ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Virtual Cybersecurity Summit: Breach Prevention

July 21-23, 2020

View More Events

WELCOME / Summit Overview

With enterprises globally now supporting a 100% remote workforce and customer base, global organizations may be forever changed. Even the most forward-looking organizations face added breach risk in these extraordinary times. Layers of security are rendered useless if your new remote workforce, or vulnerabilities in their devices and networks, inadvertently give permission for threat actors to access your data.

Join experts in the field at our virtual summit to learn how to best adapt and balance productivity, accessibility and security.

Details

Free Registration

Same agenda:
July 21st, 22nd, & 23rd

Registering For a Group?
Call + 1 (609)-356-1499

   Members of the ISMG Community

  • Event Gallery

Eugene Liderman

Director of Mobile Security Strategy, Google

Rohit Ghai

President, RSA

Sam Curry

Chief Security Officer, Cybereason

Tom Field

SVP - Editorial, ISMG

Michael Chertoff

Executive Chairman, The Chertoff Group

Gen. Keith Alexander (retired)

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe

Art Coviello

former CEO, RSA Security; Venture Partner, Rally Ventures

Speakers / featured Breach speakers

Elvis Chan

Supervisory Special Agent, San Francisco Division, FBI

Brian Harrell

Assistant Director for Infrastructure Security, U.S. Cybersecurity and Infrastructure Security Agency

Randy Trzeciak

Director, CERT Insider Threat Center, CMU

Ronald Raether

Partner, Partner at Troutman Pepper

Rebecca Wynn

Global CISO & Chief Privacy Officer, [24]7.ai

Stephen Fridakis

Technical Program Manager, Security - M&A, Google

Spencer Lichtenstein

Product & Go-to-Market Strategist, RSA

Andy Skrei

VP of Worldwide Sales Engineering, Exabeam

Jony Fischbein

CISO, Check Point

Randy Sabett

Special Counsel, Cyber/Data/Privacy Practice Group, Cooley LLP

Gerald Beuchelt

CISO, LogMeIn, LastPass Enterprise

Steve Porcello

Senior Security Engineer, Gigamon

Draft Agenda / Session Date & Times



  • Tuesday, July 21st

  • Wednesday, July 22nd

  • Thursday, July 23rd

  • Hall A
  • Hall B
  • Hall C
  • Hall D
9:00 am -
9:30 am
9:00 am - 9:30 am

Registration & Exhibit Browsing

9:30 am -
10:00 am
9:30 am - 10:00 am

The Challenges of Securing Critical Infrastructure in the Private Sector

Speaker:
Brian Harrell, Assistant Director for Infrastructure Security, U.S. Cybersecurity and Infrastructure Security Agency

Strong, reliable infrastructure is key to the nation's high standard of living, security, and strong economy. This includes systems like water and power, financial transactions, telecommunications, and so on. In short, critical infrastructure security and resilience is an integral to all of the systems that make our work and lives efficient, convenient and comfortable. Join us as Brian Harrell explores current and emerging threats and vulnerabilities in the critical infrastructure space as the cyber and physical worlds become more interconnected and interdependent, and learn about resources available through CISA to help build resilience to these threats.

10:00 am -
10:30 am
10:00 am - 10:30 am Track A

Reassessing Your Attack Surface Amidst a Shifting Dynamic Workforce

Speaker:
Spencer Lichtenstein, Product & Go-to-Market Strategist, RSA

RSA works with thousands of global enterprises to address digital risk transformation challenges and the evolving dynamic workforce. Over the past six months there has been tremendous change in the global workforce and IT environments. Join RSA in this session to hear insights learned from actual customers on the shifting attack surface amidst global business disruption and security insights on rapid enablement of a dynamic workforce. This session will cover:

  • Latest trends and threats in the age of a dynamic workforce
  • Examples of real-world threats
  • Mitigation steps and key threat detection and response components to reduce risks
10:00 am - 10:30 am Track B

Risk Management in Information Security: A Case Study in IAM

Speaker:
Gerald Beuchelt, CISO, LogMeIn

As IAM surges as a must-have for security programs and compliance alike, using a risk management approach to understand the inherent and residual risks of these solutions can help to better assess the impact on your organization's overall security posture.

Join Gerald Beuchelt, Chief Information Security Officer at LogMeIn, for insights and risk models of 3 case studies: Password Management, SSO with IDaaS, and SSO with MFA. This session will cover:

  • Leveraging risk management as a means to guide security activity and investment
  • Applying risk assessments to concrete examples in the IAM space
  • How you can benefit from outsourcing your password management to SaaS and enabling MFA and a centralized SSO
  • A forward-facing look of IAM technology and their associated risks
10:30 am -
11:00 am
10:30 am - 11:00 am

CISO Confidential: The Breach Prevention Panel

Speakers:
Jony Fischbein, CISO, Check Point
Rebecca Wynn, Global CISO & Chief Privacy Officer, [24]7.ai
Stephen Fridakis, Technical Program Manager, Security - M&A, Google

You have deployed the largest remote workforce ever, and your extended enterprise now sits square in the middle of the largest attack surface. How does this change the CISO's approach to breach prevention?

Join this exclusive panel of current and former CISOs for insight on:

  • Embracing the zero trust model;
  • The value of partnerships;
  • How to "mitigate the explosion" of multiple attack surfaces
11:00 am -
11:30 am
11:00 am - 11:30 am

Best Practices for Mitigating Insider (Cyber) Breaches

Speaker:
Randy Trzeciak, Director, CERT Insider Threat Center, CMU

The CERT Insider Threat Center at Carnegie Mellon University is one of the world's leading authorities on preventing, detecting, and responding to insider incidents, and it has released Version 6 of its Best practices to Mitigating Insider Threats. As part of this research, the center addresses how to detect and prevent insider incidents, including cyber breaches, as well as how to map inside threat programs to existing standards such as the NIST Cybersecurity Framework. Attend this session to learn:

  • The latest research on insider incidents
  • How "accidental insiders" are enabling harm to be realized by organizations
  • How to map your insider risk/threat program against industry standards, including the NIST Cybersecurity Framework
11:30 am -
11:45 am
11:30 am - 11:45 am

Exhibit & Networking Break

11:45 am -
12:15 pm
11:45 am - 12:15 pm Track A

SOC Automation: Faster Decision Making and Response

Speaker:
Andy Skrei, VP of Worldwide Sales Engineering, Exabeam

Security analysts spend two-thirds of their time on triage and investigation. Why then do most security operations teams only automate response? In this presentation, Andy Skrei will share his experience automating the end-to-end security workflow while leading security investigations at one of the world's largest online retailers and through working with many of the world's leading organizations while at Exabeam. Attendees will learn about:

  • The productivity benefits of automating the entire SOC lifecycle
  • Ways to reduce the time to answer critical questions
  • How automating triage and investigations leads to quick, accurate resolutions
11:45 am - 12:15 pm Track B

Completing Security Visibility with NDR

Speaker:
Steve Porcello, Senior Security Engineer, Gigamon

As SOCs have matured, they have employed a number of solutions to combat cybersecurity threats. Traditionally, SOCs have relied on SIEM and EDR tools for their detection and investigation needs. While these tools are critical to security operations, they have their visibility limitations. As such, modern security teams have turned to the network for added detection visibility. Network Detection and Response (NDR) solutions provide the necessary visibility not available in SIEM or EDR solutions, and help SOCs complete their security architecture. In this session we will discuss traditional security architectures and how they are being optimized using NDR into a modern security architecture.

12:15 pm -
12:45 pm
12:15 pm - 12:45 pm

Safeguarding the 2020 Elections: An FBI Perspective

Speaker:
Elvis Chan, Supervisory Special Agent, San Francisco Division, FBI

12:45 pm -
1:30 pm
12:45 pm - 1:30 pm

The Legal View of Response Plans, Tabletop Exercises and Preparing for the Unexpected

Speakers:
Randy Sabett, Special Counsel, Cyber/Data/Privacy Practice Group, Cooley LLP
Ronald Raether, Partner, Partner at Troutman Pepper

Few business continuity plans were truly prepared for the COVID-19 pandemic and the need to deploy and secure a near fully remote workforce. What other blind spots might there be in your be in your BCP, breach response and tabletop exercises? Join these seasoned cybersecurity attorneys for an interactive discussion of legal trends and potential traps, including:

  • What the best plans might overlook
  • The need for tabletop exercises - even virtually
  • Regulatory expectations that haven't gone away
1:30 pm -
2:00 pm
1:30 pm - 2:00 pm

Exhibit & Networking

View Schedule
  • Hall A
  • Hall B
  • Hall C
  • Hall D
12:00 pm -
12:30 pm
12:00 pm - 12:30 pm

Registration & Exhibit Browsing

12:30 pm -
1:00 pm
12:30 pm - 1:00 pm

The Challenges of Securing Critical Infrastructure in the Private Sector

Speaker:
Brian Harrell, Assistant Director for Infrastructure Security, U.S. Cybersecurity and Infrastructure Security Agency

Strong, reliable infrastructure is key to the nation's high standard of living, security, and strong economy. This includes systems like water and power, financial transactions, telecommunications, and so on. In short, critical infrastructure security and resilience is an integral to all of the systems that make our work and lives efficient, convenient and comfortable. Join us as Brian Harrell explores current and emerging threats and vulnerabilities in the critical infrastructure space as the cyber and physical worlds become more interconnected and interdependent, and learn about resources available through CISA to help build resilience to these threats.

1:00 pm -
1:30 pm
1:00 pm - 1:30 pm Track A

Reassessing Your Attack Surface Amidst a Shifting Dynamic Workforce

Speaker:
Spencer Lichtenstein, Product & Go-to-Market Strategist, RSA

RSA works with thousands of global enterprises to address digital risk transformation challenges and the evolving dynamic workforce. Over the past six months there has been tremendous change in the global workforce and IT environments. Join RSA in this session to hear insights learned from actual customers on the shifting attack surface amidst global business disruption and security insights on rapid enablement of a dynamic workforce. This session will cover:

  • Latest trends and threats in the age of a dynamic workforce
  • Examples of real-world threats
  • Mitigation steps and key threat detection and response components to reduce risks
1:00 pm - 1:30 pm Track B

Risk Management in Information Security: A Case Study in IAM

Speaker:
Gerald Beuchelt, CISO, LogMeIn

As IAM surges as a must-have for security programs and compliance alike, using a risk management approach to understand the inherent and residual risks of these solutions can help to better assess the impact on your organization's overall security posture.

Join Gerald Beuchelt, Chief Information Security Officer at LogMeIn, for insights and risk models of 3 case studies: Password Management, SSO with IDaaS, and SSO with MFA. This session will cover:

  • Leveraging risk management as a means to guide security activity and investment
  • Applying risk assessments to concrete examples in the IAM space
  • How you can benefit from outsourcing your password management to SaaS and enabling MFA and a centralized SSO
  • A forward-facing look of IAM technology and their associated risks
1:30 pm -
2:00 pm
1:30 pm - 2:00 pm

CISO Confidential: The Breach Prevention Panel

Speakers:
Jony Fischbein, CISO, Check Point
Rebecca Wynn, Global CISO & Chief Privacy Officer, [24]7.ai
Stephen Fridakis, Technical Program Manager, Security - M&A, Google

You have deployed the largest remote workforce ever, and your extended enterprise now sits square in the middle of the largest attack surface. How does this change the CISO's approach to breach prevention?

Join this exclusive panel of current and former CISOs for insight on:

  • Embracing the zero trust model;
  • The value of partnerships;
  • How to "mitigate the explosion" of multiple attack surfaces
2:00 pm -
2:30 pm
2:00 pm - 2:30 pm

Best Practices for Mitigating Insider (Cyber) Breaches

Speaker:
Randy Trzeciak, Director, CERT Insider Threat Center, CMU

The CERT Insider Threat Center at Carnegie Mellon University is one of the world's leading authorities on preventing, detecting, and responding to insider incidents, and it has released Version 6 of its Best practices to Mitigating Insider Threats. As part of this research, the center addresses how to detect and prevent insider incidents, including cyber breaches, as well as how to map inside threat programs to existing standards such as the NIST Cybersecurity Framework. Attend this session to learn:

  • The latest research on insider incidents
  • How "accidental insiders" are enabling harm to be realized by organizations
  • How to map your insider risk/threat program against industry standards, including the NIST Cybersecurity Framework
2:30 pm -
2:45 pm
2:30 pm - 2:45 pm

Exhibit & Networking Break

2:45 pm -
3:15 pm
2:45 pm - 3:15 pm Track A

SOC Automation: Faster Decision Making and Response

Speaker:
Andy Skrei, VP of Worldwide Sales Engineering, Exabeam

Security analysts spend two-thirds of their time on triage and investigation. Why then do most security operations teams only automate response? In this presentation, Andy Skrei will share his experience automating the end-to-end security workflow while leading security investigations at one of the world's largest online retailers and through working with many of the world's leading organizations while at Exabeam. Attendees will learn about:

  • The productivity benefits of automating the entire SOC lifecycle
  • Ways to reduce the time to answer critical questions
  • How automating triage and investigations leads to quick, accurate resolutions
2:45 pm - 3:15 pm Track B

Completing Security Visibility with NDR

Speaker:
Steve Porcello, Senior Security Engineer, Gigamon

As SOCs have matured, they have employed a number of solutions to combat cybersecurity threats. Traditionally, SOCs have relied on SIEM and EDR tools for their detection and investigation needs. While these tools are critical to security operations, they have their visibility limitations. As such, modern security teams have turned to the network for added detection visibility. Network Detection and Response (NDR) solutions provide the necessary visibility not available in SIEM or EDR solutions, and help SOCs complete their security architecture. In this session we will discuss traditional security architectures and how they are being optimized using NDR into a modern security architecture.

3:15 pm -
3:45 pm
3:15 pm - 3:45 pm

Safeguarding the 2020 Elections: An FBI Perspective

Speaker:
Elvis Chan, Supervisory Special Agent, San Francisco Division, FBI

3:45 pm -
4:30 pm
3:45 pm - 4:30 pm

The Legal View of Response Plans, Tabletop Exercises and Preparing for the Unexpected

Speakers:
Randy Sabett, Special Counsel, Cyber/Data/Privacy Practice Group, Cooley LLP
Ronald Raether, Partner, Partner at Troutman Pepper

Few business continuity plans were truly prepared for the COVID-19 pandemic and the need to deploy and secure a near fully remote workforce. What other blind spots might there be in your be in your BCP, breach response and tabletop exercises? Join these seasoned cybersecurity attorneys for an interactive discussion of legal trends and potential traps, including:

  • What the best plans might overlook
  • The need for tabletop exercises - even virtually
  • Regulatory expectations that haven't gone away
4:30 pm -
5:00 pm
4:30 pm - 5:00 pm

Expo Hall & Networking

View Schedule
  • Hall A
  • Hall B
  • Hall C
  • Hall D
12:00 pm -
12:30 pm
12:00 pm - 12:30 pm

Registration & Exhibit Browsing

12:30 pm -
1:00 pm
12:30 pm - 1:00 pm

The Challenges of Securing Critical Infrastructure in the Private Sector

Speaker:
Brian Harrell, Assistant Director for Infrastructure Security, U.S. Cybersecurity and Infrastructure Security Agency

Strong, reliable infrastructure is key to the nation's high standard of living, security, and strong economy. This includes systems like water and power, financial transactions, telecommunications, and so on. In short, critical infrastructure security and resilience is an integral to all of the systems that make our work and lives efficient, convenient and comfortable. Join us as Brian Harrell explores current and emerging threats and vulnerabilities in the critical infrastructure space as the cyber and physical worlds become more interconnected and interdependent, and learn about resources available through CISA to help build resilience to these threats.

1:00 pm -
1:30 pm
1:00 pm - 1:30 pm Track A

Reassessing Your Attack Surface Amidst a Shifting Dynamic Workforce

Speaker:
Spencer Lichtenstein, Product & Go-to-Market Strategist, RSA

RSA works with thousands of global enterprises to address digital risk transformation challenges and the evolving dynamic workforce. Over the past six months there has been tremendous change in the global workforce and IT environments. Join RSA in this session to hear insights learned from actual customers on the shifting attack surface amidst global business disruption and security insights on rapid enablement of a dynamic workforce. This session will cover:

  • Latest trends and threats in the age of a dynamic workforce
  • Examples of real-world threats
  • Mitigation steps and key threat detection and response components to reduce risks
1:00 pm - 1:30 pm Track B

Risk Management in Information Security: A Case Study in IAM

Speaker:
Gerald Beuchelt, CISO, LogMeIn

As IAM surges as a must-have for security programs and compliance alike, using a risk management approach to understand the inherent and residual risks of these solutions can help to better assess the impact on your organization's overall security posture.

Join Gerald Beuchelt, Chief Information Security Officer at LogMeIn, for insights and risk models of 3 case studies: Password Management, SSO with IDaaS, and SSO with MFA. This session will cover:

  • Leveraging risk management as a means to guide security activity and investment
  • Applying risk assessments to concrete examples in the IAM space
  • How you can benefit from outsourcing your password management to SaaS and enabling MFA and a centralized SSO
  • A forward-facing look of IAM technology and their associated risks
1:30 pm -
2:00 pm
1:30 pm - 2:00 pm

CISO Confidential: The Breach Prevention Panel

Speakers:
Jony Fischbein, CISO, Check Point
Rebecca Wynn, Global CISO & Chief Privacy Officer, [24]7.ai
Stephen Fridakis, Technical Program Manager, Security - M&A, Google

You have deployed the largest remote workforce ever, and your extended enterprise now sits square in the middle of the largest attack surface. How does this change the CISO's approach to breach prevention?

Join this exclusive panel of current and former CISOs for insight on:

  • Embracing the zero trust model;
  • The value of partnerships;
  • How to "mitigate the explosion" of multiple attack surfaces
2:00 pm -
2:30 pm
2:00 pm - 2:30 pm

Best Practices for Mitigating Insider (Cyber) Breaches

Speaker:
Randy Trzeciak, Director, CERT Insider Threat Center, CMU

The CERT Insider Threat Center at Carnegie Mellon University is one of the world's leading authorities on preventing, detecting, and responding to insider incidents, and it has released Version 6 of its Best practices to Mitigating Insider Threats. As part of this research, the center addresses how to detect and prevent insider incidents, including cyber breaches, as well as how to map inside threat programs to existing standards such as the NIST Cybersecurity Framework. Attend this session to learn:

  • The latest research on insider incidents
  • How "accidental insiders" are enabling harm to be realized by organizations
  • How to map your insider risk/threat program against industry standards, including the NIST Cybersecurity Framework
2:30 pm -
2:45 pm
2:30 pm - 2:45 pm

Exhibit & Networking Break

2:45 pm -
3:15 pm
2:45 pm - 3:15 pm Track A

SOC Automation: Faster Decision Making and Response

Speaker:
Andy Skrei, VP of Worldwide Sales Engineering, Exabeam

Security analysts spend two-thirds of their time on triage and investigation. Why then do most security operations teams only automate response? In this presentation, Andy Skrei will share his experience automating the end-to-end security workflow while leading security investigations at one of the world's largest online retailers and through working with many of the world's leading organizations while at Exabeam. Attendees will learn about:

  • The productivity benefits of automating the entire SOC lifecycle
  • Ways to reduce the time to answer critical questions
  • How automating triage and investigations leads to quick, accurate resolutions
2:45 pm - 3:15 pm Track B

Completing Security Visibility with NDR

Speaker:
Steve Porcello, Senior Security Engineer, Gigamon

As SOCs have matured, they have employed a number of solutions to combat cybersecurity threats. Traditionally, SOCs have relied on SIEM and EDR tools for their detection and investigation needs. While these tools are critical to security operations, they have their visibility limitations. As such, modern security teams have turned to the network for added detection visibility. Network Detection and Response (NDR) solutions provide the necessary visibility not available in SIEM or EDR solutions, and help SOCs complete their security architecture. In this session we will discuss traditional security architectures and how they are being optimized using NDR into a modern security architecture.

3:15 pm -
3:45 pm
3:15 pm - 3:45 pm

Safeguarding the 2020 Elections: An FBI Perspective

Speaker:
Elvis Chan, Supervisory Special Agent, San Francisco Division, FBI

3:45 pm -
4:30 pm
3:45 pm - 4:30 pm

The Legal View of Response Plans, Tabletop Exercises and Preparing for the Unexpected

Speakers:
Randy Sabett, Special Counsel, Cyber/Data/Privacy Practice Group, Cooley LLP
Ronald Raether, Partner, Partner at Troutman Pepper

Few business continuity plans were truly prepared for the COVID-19 pandemic and the need to deploy and secure a near fully remote workforce. What other blind spots might there be in your be in your BCP, breach response and tabletop exercises? Join these seasoned cybersecurity attorneys for an interactive discussion of legal trends and potential traps, including:

  • What the best plans might overlook
  • The need for tabletop exercises - even virtually
  • Regulatory expectations that haven't gone away
4:30 pm -
5:00 pm
4:30 pm - 5:00 pm

Expo Hall & Networking

View Schedule

SPONSORS / Supporting Organizations

Check Point
exabeam
Gigamon
LastPass
RSA

Meet Our Speakers

ISMG Global Events: 2020 and Beyond

ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

The Critical Importance of Data Integrity

Microsoft's Diana Kelley on How to Keep Data Untampered

Steve Katz on Cybersecurity’s State of the Union

World's First CISO Weighs in on the Technologies and Trends Shaping 2019

The Challenge of Fighting Identity Fraud

IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

A Common Sense Guide to Mitigating Insider Threats

Randy Trzeciak of CERT Reviews the Latest Research

LOCATION / Venue & Address

Virtual Summit

Register and attend online.

Live presentations, speaker Q&A, and Expo Hall demos will all be held on our virtual platform.

Register Today

To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.

Registering For a Group?
Call + 1 (609)-356-1499  or email at events@ismgcorp.com

Contact Us

Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

+1 (609) 356-1499
events@ismg.io

Join the Community

Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

    • BankInfoSecurity
    • CUInfoSecurity
    • GovInfoSecurity
    • HealthcareInfoSecurity
    • InfoRiskToday
    • CareersInfoSecurity
    • DataBreachToday
    • CyberEd
    Home | Summits | Press Releases | Sponsorship
    © 2021 Information Security Media Group, Corp. |
    Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data