Cyber Resilience in 2024:

Availability is Your Best Ability

May 2, 2024
11:00am -5:00pm ET | Doors Open at 10:30am ET

While there are plentiful options in cyber resiliency and business continuity tools and platforms, there isn’t one that can knock out everything from sudden cloud outages to prolonged ransomware attacks in a single punch. What can you do to keep the company on its feet no matter what is thrown at it? Here’s what you need to consider to dodge the marketing buzz and bounce back from anything.

Topics Include:
Business resiliency and overcoming obstacles
Key preparations to make now before ransomware attacks
How to be prepared for DDoS attacks
Agenda
Keynote
11:00am – 11:45am ET

Enterprises’ Biggest Obstacles to Maintaining Cyber Resiliency in 2024

Sponsored by: Google Cloud Security
Moderated by: Steven Hill, Independent Analyst, Data Center Technologies, ToneCurve Technology, LLC
Speaker(s): Juliet Okafor, CEO & Founder, Revolution Cyber | Nader Zaveri, Senior Manager, Incident Response & Remediation, Google Cloud Security

Some obstacles linger from year to year, others are brand new, but your company needs to be able to resist and recover from them all. While business resiliency has never been an easy exercise, at least the path forward is clearer if you can see what lies ahead. Here are the biggest obstacles you’ll encounter this year and a few insights on how you might overcome them.

Fireside Chat
11:45am – 12:00pm ET

Keynote
12:15pm – 1:00pm ET

How to Respond to a Ransomware Attack: Preparations to Do Today

Sponsored by: Okta
Moderated by: Steven Hill, Independent Analyst, Data Center Technologies, ToneCurve Technology, LLC
Speaker(s): Christopher Carter, Cyber Advisor and CIO, Crucial Cyber

Responding to a ransomware attack entails more than deciding whether to pay the ransom or not. There are regulations on disclosures and required notifications, cyber insurance steps to be followed to make a claim, and backup and resiliency plans to put into play immediately. It’s hard to cover all the bases – and each in the right order – in the heat of the moment. Learn what key preparations to make now, before an attack, so you’ll be ready to respond effectively if your business is suddenly locked down.

Fireside Chat
1:00pm – 1:15pm ET

Premier Session
1:30pm - 2:00pm ET

Securing the Software Supply Chain: Ransomware Threats & Mitigation

Sponsored by: JFrog Inc
Speaker(s): Paul Davis, Field CISO, JFrog

Ransomware attacks underscore the weaknesses in software supply chains and security protocols, requiring proactive and reactive measures. This session addresses bolstering software supply chain reliability and improving software security to prevent such attacks. We’ll delve into a comprehensive strategy that includes:

  • Key Strategies: Explore secure coding practices, assess vulnerability risks, and implement secure development lifecycles to build resilience against ransomware attacks.
  • Active Protection: Understand how to safeguard your software supply chain effectively, reducing the risk of exploiting your software in a ransomware attack.
  • Leveraging Modern Tools: Utilize the latest tools and techniques to maintain agility and scale in your software delivery, ensuring your defenses are as advanced as the threats they aim to counter.
Premier Session
1:30pm - 2:00pm ET

Proactive Cloud Security: Preventing Breaches Before They Happen

Sponsored by: Cisco Panoptica
Speaker(s): Tim Miller, Technical Marketing Engineer, Outshift by Cisco

In a conference about cyber resiliency, we can’t ignore the prevention side of the equation. The resiliency and availability of resources in our environment critically depend on successfully protecting and defending from the constant barrage of breaches. In this talk, we will discuss how to complete this critical task.

Premier Session
2:15pm - 2:45pm ET

Dynamic Defense: Predictive Cyber Risk Management

Sponsored by: LogicGate, Inc.
Speaker(s): Nicholas Kathmann, Chief Information Security Officer, LogicGate

Advancements in data aggregation, real-time monitoring, and artificial intelligence have unlocked a new era of cyber risk management. Join Nick Kathmann, CISO at LogicGate, for an exploration of the possible as cyber risk management continues its evolution from manual and reactive to dynamic and predictive. Nick will discuss:

  • The importance of integrating cyber, risk, and compliance teams and technologies for near-real-time visibility and monitoring of critical risks at scale.
  • Practical examples how risk intelligence can inform important decisions around resource allocation, prioritization, and mitigation.
  • Steps you can take today on your own path to dynamic risk management.
Premier Session
2:15pm - 2:45pm ET

React, Respond, Recover: Eight Steps to Become Cyber Resilient.

Sponsored by: 11:11 Systems
Speaker(s): Jim Jones, Senior Product Infrastructure Architect, 11:11 Systems

Cybercrime and ransomware are at epidemic levels. They are so commonplace, they’re the number one reason for an IT outage. Government agencies are responding by putting regulations in place to combat threats. This is why you need a strategy now to address proactive approaches to prevent ransomware and reactive controls to recover if a cyberattack is successful.

What does it take to be truly cyber resilient? During our presentation, we’ll outline eight steps to take. Plus, we’ll also discuss:

  • How to create a strategy to prevent, respond, and recover from cyber attacks
  • Why a truly comprehensive program includes more than just technology solutions
  • What industry standards for technology, simulation/testing, and cyber specific programs you need to implement
  • How 11:11 Systems can help you take the first steps – and help in every step toward cyber resilience
Spotlight Webinar
3:00pm - 3:30pm ET

Proactive Cybersecurity: 6 Critical Tasks to Mitigate Risk

Sponsored by: Google Cloud Security
Presented by: Nader Zaveri, Senior Manager, Incident Response & Remediation, Google Cloud Security

By taking a proactive approach to cybersecurity, organizations can empower themselves to navigate the challenging threat landscape with confidence.
In this session, we will outline actionable steps you can take, including:

  • Understanding your external attack surface and public-facing assets
  • Ensuring endpoint security solutions have broad internal coverage
  • Restricting external network protocols and services
  • Implementing strong multi-factor authentication
  • Enhancing logging, monitoring, and detection capabilities
  • Bolstering incident response strategies and processes
Spotlight Webinar
3:30pm - 4:00pm ET

Protect Your Organization From Identity-based Attacks

Sponsored by: Okta
Speaker(s): Sean Hanrahan Senior Solutions Engineer, Okta

A 30 minute presentation going over how companies can protect their organization from the following identity-based attacks:

  • Phishing
  • Credential stuffing
  • Password Spray
  • MITM (man in the middle)
  • MFA fatigue

During this session we’ll cover:

  • What happens when attackers get control of the right identity, break into a network to facilitate fraud and extract sensitive data.
  • Why a strong identity security strategy is needed to fortify your security posture. The right identity solution provides protection, detection, and response for today’s identity-based threats.
  • How Okta can help safeguard your organization with protection, detection, and response for today’s identity-based threats.
Panel
4:15pm - 5:00pm ET

DDoS: Guide to Redundancy and Response

Moderated by: Steven Hill Independent Analyst, Data Center Technologies, ToneCurve Technology, LLC
Speaker(s): Nia Luckey, CIO Advisory, Cybersecurity & Cloud Strategist, Infosys | Cassandra Mack, Head of Security and GRC, CISO, Spekit | Cory Wolff, Director of Offensive Security, risk3sixty

DDoS attacks continue to be a challenge for enterprises. Any downtime can be costly and highly damaging for your company. Repeated attacks over time can be even more so. Panelists discuss the pros and cons of available options and what you can do now to prepare for the inevitable and bounce back faster.

Demo
All Day

Why Data Security is the Foundation for Your Security Posture

Sponsored by: Rubrik, Inc.
Presented by: Atul Ashok, Sr. Product Marketing Manager - Data Security, Rubrik
Cyber Resilience in 2024: Availability is Your Best Ability
May 2, 2024
11:00am -5:00pm ET | Doors Open at 10:30am ET

Speakers
Sean Hanrahan
Senior Solutions Engineer, Okta
In my professional life, I'm most passionate about enabling people to master their technology instead of the other way around - translating what is actually happening and what it means for them. I love getting deep in the weeds, thinking about security, tinkering with technology, and having deep conversations with people.
Atul Ashok
Sr. Product Marketing Manager – Data Security, Rubrik
As an engineer turned product marketer, I enjoy identifying and solving customer pain points by working closely with Product Management, Sales, Engineering, and Customer Success teams. My expertise lies in highlighting a product's strengths in a simple and concise manner.
Cassandra Mack
Head of Security and GRC, CISO, Spekit
Cassandra Mack is a highly adaptable Technology program leader and a certified CISO with over 25 years of experience in delivering technology solutions that align with the needs of the business. Cassandra is also a skilled digital transformation leader, Consultant, and Trusted Advisor.
Jim Jones
Senior Product Infrastructure Architect, 11:11 Systems
Jim has over 20 years of experience both as a Systems Administrator in SMB and Enterprise organizations as well as an architect for service providers, specializing in virtualization and disaster recovery capabilities. Holding technical certification from vendors such as Cisco Systems, Veeam and VMware.
Nicholas Kathmann
Chief Information Security Officer, LogicGate
Nicholas Kathmann brings a strong track record of delivering innovative security solutions for small to medium-sized businesses and Fortune 100 enterprises. Before LogicGate, Kathmann served as director of cybersecurity at Dell Technologies, overseeing the internal cybersecurity program as well as leading the MSSP practice.
Paul Davis
Field CISO, JFrog
A former CISO himself, Paul is a strategic security professional whose expertise lies in collaborating with CIOs and CISOs to promote best practices for adopting software supply chain systems and platforms. He is a trusted advisor who offers expertise and guidance on cybersecurity challenges and solutions.
Christopher Carter
Cyber Advisor and CIO, Crucial Cyber
Former government CIO and expert Cyber Advisor with Crucial Cyber, he is a technology leader practiced at recognizing emergent patterns, creating vision-driven strategies, improving security posture and defense, and making orchestrated sense out of complexity. With a doctorate in Information Assurance, he is an insightful strategist and mentor.
Nia Luckey
Technology and Transformation Expert Strategist, Infosys
From artificial intelligence (AI) automation, CIO and CISO advisory services, and technology and transformation, Nia has been a seasoned cybersecurity expert at the forefront of driving transformative initiatives for nearly a decade. She has consistently demonstrated expertise in integrating advanced cybersecurity solutions and more.
Tim Miller
Technical Marketing Engineer, Outshift by Cisco
Tim is a Technical Marketing Engineer at Outshift by Cisco. He focuses on cloud native application security, presenting technical presentations and solutions to customers and at industry events. Previously, at Cisco, he provided technical pre-sales engineering on data center technologies.
Cory Wolff, CISSP OSCP
Director, Offensive Security at risk3sixty
With over 20 years of experience in IT, security, and development, Cory Wolff is a passionate and skilled hacker who leads the offensive security practice at risk3sixty, a consulting firm that helps clients navigate complex cybersecurity and compliance challenges.
Nader Zaveri
Senior Manager, Incident Response & Remediation Mandiant, Google Cloud
Nader Zaveri has over 15 years of experience in IT security, infrastructure, and risk management. Nader has led hundreds of incident response investigations related to on-prem or cloud-based environments. He has helped investigate and understand the storyline of the attack for the most allusive threat actors such as nation-states.
Steve Hill
Steven Hill
Independent Analyst, Data Center Technologies, ToneCurve Technology, LLC
Juliet Okafor
CEO & Founder, RevolutionCyber, JD
Juliet “Jules” Okafor is an attorney, bestselling author and a highly sought after speaker. As the CEO/Founder of RevolutionCyber, a boutique security consultancy focused on Cyber Resilience as-a-Service (CRaaS) for high-growth midsize and enterprise companies seeking a frictionless way to rapidly mature, scale and embed security across all levels.

Prizes & Interaction

Attend on May 2, 2024 and Win!
The more you participate, the more points you earn! It’s that simple. You’ll earn prize points for each activity you participate in throughout the virtual conference. Points will be calculated at the end of the live event day.
*Giveaways are limited to North American residents only. Winners are limited to one prize per calendar year for Informa Tech sponsored events.
Attend on May 2, 2024 and Win!
The more you participate, the more points you earn! It’s that simple. You’ll earn prize points for each activity you participate in throughout the virtual conference. Points will be calculated at the end of the live event day.
*Giveaways are limited to North American residents only. Winners are limited to one prize per calendar year for Informa Tech sponsored events.
Explorer Giveaway

30 Points

Session Views

25 Points

Zone Visits

20 Points

Chats Attended

10 Points

Resources Viewed

5 Points

vCards Exchanged

Sponsors
Keynote
Premier
Gold
© 2024 Informa USA, Inc., All Rights Reserved | Privacy Policy | Terms of Service