ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Virtual Cybersecurity & Fraud Summit: Chicago

October 13, 2020

Register Now

Welcome / Summit Overview

With enterprises globally now supporting a 100% remote workforce and customer base, global organizations may be forever changed. Even the most forward-looking organizations face added risk in these extraordinary times. Layers of security are rendered useless if your new remote workforce, or vulnerabilities in their devices and networks, inadvertently give permission for threat actors to access your data.

Join local experts at our virtual summit to learn how to best adapt and balance productivity, accessibility and security. Registration is complimentary and CPE Credits will be available.

For more information on how ISMG is addressing the ongoing coronavirus concerns visit: https://events.ismg.io/coronavirus-guidelines/

Details

Free Registration

Oct. 13th, 2020

Register Now

Registering For a Group?
Call + 1 (609)-356-1499

  • Event Gallery

David Ogbolumani

Chief CyberSecurity & Privacy Officer, IT Security Consultants; former CISO, Kellogg Company

Katherine Licup

Chief Privacy Officer, Archer Daniels Midland Company

Shaked Vax

Trusteer Product Strategist, IBM Security

Tom Field

SVP - Editorial, ISMG

John Matthews

CIO, ExtraHop

Sam Curry

Chief Security Officer, Cybereason

Christine Izuakor

Founder and CEO, Cyber Pop-up; former Sr. Manager - Global Security Strategy, United Airlines

Nick Holland

Director of Banking and Payments, ISMG

SPEAKERS / Featured Chicago Speakers

Meredith Harper

VP, CISO, Eli Lilly and Company

Jason Weiss

former FBI Special Agent; Attorney, Faegre Drinker Biddle & Reath LLP

Kevin Fu

Acting Director, Medical Device Cybersecurity, FDA Center for Devices and Radiological Health

Call for Speakers is Now Open!

Interested in addressing ISMG’s global audience of cybersecurity, information security, fraud, risk and compliance professionals?

Click here to learn more!

Agenda / Schedule in Central Time



  • Tuesday, October 13th

  • Hall A
  • Hall B
  • Hall C
  • Hall D
9:00 am -
9:30 am
9:00 am - 9:30 am

Registration & Exhibit Browsing

9:30 am -
10:00 am
9:30 am - 10:00 am

Election Cybersecurity 2020

Speaker:
Christopher Krebs, Director of Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security

In terms of election cybersecurity, is the U.S. better off in 2020 than it was in 2016? Christopher Krebs, Director of the Cybersecurity and Infrastructure Security Agency, answers this question and more in an exclusive keynote that tackles:
  • The state of election security
  • Myths and realities about foreign influence
  • What has been done to ensure election resiliency
10:00 am -
10:30 am
10:00 am - 10:30 am

2021: The Cybersecurity Legal and Compliance Outlook

Speakers:
David Ogbolumani, Chief CyberSecurity & Privacy Officer, IT Security Consultants; former CISO, Kellogg Company
Kristin Judge, CEO, Cybercrime Support Network
Sadia Mirza, Attorney, Cybersecurity, Information Governance and Privacy Practice Group, Troutman Pepper

At the start of 2020, the legal and compliance communities were focused on the enactment of CCPA and other global privacy initiatives. A worldwide pandemic later, and the focus is on business resiliency, insider risk and visibility into a new army of endpoint devices. Many enterprises accepted new risk to deploy their remote workforces, and now those risks are coming due.

Join these seasoned cybersecurity attorneys and industry analysts for an interactive discussion of legal trends and potential traps, including:

  • Business resiliency "gotchas"
  • The "perfect storm" for insider risk and fraud
  • Regulatory expectations that haven't gone away
10:30 am -
11:00 am
10:30 am - 11:00 am Track A

5 Critical Steps to Mitigating a Data Breach

Speaker:
Mitch Rosen, Principal Solutions Engineer, Keeper Security

10:30 am - 11:00 am Track B

Insider Threat: How to Mitigate the Heightened Risk

Speaker:
Randy Trzeciak, Director, CERT Insider Threat Center, CMU

A remote workforce. Economic stress. Pandemic fatigue. These ingredients create a "perfect storm" for insider risk, whether through malicious acts or accident. What can you do to improve monitoring and mitigation of insider risk in these unique conditions?

Randy Trzeciak, director of the CERT Insider Threat Center at Carnegie Mellon University, is one of the world's leading authorities on preventing, detecting, and responding to insider incidents. In this exclusive session, he details:

  • The latest research on insider incidents
  • Unique risks created within today's remote workforce
  • How to mitigate the risks posed by malicious and unintentional insider threats
10:30 am - 11:00 am Track C

Open Security - From Patchwork to Platform

Speaker:
Patrick Vowles, Team Lead - North America Marketing, IBM Security

As organization adopt new technologies and utilize the cloud for business innovation and growth, security teams are challenged with ensuring that those initiatives and missions are successful. To do that they are faced with creating an effective security program from a fragmented patchwork of solutions and data sources that really don't interoperate very well without a great deal of development work.

Join us to hear how a number of leading vendors are coming together with the intent of creating an open source platform to allow security solutions to communicate over a standard fabric during the entire threat management life cycle, from threat hunting, analytics and detection through to incident response and orchestration.

11:00 am -
11:30 am
11:00 am - 11:30 am Track A

How to Think Like a Cybercriminal (so you can outsmart them)

Speaker:
Ryan Poppa, Director of Product Management at Cisco Cloud Security

How well do you really know your environment, your security practices and policies? Do you know the tools, techniques, and procedures that cyberattackers use to exploit your vulnerabilities?

Join Cisco Umbrella cybersecurity expert Ryan Poppa exposes the inner workings of a crafty cyberattack.

In his presentation, you'll learn:

  • Why you have been targeted for attack
  • How cybercriminals penetrate environments
  • What tactics they use to pivot from system-to-system while escalating privileges along the way
  • How they are capable of easily exfiltrating sensitive data out of your organization
  • Where your biggest threats may exist

Ryan will also share key insights on how you can protect your organization against these malicious actors and improve your cybersecurity posture with immediate results.

11:00 am - 11:30 am Track B

Anatomy of a Cloud Breach

Speaker:
Jeremy Snyder, Senior Director of Business Development and Solutions Engineering, DivvyCloud by Rapid7

In this presentation, we'll explain why cloud security is fundamentally different from traditional data center environments. We'll explore the top services and errors that have led to large-scale data breaches in the past several years, discuss ways to prevent future breaches, and review a few case studies of prominent breaches.
11:30 am -
11:45 am
11:30 am - 11:45 am Track A

Securing the Future of Work

Speaker:
Justin Fier, Director of Cyber Intelligence and Analytics, Darktrace

Though parts of the world are slowly transitioning back to 'normal', cyber-attackers have not slowed down and may even be waiting to take advantage of new business challenges.

Join, Justin Fier - Director of Cyber Intelligence & Analytics, as he discusses how traditional cyber security tools are ill-equipped to protect today's dynamic workforce. There will also be focus on the future of remote working as organizations find themselves balancing technological advancement and the unforeseen risks that this brings.

Don't miss this 20-minute webinar to discover how Cyber AI:

  • Autonomously detects and responds to cyber-attacks in the first instance and before damage is done
  • Thwarted a Covid-19 email impersonating the CEO of an electricity distributor
  • Neutralized a SaaS takeover at a Panamanian bank
11:30 am - 11:45 am Track B

An Integrated Approach to Embedding Security Into DevOps

Speaker:
Matt Rose, Global Director Application Security Strategy, Checkmarx

11:45 am -
12:00 pm
11:45 am - 12:00 pm

Exhibit, Resource Center & Networking Break

12:00 pm -
12:30 pm
12:00 pm - 12:30 pm Track A

Indicators of Behavior: The New Way to Detect Advanced Attacks

Speaker:
Sam Curry, Chief Security Officer, Cybereason

With increased complexity of cyber attacks, comes the need for increased complexity of investigative techniques. Indicators of compromise - hashes, URLs and other crime scene artifacts - are becoming less useful in investigations. We must make a strategic shift towards cataloging indicators of behavior - what people, applications and systems are doing that could indicate an attack is ongoing or imminent? Join us to discuss what tools, skills, and language we must develop to make this shift.
12:00 pm - 12:30 pm Track B

Defending Your APIs Against Industrialized Cybercrime

Speaker:
Ameya Talwalkar, Co-Founder and Chief Product Officer, Cequence Security

With APIs pervasive across your organization, powering apps, and enabling digital transformation, you need to consider whether your existing infrastructure and security tools can identify security gaps before they become incidents and if they can withstand an industrialized attack. API coding errors and malicious bots are a significant cause of fraud and theft-related revenue losses, infrastructure overspending, poor customer experience, and brand damage.

In this talk, we'll explore several case studies of API attacks and techniques and discuss what's needed to protect your applications and your business from suffering damages.

Key takeaways

  • How attackers are evolving to bypass detection
  • How cybercriminals beat traditional approaches
  • How Machine Learning and AI can provide help detect and defend against malicious bots
  • Why an end-to-end API security strategy is imperative to making your apps less attractive to criminals
  • 12:30 pm -
    12:45 pm
    12:30 pm - 12:45 pm Track A

    Drivers for Adopting a SASE Architecture

    Speaker:
    Derek Gabbard, Field CTO, Fortinet

    With cloud adoption and changing remote workforce strategies driving network and security teams to consider ways to modernize their infrastructure, many are turning to a Secure Access Service Edge (SASE) as a strategy to deliver consistent security experiences across the enterprise. In this session, we'll look at the top 3 drivers leading these teams to consider and adopt this SASE approach.
    12:30 pm - 12:45 pm Track B

    Two products don't make a platform, and why Cisco SecureX is different.

    Speaker:
    Sana Yousuf, Manager, Platform Solution Marketing, Cisco Systems, Inc.

    Security teams are burdened by choice in a security marketplace that's rife with incompatibility. Organizations find themselves on an endless treadmill of trying to integrate patchwork coverage from an industry supersaturated with point solutions. This approach to security is unsustainable. Security teams simply don't have the time, budget, talent pool, or even the right tools, to maximize efficiency and productivity. As businesses continue to evolve through technology, these shortcomings will only become more severe. You need meaningful visibility and automation to unify your security infrastructure and realize desired outcomes while lowering overhead. That's why Cisco reimagined security with Cisco SecureX -- a cloud-native, built-in platform experience within our portfolio that connects to your infrastructure. It is integrated and open for simplicity, unified in one location for visibility, and maximizes operational efficiency to secure your network, users and endpoints, cloud edge, and applications. Don't get stuck in a vicious cycle. Eliminate complexity, optimize your security experience, and save you time with Cisco SecureX.
    12:45 pm -
    1:15 pm
    12:45 pm - 1:15 pm

    CISO's Perspective: Adapt and Secure

    Speakers:
    Mike Huckaby, VP, Worldwide Sales Engineering, Gigamon
    Timothy Rohrbaugh, CISO, JetBlue Airways
    Tomas Maldonado, CISO, NFL

    2020 has brought seismic change to all sectors, and cybersecurity leaders have been in the driver's seat in helping their enterprises adapt. Join this exclusive panel for unique insight into:
    • How to respond when your business faces historic transformation;
    • Challenges posed by new threats, endpoint security challenges and expanded reliance on the cloud;
    • How to strategize and budget for ongoing challenges in 2021.
    1:15 pm -
    1:30 pm
    1:15 pm - 1:30 pm

    Exhibit, Resource Center & Networking Break

    1:30 pm -
    2:00 pm
    1:30 pm - 2:00 pm

    CISO Meets CPO: The Healthy Tension

    Speakers:
    Katherine Licup, Chief Privacy Officer, Archer Daniels Midland Company
    Tom Dager, CISO, Archer Daniels Midland Company

    In the age of digital transformation, new privacy legislation and a greater emphasis on both security and privacy by design, security and privacy leaders are forced into a whole new level of collaboration. There can be natural tension between the disciplines, but it can be healthy tension.

    In this exclusive panel discussion, ADM CISO Tom Dager and CPO Katie Licup talk about their roles and how they are helping their global enterprise tackle:

    • Incident management
    • Third-party risk
    • New security and privacy concerns raised by COVID-19
    2:00 pm -
    2:30 pm
    2:00 pm - 2:30 pm

    Redefining Mobile Security (and Why it Works)

    Speaker:
    Mike Burr, Lead Android Enterprise Security Evangelist, Google

    Google's Android is the most popular mobile operating system in the world, powering over 2.5 billion devices.

    In this exclusive session, Mike Burr of Google outlines Android's multi-layered security strategy, which includes hardware and software protections, as well as utilizing the power of machine-learning that helps protect devices at the application layer.

    Learn how Android has proved that open doesn't mean unsecure, with third party validation determining that the Android platform provides the most robust security features available to enterprise.

    2:30 pm -
    5:00 pm
    2:30 pm - 5:00 pm

    Exhibit Browsing & On-Demand Viewing

    View Schedule

    SPONSORS / Supporting Organizations

    Cequence Security
    Cisco Systems
    Cybereason
    Darktrace
    DivvyCloud
    Fortinet
    Gigamon
    IBM
    Keeper Security
    Okta

    Meet Our Speakers

    ISMG Global Events: 2020 and Beyond

    ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

    The Critical Importance of Data Integrity

    Microsoft's Diana Kelley on How to Keep Data Untampered

    Steve Katz on Cybersecurity’s State of the Union

    World's First CISO Weighs in on the Technologies and Trends Shaping 2019

    The Challenge of Fighting Identity Fraud

    IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

    A Common Sense Guide to Mitigating Insider Threats

    Randy Trzeciak of CERT Reviews the Latest Research

    LOCATION / Venue & Address

    Chicago city

    Virtual Summit

    Register and attend online.

    Live presentations, speaker Q&A, and Expo Hall demos will all be held on our virtual platform.

    Join the ISMG Community

    To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.

    Become a Member

    Registering For a Group?
    Call + 1 (609)-356-1499  or email at events@ismg.io

    Contact Us

    Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

    +1 (609) 356-1499
    events@ismg.io

    Join the Community

    Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

      • BankInfoSecurity
      • CUInfoSecurity
      • GovInfoSecurity
      • HealthcareInfoSecurity
      • InfoRiskToday
      • CareersInfoSecurity
      • DataBreachToday
      • CyberEd
      Home | Summits | Press Releases | Sponsorship
      © 2021 Information Security Media Group, Corp. |
      Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data