Central IT & Security Leaders Content Week Agenda

Cybersecurity is a priority for businesses in every sector, but budget constraints and the shortage of talent make it challenging for organizations to maintain a consistent and proactive security posture. Vendor security patching, which requires regression testing and system downtime, is both labor and time-intensive, sometimes forcing companies to delay patching. This can leave them exposed or behind schedule in implementing their own best practices or software security guidelines.

Learn how companies have solved for these budget and resource constraints and deployed a holistic, layered security model across the enterprise, providing actionable security intelligence designed to reduce potential exposure.

Anne Plese, Sr. Director Product Marketing, Rimini Street

Gabe Dimeglio, VP Global Security Services, Rimini Street

As ransomware continues to spiral out of control and other threats abound, there is a need for a better way to optimize our security controls, incident response plans, and people to prevent them. In this session we will look at how to easily adopt an offensive cybersecurity strategy by incorporating Breach Attack Simulation and Purple/Automated Red Teaming to better prepare, defend ourselves; and if breached recover in a more graceful way. 

Attend this session to learn: 

  • What enterprise changes and attackers’ best practices renders traditional methods ineffective. 
  • What are the elements of successful Breach Attack Simulation and Purple/Automated Red Teaming and how they help enterprises in optimizing their security controls, incident response plans, and their employee’s skill sets? 
  • Real-world enterprise case-studies.

Dave Klein, Director, Cyber Evangelist, Cymulate

The past year has brought into stark relief the need for organizations to have strong, cloud-based security and compliance policies. As companies engage in swift digital transformation, cybersecurity now plays a much larger role and requires us to change how we have operated in the past. Stitched-together security stacks that collect data in fragments, cannot scale, and do not interoperate are no longer viable options. Instead, security teams need an end-to-end cloud platform that gives them visibility across all their IT assets no matter where they are along with automated threat prioritization, patching and response capabilities. Given the severity of today’s threats, a full cloud platform will also need to do these things continuously, even across third-party cloud platforms, so your team can always assess the organization’s global IT, security, and compliance posture. Join our conversation as we discuss the challenges our security platforms face as well as best practices for building a next-generation cloud platform that collects and analyzes telemetry data in real time for continuous threat response.

Jeremy Briglia, Director, Pre-Sales Field Operations West, Qualys

There has been tremendous attention given to recent large-scale attacks and why they have been so challenging to avoid, detect, and remediate. When attackers evade the first line of network defense, having secondary controls to fill in the gaps is crucial in detecting adversaries who can break free to infiltrate the network. This session will focus on the Achilles heel of businesses related to closing the gap between endpoint and identity protection. 

Join to learn how security teams can: 

  • Anticipate methods an attacker will use to break out from an infected endpoint and ambush their every move. 
  •  Quickly uncover credential and Active Directory (AD) access weaknesses before attackers can leverage them to exploit AD or advance their attack. 
  • Detect an adversary who looks and acts like a member of the organization and is moving in operation blind spots. 
  •  Bolster endpoint threat detection with early alerting and derailment of privilege escalation activities (credential theft, traversing mapped shares, and AD attacks). 
  • Gather actional threat intelligence and simplify remediation. 

We will also share how innovations in Active Directory vulnerability assessment and live attack detection are doing what security information and event management (SIEM) and log management have never been able to do. Join this session to learn how.

Tony Cole, CTO, Attivo

For a long time, we had been expecting changes in our working environments – but nobody expected 2020. What started as a steady shift to remote/flex working suddenly had to change overnight. This change was in progress and unavoidable, pandemic or not. The exorbitant price increase of metropolitan cities, worldwide rivalry for talent, progress in cloud innovation, and Millenial/Gen Z workforces are just a few of the factors that move us towards a workforce with more freedom and flexibility, a new framework being called Dynamic Work.

Join us as we discuss:

  1. Redesigning and rethinking the traditional workplace
  2. Getting technology infrastructure right
  3. Cultivating a great company culture
Make sure you sign up early! This intimate roundtable session will be capped at 50 participants.

Organizations have been moving to the cloud for several years now, but in the last year, our world has forced nearly everyone to leverage the scalability and speed of cloud platforms to support a remote workforce. With so many critical business functions running from these providers, it’s imperative to protect our data, systems and assets. But traditional strategies struggle to keep up with the scope and scale of the modern cloud environment, which is forcing a change in how we approach our security assessments and mitigation techniques. In this presentation, we’ll discuss the benefits and challenges presented to many organizations by the sudden move to cloud-based services and a newly remote workforce focused on business continuity, not security. We’ll also talk about some of the new ways we must evolve how we approach security and our internal programs to better align with the fast-paced and ever-changing nature of cloud services and assets and protect our organizations effectively, efficiently and at the speed required by today’s modern attack surface.

Nathan Wenzler, Technical Security Director, Tenable