Meeting The Challenge of Modern Security Threats In The Cloud

Meeting The Challenge of Modern Security Threats In The Cloud

As cloud adoption accelerates, cybersecurity experts are called upon to lock down increasingly distributed enterprises - even as skilled security staff remain thin on the ground.

October 6, 2022
11:00 AM – 5:00 PM ET (8:00 AM – 2:00 PM PT)

Enterprise attack surfaces are expanding, and the complexity of the cloud makes it not only an ideal playground for cyber criminals, but more vulnerable to internal threats, from misconfiguration to theft, damage, and data loss.

That’s why it’s critical that IT leaders prioritize cloud security expertise and capabilities. Unfortunately, traditional security strategies and tools aren’t cutting it anymore – they simply don’t scale and can’t keep pace with either the speed of digital innovation or increasingly sophisticated cyberthreats. IT leaders need to move beyond traditional approaches to security monitoring, detection and response to meet the challenge of an increasingly complex tech stack and modern security threats in the cloud.

Topics Include:
What strategies, tools, and policies cybersecurity leaders are turning to keep cloud environments secure
Where the real challenges in cloud and control security lie
Actionable insights and new approaches to protecting your organization’s data
Agenda
Keynote
11:00 AM – 11:45 AM

Tackle Your Top Cloud Security Issues

Sponsored by: Sysdig
Presented by: Joe Onisick, Principal, Transformation Continuum

These challenges might sound familiar. You lack visibility into what data is in your cloud applications and infrastructure. You’re worried about data being stolen from your cloud applications. And you can’t fully control who can access sensitive data. You’re not alone. This keynote will reveal the top cloud security issues of today and how to overcome them.

Fireside Chat
11:45 AM –12:00 PM

Fireside Chat with Michael Isbitski, Director of Cybersecurity Strategy, Sysdig

Sponsored by: Sysdig
Moderated by: Steven Hill
Keynote
12:15 PM – 1:00 PM

Cloud Security Assessments 101

Sponsored by: Mandiant
Presented by: Doug Saylors, Co-Lead, Cybersecurity Practice, ISG

Cloud security assessments are increasingly popular these days—and rightly so. According to a recent IBM/Ponemon study, 45% of breaches this year will occur on cloud platforms, with a large percentage the fault of your company, not your CSP. With so much at risk, it’s clear why organizations are turning to cloud security assessments to highlight vulnerabilities. But you’ve got options when it comes to assessments … everything from operational assessments using DIY checklists and open-source tools to enterprise solutions coupled with Cyber Risk Quantification solutions. This keynote breaks down the world of cloud security assessments to help you choose the right one.

Fireside Chat
1:00 PM – 1:15 PM

Fireside Chat with Paul Mudgett, Sr. Manage of Security Transformation Services, Mandiant

Sponsored by: Mandiant
Moderated by: Steven Hill
Premier Session
1:30 PM – 2:00 PM

The Future of Authentication for Employees and Customers

Sponsored by: Okta
Presented by: Jameeka Green Aaron, Chief Information Security Officer, Okta

A strong customer identity foundation should empower businesses with simple, secure, and adaptable identity platforms to fit their unique needs while creating a seamless experience for employees and customers. Identity is much more than logging-in and signing-up; it provides a way to connect with the people who matter most to your brand, to establish trust, and increase conversion opportunities. Discover ways to balance security with friction and to create a safe authentication experience without compromising on privacy.

Spotlight Custom Webinar
2:15 PM – 2:45 PM

Cloud Attacks Are Here: Threat Actors Like Containers, Too!

Sponsored by: Sysdig
Panelists: Anna Belak, Director of Thought Leadership, Michael Isbitski, Director of Cybersecurity Strategy, & Michael Clark, Director of Threat Research, Sysdig

Cloud adoption is the trend of the decade, and threat actors are tailoring their methods to this new attack surface. Cryptojacking is the most prevalent type of cloud attack due to the low risk and high reward for the perpetrator. But even newer technology like containers is being used for evil as attackers plant unpleasant surprises in public repositories, exposing your business to potential supply chain compromise.

 

Join us to learn about what Sysdig’s Threat Research Team is seeing out there and what you can do to protect yourself.   They will discuss their individual thoughts on these questions:

  • What types of attacks are popular in the cloud and why?
  • How cryptojacking works and how to avoid becoming a victim?
  • What is hiding in malicious Docker images and how to protect yourself?
Premier Session
2:45 PM – 3:15 PM

Rapid Ransomware Recovery with True Continuous Data Protection

Sponsored by: Zerto
Presented by: Chris Rogers, Technology Evangelist, Zerto

Ransomware is the biggest threat to all organizations of every size and every industry. The frequency and severity of attacks is ever increasing and the unprepared are paying ransoms of millions and ending up in the news. It is vital to understand how your organization can recover rapidly from any attack to avoid disruption without paying a ransom, especially in the cloud.

Join Chris Rogers from Zerto, a Hewlett Packard Enterprise company to learn more about:

  • Ransomware attack scenarios and how they cause downtime and data loss at different scales
  • Why recovery point objective and recovery time objective are crucial in a ransomware attack
  • The types of recovery needed to recover, including: files, whole application stacks, entire data centers, the cloud, and even multiple sites after an attack
  • How you can use best-in-class Zerto continuous data protection to beat ransomware every time
  • How you can Get Out of Ransomware Jail With Zerto Free Edition
Spotlight Custom Webinar
3:30 PM – 4:00 PM

Common Entry Points Exposed on the Internet

Sponsored by: Mandiant
Presented by: Jonathan Cran, VP, Research & Engineering, & Nader Zaveri, Sr. Manager, Incident Response & Remediation, Mandiant

Legacy tools designed before the cloud era do not deliver comprehensive visibility into the entire external attack surface, leaving assets out of sight and potentially vulnerable. Confirming this, Mandiant observed 21K+ critical and high severity issues across the customer base from January to March 2022.

Join Jonathan Cran and Nader Zaveri for a discussion on the common entry points identified by Attack Surface Management in Q1 2022. They’ll discuss:
• How organizations end up with exposed external assets
• The methodology behind issue identification at scale
• Actions the security team can take to harden the external attack surface
• Where an attack surface management approach fits into the overall cyber defense program at any organization

Panel
4:00 PM – 4:45 PM

How to Get the Most from Your Cloud Security Resources

Sponsored by: AttackIQ
Panelists: Fernando Montenegro, Sr. Principal Analyst, Cybersecurity, Omdia; Ben Opel, Director for Customer Success, AttackIQ

It may feel that cyber attackers have seemingly boundless time and resources, while you have neither. However, there are ways you can tighten your cyber defense that won’t require you to do battle with the CFO first. In fact, you may already be paying for cloud security tools that you aren’t using. In this session, learn how to best assess your cloud security risks, optimize your defenses, validate your controls, and orchestrate your security tools to ensure you’re using your cloud security resources most efficiently and protecting your organization against the most important threats.

Meeting The Challenge of Modern Security Threats In The Cloud
October 6, 2022
11:00 AM – 5:00 PM ET (8:00 AM – 2:00 PM PT)
Speakers
PaulMudgett
Paul Mudgett
Sr. Manager, Security Transformation Services, Mandiant
Paul Mudgett is a Senior Manager with Mandiant’s Security Transformation Services group. Mudgett has over 25 years of experience in information security and technology including serving as CISO for a Statewide agency prior to joining Mandiant in 2019. He currently leads proactive security assessments and works with Mandiant’s incident responders.
Doug Saylors
Doug Saylors
Partner at ISG, Lead Cybersecurity Practice, CISSP
Doug Saylors co-leads the global Cybersecurity practice for ISG, a leading global technology research and advisory firm. He is responsible for assisting ISG’s clients with holistic Cybersecurity strategies, advanced operating model development, solution design and enablement with a specialty in digital transformation initiatives.
Michael_Clark
Michael Clark
Director of Threat Research, Sysdig
Michael is the Director of Threat Research at Sysdig, managing a team of experts tasked with discovering and defending against novel security threats. Michael has more than 20 years of industry experience in many different roles, including incident response, threat intelligence, offensive security research, and software development.
Anna_Belak
Anna Belak
Director of Thought Leadership, Sysdig
Anna has nearly ten years of experience researching and advising organizations on cloud adoption with a focus on security best practices. As a Gartner Analyst, Anna spent six years helping more than 500 enterprises with vulnerability management, security monitoring, and DevSecOps initiatives.
Mike_Isbitski
Michael Isbitski
Director of Cybersecurity Strategy, Sysdig
Mike has researched and advised on cybersecurity for over 5 years. He's versed in cloud security, container security, Kubernetes security, API security, security testing, mobile security, application protection, and secure continuous delivery. He's guided countless organizations globally in their security initiatives and supporting their business.
Jameeka Green Aaron
Jameeka Green Aaron
Chief Information Security Officer, Okta
Jameeka Green Aaron is the Chief Information Security Officer (CISO), responsible for the holistic security and compliance of Auth0’s platform, products, and corporate environment. She is a recognized industry leader and brings 20 years of experience to the role, with a career that has spanned a wide variety of industries.
Fernando Montenegro
Senior Principal Analyst, Cybersecurity, Omdia
Fernando is a Senior Principal Analyst on Omdia’s cybersecurity research team, based in Toronto, Canada. He focuses on the Infrastructure Security Intelligence Service, which provides vendors, service providers, and enterprise clients with insights and data on network security, content security, and more.
Joe Onisick headshot
Joe Onisick
Principal, Transformation Continuum
Joe Onisick is a technical business leader whose roles have ranged from Chief Technology Officer to Vice President of Sales with stops along the way building $100M technology practices and launching products, bringing them to $1B in annual revenue. Onisick’s passion lies in marrying ever-shifting business requirements into the right technologies.
Chris Rogers_Zerto
Chris Rogers
Technology Evangelist, Zerto
Chris Rogers is a Technology Evangelist at Zerto with 11 years of experience as an IT Professional focusing on data center virtualization and Data Protection. Chris is passionate about helping organizations remain resilient and running amidst cybersecurity threats like ransomware.
Ben Opel
Ben Opel
Director for Customer Success, AttackIQ
Ben Opel is a Director for Customer Success at AttackIQ, where he helps customers enhance their cybersecurity capabilities to achieve their security objectives; he is also an instructor at AttackIQ Academy. A former officer in the U.S. Marine Corps, Ben integrated Marines in defensive cyberspace operations in support of U.S. national security.
Sponsors
Keynote
Premier
Panel
© 2024 Informa USA, Inc., All Rights Reserved | Privacy Policy | Terms of Service