Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
The number one technique used by attackers in a data breach is leveraging weak or stolen credentials. To combat this technique, organizations are embracing methods to include multi- factor authentication and improved access control for domain administrator accounts. Companies fall short in assessing their pre-attack risk and in failing to take into consideration non-administrator accounts and local accounts. Organizations must implement proactive measures to minimize risk of an attack. Once a breach occurs, it is too late. This talk will address techniques organizations should use to assess risk prior to an attack and approaches to better defend the network from credential-based attacks.
Presented by Eric Stride, Senior Vice President, root9B
The current approach of cybersecurity is not working. This has been made abundantly clear by the multitude of recent media reports and breaches (and other incidents not publicly reported). The damage caused by these events has affected every business sector: energy, retail, manufacturing, finance, medical, insurance, private and public. As the organization that first introduced proactive HUNT operations to the commercial community, root9B has developed and refined their proprietary capabilities and methodologies to facilitate the necessary shift from automated passive technologies. As we continue to witness the adversary target the commercial community, this alternative approach has proven to be the future of cyber. Learn how many organizations within the cyber community are embracing the future that HUNT provides.
Join the region’s leading executives, and cybersecurity leaders as they share current and next generation best practices, explore new proactive and predictive strategies, and policies to combat and withstand threats.
Understanding that breaches will occur, security executives must work with senior leaders and boards of directors to assess value, measure costs, and identify risk to then properly architect and implement a comprehensive security program.
Some topics include:
The guidelines that influence your organization’s cybersecurity policies can come from a multitude of fronts: government regulators, security frameworks, industry associations, or corporate leadership. These sometimes complimentary, sometimes contradictory forces can quickly create a complicated web of rules and regulations that can become seemingly impossible to fully comply with. When compliance issues have you pushed against the wall, your cyber security providers can help guide you through the minefield of compliance requirements that lie ahead of you and your organization. This panel will discuss the challenges of meeting competing compliance issues, how to prioritize policy requirements, and how your cyber solution provider can assist you in implementing a fully compliant cybersecurity program.
Presented by Andrew Tsonchev, Director, Cyber Analysis, Darktrace
As 2016 drew to a close, a year in which cybercriminals seemingly remained a few steps ahead, one might have noticed an increase of cyber crime in areas ranging from national defense, politics, & global economic systems to smart homes and personal devices. With a growing reliance and utilization of consumer & commercial data, social media, autonomous cars, smart city infrastructure and an exponentially increasing market of IoT devices, how can we best prepare and defend against the next-generation of cyber attacks?
Moderated by David Aucsmith, Chief Scientist, root9B
The most prodigious threat to the security and safety of the U.S. Enterprise is no longer the hacker attacking from beyond network walls, but the unruly employee already within them. According to recent market research, it is now estimated that “Insiders” conduct more than 50% of cyber attacks. What happens when a fast riser or even an uninspired employee decides to go to a competitor or launch his or her own endeavor? What data, clients or personal information is capable of being exfiltrated on their way out? This panel will focus on the identifiers and triggers that often go undetected and discuss ways to best defend against corporate espionage.
Moderated by Chris Bates, Principal Architect, SentinelOne
Sponsor / Exhibitor Technology Showcase, Business Meetings & Cocktail / Cigar Reception
* Agenda items & speakers subject to change