Enterprise Lockdown

Virtual Security Events

SecurityWeek’s Enterprise Lockdown is a virtual conference that will allow attendees from around the world to immerse themselves in a virtual world to learn about and discuss the latest trends and insights on information security and emerging cyber threats faced by modern enterprises.

Agenda is on the Eastern Time Zone (EST)

 

Will Lin, Partner and Co-Founder of ForgePoint Capital, has a "fireside" chat with Ryan Naraine, Director of Security Strategy at Intel.

There’s a virtual tidal wave of smart, connected devices sweeping across businesses in every industry. These new devices include everything from industrial control systems and PLCs, to medical devices, to smart TVs, security cameras, digital assistants, printers, HVAC systems, and more. Can you see them? Can you protect them? Do you know how they are behaving? What services are they connecting to? What risks they pose to your environment? And most importantly, how do you stop bad things from happening? Join us as we explore the growth of unmanaged, un-agentable devices, including examples of real-world attacks, and issues you should consider to help fill the gaps left by traditional security architectures.

Morning break, please visit Enterprise Lockdown sponsor in the exhibit hall.

If there is anything certain about uncertain times, it is that it separates those who are prepared from those who aren’t. We learned that lesson recently as many of us started working from home practically overnight. The pandemic acted as a forceful accelerant for remote workforces and laid bare the issues with legacy IT architectures and cybersecurity approaches. Many businesses became acutely aware of the consequences, while those with modern architectures were able to rapidly and securely adapt to life with a remote workforce.

Join us for a thoughtful discussion on lessons learned and new identity-centric approaches to securing the modern enterprise.

During this Panel Discussion Tom Jermoluk, CEO of Beyond Identity, will introduce the topic and moderate a top-notch panel including:

• Jarrod Benson, Global CISO at Koch Industries and CIO at Koch Business Solutions, on four foundational principles of modern IT architectures, implications for security, and the role of the modern identity-based perimeter.
• Dr. Taher Elgamal, the Father of SSL, on the history of the “chain of trust” and how it can be applied for modern identity management.
• Jasson Casey, CTO, Beyond Identity, on how passwordless identity management enables scalable authentication and risk-based authorization for organizations transitioning to a modern identity architecture and a Zero Trust model.

Global disruption has taught us that the only thing that is certain, is things will remain uncertain – and that business leaders need to remain confident that their operations can continue securely in the face of global or even regional events. Though parts of the world are re-opening, attackers have not slowed down and may be even lying in wait to take advantage of the next disruption.

Traditional, static, legacy approaches to security consistently prove both unintelligent and ill-equipped to adapt. Organizations often find themselves undergoing a delicate balancing act—each new work practice and technology that is needed to adapt, evolve, or even grow also brings unforeseen risk.

This session will explore how Cyber AI allows organizations to achieve much-needed adaptability and resilience, ensuring both seamless transition and the ability to disrupt attacks in the earliest moments. In the face of an uncertain present and future, Cyber AI enables businesses to continue communicating, operating, and innovating.

This session will outline ways to detect, capture, and reconstruct the technical artifacts obtained from incoming cyber attacks for the purpose of launching counterattacks to mitigate the malicious activity - or more simply, we talk about how to attack the attacker with their own weapons and take over botnets.

The outbreak of a particular malware strain was making its way across exposed Android devices all throughout the global internet throughout all of 2018 and 2019, exploiting misconfigurations within Android operating systems and converting the hacked devices into cryptocurrency mining slaves. The experience yielded insight and clues as to the monetization pathways of autopropagating cryptocurrency mining malware, as well as the technical conditions that enable them, and the potential for future evolutions of similar campaigns. The presentation will go over methods that our team used for the collection of attack data, discovery of anomalies, use of visualizations for rapid identification of unreported exploits, and the audience will leave with all the information needed to be able to replicate the experiment and obtain their own unique results.

Learn how a Fortune 500 third-party risk team in the finance sector gained continuous visibility into the cybersecurity posture of its critical vendors to risk-prioritize its remediation process and how they achieved massive-scale risk reduction with automated, objective and contextual assessment with RiskRecon.

Join this distinguished panel of CISOs and decision makers as they discuss trends in cybersecurity problem solving, the breakneck speed of digital transformation, and the areas that are ripe for investments and innovation.

What is your third-party risk exposure today? Is your third-party risk exposure getting better or worse? Join us as we seek to provide your organization with the best way to answer these questions and discuss how you can use data to understand and act on third-party risk in your environment. The session will focus on modern cyber risk mitigation techniques & the new challenges / realities of data management in today’s remote world.

Director of Security Innovation and Remediation (Office of the CISO) at IBM
At IBM, Christopher works in the Office of the CISO as the Director of Security Innovation and is responsible for enhancing IBM’s security posture.
VP of Product Management & Product Strategy
Kelly is known for presenting at technology conferences internationally, including Black Hat USA and O'Reilly Velocity Conference
CISO, Very Good Security
Kathy Wang is CISO at Very Good Security, and is a recognized thought-leader in information security with a strong background in research and security leadership.
CISO-in-Residence, YL Ventures
Sounil Yu is CISO-in-Residence at YL Ventures and was previously the Chief Security Scientist at Bank of America.
Director of Strategic Threat, Darktrace
Marcus Fowler spent 15 years at the Central Intelligence Agency developing global cyber operations and technical strategies, until joining Darktrace in 2019.
Chief Research & Development Officer at SecurityScorecard
Alexander Heid serves as Chief Research & Development Officer at SecurityScorecard.
Tom Jermoluk, Beyond Identity
CEO and Co-Founder, Beyond Identity
Tom Jermoluk is CEO of Beyond Identity
Director, Security Strategy at Intel Corp.
Ryan Naraine works on security strategy at Intel Corp.
CTO, Security at Salesforce and "Father" of SSL
CTO, Security at Salesforce and considered the "father" of SSL
Chris Dobrec
VP of Product Marketing, Armis
Chris Dobrec is Vice President, Product Marketing at Armis, an agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices.
Jasson Casey, CTO, Beyond Identity
CTO, Beyond Identity
Jasson Casey is Chief Technology Officer (CTO) at Beyond Identity
Jarrod Benson, CISO at Koch Industries
Global CISO, Koch Industries
Jarrod Benson is Global CISO at Koch Industries and CIO for Koch Business Solutions, LP.

Diamond Sponsor

Platinum Sponsor

Gold Sponsors





Event Details
Sponsors