Cyber Resilience in 2024:

Availability is Your Best Ability

May 2, 2024
11:00am -5:00pm ET | Doors Open at 10:30am ET

While there are plentiful options in cyber resiliency and business continuity tools and platforms, there isn’t one that can knock out everything from sudden cloud outages to prolonged ransomware attacks in a single punch. What can you do to keep the company on its feet no matter what is thrown at it? Here’s what you need to consider to dodge the marketing buzz and bounce back from anything.

Topics Include:
Business resiliency and overcoming obstacles
Key preparations to make now before ransomware attacks
How to be prepared for DDoS attacks
Agenda
Keynote
11:00am – 11:45am ET

Enterprises’ Biggest Obstacles to Maintaining Cyber Resiliency in 2024

Sponsored by: Google Cloud Security
Moderated by: Steven Hill, Independent Analyst, Data Center Technologies, ToneCurve Technology, LLC

Some obstacles linger from year to year, others are brand new, but your company needs to be able to resist and recover from them all. While business resiliency has never been an easy exercise, at least the path forward is clearer if you can see what lies ahead. Here are the biggest obstacles you’ll encounter this year and a few insights on how you might overcome them.

Fireside Chat
11:45am – 12:00pm ET

Keynote
12:15pm – 1:00pm ET

How to Respond to a Ransomware Attack: Preparations to Do Today

Moderated by: Steven Hill, Independent Analyst, Data Center Technologies, ToneCurve Technology, LLC

Responding to a ransomware attack entails more than deciding whether to pay the ransom or not. There are regulations on disclosures and required notifications, cyber insurance steps to be followed to make a claim, and backup and resiliency plans to put into play immediately. It’s hard to cover all the bases – and each in the right order – in the heat of the moment. Learn what key preparations to make now, before an attack, so you’ll be ready to respond effectively if your business is suddenly locked down.

Fireside Chat
1:00pm – 1:15pm ET

Premier Session
1:30pm - 2:00pm ET

Securing the Software Supply Chain: Ransomware Threats & Mitigation

Sponsored by: JFrog Inc

Ransomware attacks underscore the weaknesses in software supply chains and security protocols, requiring proactive and reactive measures. This session addresses bolstering software supply chain reliability and improving software security to prevent such attacks. We’ll delve into a comprehensive strategy that includes:

  • Key Strategies: Explore secure coding practices, assess vulnerability risks, and implement secure development lifecycles to build resilience against ransomware attacks.
  • Active Protection: Understand how to safeguard your software supply chain effectively, reducing the risk of exploiting your software in a ransomware attack.
  • Leveraging Modern Tools: Utilize the latest tools and techniques to maintain agility and scale in your software delivery, ensuring your defenses are as advanced as the threats they aim to counter.
Premier Session
1:30pm - 2:00pm ET

Sponsored by: Cisco Panoptica
Premier Session
2:15pm - 2:45pm ET

Dynamic Defense: Predictive Cyber Risk Management

Sponsored by: LogicGate, Inc.

Advancements in data aggregation, real-time monitoring, and artificial intelligence have unlocked a new era of cyber risk management. Join Nick Kathmann, CISO at LogicGate, for an exploration of the possible as cyber risk management continues its evolution from manual and reactive to dynamic and predictive. Nick will discuss:

  • The importance of integrating cyber, risk, and compliance teams and technologies for near-real-time visibility and monitoring of critical risks at scale.
  • Practical examples how risk intelligence can inform important decisions around resource allocation, prioritization, and mitigation.
  • Steps you can take today on your own path to dynamic risk management.
Premier Session
2:15pm - 2:45pm ET

React, Respond, Recover: Eight Steps to Become Cyber Resilient.

Sponsored by: 11:11 Systems

Cybercrime and ransomware are at epidemic levels. They are so commonplace, they’re the number one reason for an IT outage. Government agencies are responding by putting regulations in place to combat threats. This is why you need a strategy now to address proactive approaches to prevent ransomware and reactive controls to recover if a cyberattack is successful.

What does it take to be truly cyber resilient? During our presentation, we’ll outline eight steps to take. Plus, we’ll also discuss:

  • How to create a strategy to prevent, respond, and recover from cyber attacks
  • Why a truly comprehensive program includes more than just technology solutions
  • What industry standards for technology, simulation/testing, and cyber specific programs you need to implement
  • How 11:11 Systems can help you take the first steps – and help in every step toward cyber resilience
Spotlight Webinar
3:00pm - 3:30pm ET

Sponsored by: Google Cloud Security
Spotlight Webinar
3:30pm - 4:00pm ET

Panel
4:15pm - 5:00pm ET

DDoS: Guide to Redundancy and Response

Moderated by: Steven Hill Independent Analyst, Data Center Technologies, ToneCurve Technology, LLC

DDoS attacks continue to be a challenge for enterprises. Any downtime can be costly and highly damaging for your company. Repeated attacks over time can be even more so. Panelists discuss the pros and cons of available options and what you can do now to prepare for the inevitable and bounce back faster.

Demo
All Day

Why Data Security is the Foundation for Your Security Posture

Sponsored by: Rubrik, Inc.
Presented by: Atul Ashok, Sr. Product Marketing Manager - Data Security, Rubrik
Cyber Resilience in 2024: Availability is Your Best Ability
May 2, 2024
11:00am -5:00pm ET | Doors Open at 10:30am ET

Speakers
Atul Ashok
Sr. Product Marketing Manager – Data Security, Rubrik
As an engineer turned product marketer, I enjoy identifying and solving customer pain points by working closely with Product Management, Sales, Engineering, and Customer Success teams. My expertise lies in highlighting a product's strengths in a simple and concise manner.
Cassandra Mack
Head of Security and GRC, CISO, Spekit
Cassandra Mack is a highly adaptable Technology program leader and a certified CISO with over 25 years of experience in delivering technology solutions that align with the needs of the business. Cassandra is also a skilled digital transformation leader, Consultant, and Trusted Advisor.
Jim Jones
Senior Product Infrastructure Architect, 11:11 Systems
Jim has over 20 years of experience both as a Systems Administrator in SMB and Enterprise organizations as well as an architect for service providers, specializing in virtualization and disaster recovery capabilities. Holding technical certification from vendors such as Cisco Systems, Veeam and VMware.
Nicholas Kathmann
Chief Information Security Officer, LogicGate
Nicholas Kathmann brings a strong track record of delivering innovative security solutions for small to medium-sized businesses and Fortune 100 enterprises. Before LogicGate, Kathmann served as director of cybersecurity at Dell Technologies, overseeing the internal cybersecurity program as well as leading the MSSP practice.
Paul Davis
Field CISO, JFrog
A former CISO himself, Paul is a strategic security professional whose expertise lies in collaborating with CIOs and CISOs to promote best practices for adopting software supply chain systems and platforms. He is a trusted advisor who offers expertise and guidance on cybersecurity challenges and solutions.
Christopher Carter
Cyber Advisor and CIO, Crucial Cyber
Former government CIO and expert Cyber Advisor with Crucial Cyber, he is a technology leader practiced at recognizing emergent patterns, creating vision-driven strategies, improving security posture and defense, and making orchestrated sense out of complexity. With a doctorate in Information Assurance, he is an insightful strategist and mentor.
Nia Luckey
Technology and Transformation Expert Strategist, Infosys
From artificial intelligence (AI) automation, CIO and CISO advisory services, and technology and transformation, Nia has been a seasoned cybersecurity expert at the forefront of driving transformative initiatives for nearly a decade. She has consistently demonstrated expertise in integrating advanced cybersecurity solutions and more.
Cory Wolff, CISSP OSCP
Director, Offensive Security at risk3sixty
With over 20 years of experience in IT, security, and development, Cory Wolff is a passionate and skilled hacker who leads the offensive security practice at risk3sixty, a consulting firm that helps clients navigate complex cybersecurity and compliance challenges.
Steve Hill
Steven Hill
Independent Analyst, Data Center Technologies, ToneCurve Technology, LLC
Juliet Okafor
Juliet Okafor
CEO & Founder, RevolutionCyber, JD
Juliet Okafor, J.D., is a cybersecurity professional who has combined her knowledge of the legal system and cybersecurity solution models into success stories across fortune 500 industries throughout the USA.

Prizes & Interaction

Attend on May 2, 2024 and Win!
The more you participate, the more points you earn! It’s that simple. You’ll earn prize points for each activity you participate in throughout the virtual conference. Points will be calculated at the end of the live event day.
*Giveaways are limited to North American residents only. Winners are limited to one prize per calendar year for Informa Tech sponsored events.
Attend on May 2, 2024 and Win!
The more you participate, the more points you earn! It’s that simple. You’ll earn prize points for each activity you participate in throughout the virtual conference. Points will be calculated at the end of the live event day.
*Giveaways are limited to North American residents only. Winners are limited to one prize per calendar year for Informa Tech sponsored events.
Explorer Giveaway

30 Points

Session Views

25 Points

Zone Visits

20 Points

Chats Attended

10 Points

Resources Viewed

5 Points

vCards Exchanged

Sponsors
Keynote
Premier
Gold
© 2024 Informa USA, Inc., All Rights Reserved | Privacy Policy | Terms of Service