shift to distributed work has pushed the need for a modern, zero trust approach to security to the front of many IT and security leaders’ agendas. Today, we can no longer have a network perimeter-centric view of security; instead, we need to securely enable access for all members of your workforce (employees, partners, contractors, collaborators) regardless of their location, device, or network.

In this webinar, we’ll take a look at progress made when it comes to the identity foundation of zero trust. We’ll discuss insights from a recent survey of 500 security leaders worldwide to see where organizations are currently having success, what’s changed since last year, and what hurdles they plan to tackle next — and explore the impact the recent crisis has had on those priorities as well.

Title Here…
Presented by: Name
Abstract here…
Sponsored by
Presented by

Kelsey Nelson
Senior Solutions Product Marketing Manager, Okta

Sami Lane
Principal Security Architect, Okta

PREMIER SESSION
Duo Security: The Next Level Demo
Presented by: Zoe Lindsey, Security Strategist, Duo Security at Cisco
In this session you will learn:
  • How admins can review and act on the access information provided by Device Insight
  • What considerations may affect your access strategy, and how to mature it
  • Why Trust Monitor can further reduce the workload on admins by flagging anomalous behavior
Now that you’ve seen how easy Duo Security is for users, get a more detailed walkthrough of the Duo administration panel, including the steps involved in building your first policies and options for enrolling users. You will also have the opportunity to ask questions from our technical presenter to help decide if Duo is the right strategy for your organization.
Title Here…
Presented by: Name
Abstract here…
Sponsored by
Presented by
Zoe Lindsey
Security Strategist, Duo Security at Cisco
Sami Lane
Principal Security Architect, Okta
SPOTLIGHT SESSION
Incredible Email Hacks You’d Never Expect
Presented by: Roger Grimes, Data-Driven Defense Evangelist, KnowBe4
Email is still a top attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join us as we explore some of the ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run.
You will learn:
  • How silent malware launches, remote password hash capture, and how rogue rules work
  • Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
  • Details behind clickjacking and web beacons
  • Actionable steps on how to defend against them all
If all you were worried about were phishing attempts, think again!
Sponsored by
Presented by
Roger Grimes
Data-Driven Defense Evangelist, KnowBe4
Robert Mechler
Principle Security Strategist, Forcepoint
SPOTLIGHT SESSION
Protection Across the Modern Enterprise

Presented by: Joe Burke, Chief Architect – Privileged Access Management (PAM)

Attackers actively seek out privileged accounts, credentials and/or secrets to exploit your infrastructure, operations and data.

Add in automation, hybrid datacenters, the push towards public clouds, serverless architectures and infrastructure as code, all of which creates a target rich ecosystem of privileged information to attract attackers.

Avoid the front page headline, widespread and irreparable damage, intellectual property loss, and brand equity tarnishing by reducing risk with adequate and comprehensive controls across the hybrid enterprise.

Join Joe Burke, Chief Architect for Privileged Access Management at Symantec, as he discusses how OnePAM protects the modern enterprise

Sponsored by
Presented by
Joe Burke
Chief Architect – Privileged Access Management (PAM)
Robert Mechler
Principle Security Strategist, Forcepoint
PREMIER SESSION
Security from the Edge to the Cloud (And All Points in Between)
Presented by: Kurt Roemer, Chief Security Strategist, Citrix

Working from anywhere, people have moved beyond the edge of secured networks. Your workforce, partners, and customers are increasingly using personal devices to directly access cloud-delivered resources. Trading convenience for security, they put proprietary and sensitive information at risk by using unsecured networks, unsanctioned applications, and all-purpose browsers.

To dynamically manage risks while meeting escalating governance and compliance mandates, you need a platform that provides observability, insights, and automation across the organization.

In this session, you will learn how to:

  • Engage innovative protections for the workforce, applications, APIs and content regardless of where they reside
  • Leverage endpoint inspection, device management, SASE and SD-WAN for comprehensive security at the edge
  • Ensure that all actions and transactions are continuously situationally aware and contextually risk appropriate
Sponsored by
Presented by
Kurt Roemer
Chief Security Strategist, Citrix
Robert Mechler
Principle Security Strategist, Forcepoint
PANEL
Need a Cloud Security Provider?
Here’s What to Look For
Moderated by: Sue Troy, Senior Content Director, ITPro Today
Panelists: Brien Posey, Microsoft MVP, Technical Writer and Ryan Davis, Sr. Product Marketing Manager, ExtraHop
Outsourcing your cybersecurity offers many benefits, but don’t overlook the risks. When you allow cloud security providers to handle any aspect of your organization’s security, you are trusting them to look out for your best interests and adhere to established security best practices across a variety of functions. In this panel, experts will share their experience on how to properly assess the growing market of cloud security providers.
Sponsored by
Presented by
Sue Troy
Senior Content Director, ITPro Today
Brien Posey
Microsoft MVP, Technical Writer
Ryan Davis
Sr. Product Marketing Manager, ExtraHop
John DiMaria
Assurance Investigatory Fellow, Cloud Security Alliance

Prizes & Interaction

Attend the live conference on April 22, 2021, and win! The more you participate, the more points you earn! It’s that simple. You’ll earn prize points for each activity you participate in throughout the virtual conference. Points will be calculated at the end of the live event day.
*Giveaways are limited to North American residents only. Winners are limited to one prize per calendar year for Informa Tech sponsored events.

Explorer Giveaway

30 Points

Session Viewed

25 Points

Zone Visits

20 Points

Location Chat Attended

10 Points

Documents Viewed

5 Points

Exchanged vCards

Keynote Sponsors
b4-cards
Premier Sponsors
tufin-cards
watchguard-Cards
duo-cards
okta-cards
citrix-cards
Panel Premier Sponsors
xhop-cards
csa-cards
Cybersecurity Risk Management
April 22, 2021
11:00 AM – 5:15 PM EST | 8:00 AM – 2:15 PM PST

Natalie Silvanovich
Security Researcher,
Google

Natalie Silvanovich is a security researcher on Google Project Zero. Her current focus is messaging applications and video conferencing. Previously, she worked in mobile security on the Android Security Team at Google and as a team lead of the Security Research Group at BlackBerry, where her work included finding security issues in mobile software and improving the security of mobile platforms. Outside of work, Natalie enjoys applying her hacking and reverse engineering skills to unusual targets and has spoken at several conferences on the subject of Tamagotchi hacking.

[ifso id="3297"]

Andy Malone
MCSE, MCT, Managing Director, Quality Training (Scotland) Ltd.

Andy Malone is a motivated technical trainer, speaker, and confessed technology evangelist with over 12 years of experience in IT training and consultancy. Andy was also the 2006 winner of the TechEd: IT Forum Speaker Idol contest. Having been a Microsoft Certified Trainer since 1994, Andy brings a wealth of real-world experience to his courses and teaches to a consistently high standard. His knowledge stems from early editions of Windows NT, Exchange, and the Office platforms to Windows Vista, Longhorn server.

Perry Carpenter
Chief Evangelist and Strategy Officer, KnowBe4

Perry Carpenter currently serves as Chief Evangelist and Strategy Officer for KnowBe4, the world’s most popular security awareness and simulated phishing platform.


Previously, Perry led security awareness, security culture management, and anti-phishing behavior management research at Gartner Research, in addition to covering areas of IAM strategy, CISO Program Management mentoring, and Technology Service Provider success strategies. With a long career as a security professional and researcher, Mr. Carpenter has broad experience in North America and Europe, providing security consulting and advisory services for many of the best-known global brands. Perry holds a Master of Science in Information Assurance (MSIA) from Norwich University in Vermont and is a Certified Chief Information Security Officer (C|CISO).

Bill Kleyman
Executive VP of Digital Solutions, Switch, and Contributing Editor, ITPro Today

Bill brings more than 15 years of experience to his role as Executive Vice President of Digital Solutions at Switch. Using the latest innovations, such as AI, machine learning, data center design, DevOps, cloud, and advanced technologies, Bill delivers solutions to customers that help them achieve their business goals and remain competitive in their market. An active member in the technology industry, he was ranked #16 globally in the Onalytica study that reviewed the top 100 most influential individuals in the cloud landscape; and #4 in another Onalytica study that reviewed the industry’s top Data Security Experts.

Manoj Sharma
Global Head, Security Strategy, Symantec, Network & Information Security, Broadcom

Manoj Sharma has been associated with Symantec Corporation for the past 19 years. He has over 21 years of experience in the technology industry and has worked in a number of roles varying from running and managing IT operations to working with Symantec’s strategic customers globally, providing them with the best solutions to their critical business requirements related to cyber security and application optimization. In his role as Global Head, Security Strategy, and leading the Team of security strategists, Manoj has worked hand-in-hand with the customers in building a strategy and adoption of Security-in-the-Cloud and Security-for-the-Cloud solutions.

Ben Grissinger
Sales Engineer, Cloud, Tufin

Recognized as a thought leader Over the past several years, Ben has designed and delivered automation solutions for everything containers as both a customer and vendor. Now at Tufin, Ben collaborates with the IT security industry’s brightest minds and thought leaders to create a secure cloud and containerized environment at the speed and scale required for the fast-moving enterprises.

Bob Mechler
Principle Security Strategist, Forcepoint

Bob Mechler is Forcepoint’s Principal Security Strategist, and previously served as Vice President – Strategy, Risk and Programs for Verizon. In this capacity, he was responsible for delivery of information security strategies that protected sensitive data for over 140M customers and $120B in financial transactions. During this time, Bob also served as Chair of the Customer Authentication Steering Committee. Bob holds a Master’s degree in Information Systems Management from Stevens Institute of Technology as well as a Bachelor of Science degree in Computer Science from the University of Delaware.

Corey Nachreiner
Chief Technology Officer, WatchGuard

Recognized as a thought leader in IT security, Nachreiner spearheads WatchGuard’s technology vision and direction. Previously, he was the director of strategy and research at WatchGuard. Nachreiner has operated at the frontline of cyber security for 16 years, and for nearly a decade has been evaluating and making accurate predictions about information security trends. As an authority on network security and internationally quoted commentator, Nachreiner’s expertise and ability to dissect complex security topics make him a sought-after speaker at forums such as Gartner, Infosec and RSA. He is also a regular contributor to leading publications including CNET, Dark Reading, eWeek, Help Net Security, Information Week and Infosecurity, and delivers WatchGuard’s “Daily Security Byte” video on Facebook.

Kelsey Nelson
Senior Solutions Product Marketing Manager, Okta

Kelsey Nelson leads the Solutions Product Marketing team at Okta, which focuses on cross-product and cross-industry go to market solutions such as Zero Trust. Kelsey also leads Okta’s Zero Trust work, working across product, partner and field teams to support modern security initiatives at customer organizations. Prior to joining Okta, she led product and business launches as well as on-going communications at tech startups with San Francisco agency LaunchSquad. Kelsey also began her career teaching middle school in the Bay Area with Teach for America and remains an active community member through organizations like Okta for Good and Full Circle Fund.

Sami Lane
Principal Security Architect, Okta

Sami Laine is Principal Security Architect at Okta. Over the last two decades, Sami has helped many of the world’s largest enterprises, financial institutions and public sector organizations protect against fraud, malware, threats and data breaches and now at Okta helps companies embrace identity as the new security perimeter.

Zoe Lindsey
Security Strategist, Duo Security, Cisco

Zoe Lindsey is a Security Strategist and an early member of the Duo team, joining Duo in 2012 with a background in medical and cellular technology. She has advised businesses and organizations of every size on strong security policy and unified access security solutions, and for the last two years has shared best practices and recommendations at events and discussion panels including the 2018 RSA Conference in San Francisco.

Roger Grimes
Data-Driven Defense Evangelist, KnowBe4

Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 12 books and over 1,000 magazine articles on computer security. He now serves as the Data-Driven Security Analyst for KnowBe4. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He was the weekly security columnist for InfoWorld and CSO magazines from 2005-2019.

Ankur Chadda
Principal Product Marketing Manager, Forcepoint

Ankur serves as Principal Product Marketing Manager for Forcepoint. He brings over 20 years of experience in the technology industry and leads the product marketing efforts for data protection solutions leveraging his UEBA startup experience where he helped global enterprises implement behavior analytics. Ankur also led the discussions on security solutions with industry luminaries, CISOs and CIOs from Fortune 500 companies and government agencies as the head interviewer-publisher of the book: Borderless Behavior Analytics. Prior to that, he was at a network performance testing and measurement company as a member of the product marketing team for their application and security solutions portfolio.

Sue Troy
Managing Editor,
Network Computing

Sue Troy is a senior content director at Informa, where she serves in editorial management roles for ITPro Today. She has spent more than 25 years writing and editing IT-focused content, with long stints at companies such as TechTarget and Ziff Davis Publishing. Before joining Informa in May 2017, her most recent role was as editorial director of TechTarget’s CIO, IT Strategy and Channel Media Group, where she was inspired by emerging technologies such as IoT, blockchain and artificial intelligence.

Brien Posey
Technology Author & Microsoft MVP

As an international best-selling technology author and 18-time Microsoft MVP, Brien Posey has written or contributed to dozens of books, and created numerous video training courses on a variety of IT and space-related topics. Brien has published more than 7,000 technical articles and whitepapers for various websites and periodicals. He has received Microsoft’s MVP award numerous times for his work in Windows Server, IIS, Exchange Server, File Systems / Storage, Cloud and Datacenter Management, and Windows and Devices for IT. Brien was previously CIO for a national chain of hospitals and healthcare facilities, and served as lead network engineer for the U.S. Department of Defense at Fort Knox. In addition to his ongoing work in IT, Posey is training as a commercial astronaut candidate in preparation to study polar mesospheric clouds from space.

John DiMaria
Assurance Investigatory Fellow, Cloud Security Alliance

John DiMaria is the Assurance Investigatory Fellow for the Cloud Security Alliance. He has 30 years of successful experience in Standards and management System Development, including Information Systems, Business Continuity and Quality. John was one of the innovators and co-founders of the CSA STAR program for cloud providers, a contributing author of the American Bar Association’s Cybersecurity Handbook, a working group member and key contributor to the NIST Cybersecurity Framework. He currently manages all facets of the CSA STAR Program which includes security, privacy, continuous monitoring and development of new solutions.