Meeting The Challenge of Modern Security Threats In The Cloud

This is Tooltip!
October 6, 2022
11:00 AM – 5:00 PM ET (8:00 AM – 2:00 PM PT)
This is Tooltip!

Enterprise attack surfaces are expanding, and the complexity of the cloud makes it not only an ideal playground for cyber criminals, but more vulnerable to internal threats, from misconfiguration to theft, damage, and data loss.

That’s why it’s critical that IT leaders prioritize cloud security expertise and capabilities. Unfortunately, traditional security strategies and tools aren’t cutting it anymore – they simply don’t scale and can’t keep pace with either the speed of digital innovation or increasingly sophisticated cyberthreats. IT leaders need to move beyond traditional approaches to security monitoring, detection and response to meet the challenge of an increasingly complex tech stack and modern security threats in the cloud.

Topics Include:
This is Tooltip!
This is Tooltip!
What strategies, tools, and policies cybersecurity leaders are turning to keep cloud environments secure
This is Tooltip!
Where the real challenges in cloud and control security lie
This is Tooltip!
Actionable insights and new approaches to protecting your organization’s data
Agenda
This is Tooltip!
This is Tooltip!
Keynote
This is Tooltip!
11:00 AM – 11:45 AM
This is Tooltip!

Tackle Your Top Cloud Security Issues

This is Tooltip!
Sponsored by: Sysdig
This is Tooltip!
Presented by: Joe Onisick, Principal, Transformation Continuum

These challenges might sound familiar. You lack visibility into what data is in your cloud applications and infrastructure. You’re worried about data being stolen from your cloud applications. And you can’t fully control who can access sensitive data. You’re not alone. This keynote will reveal the top cloud security issues of today and how to overcome them.

This is Tooltip!
Fireside Chat
This is Tooltip!
11:45 AM –12:00 PM
This is Tooltip!

Fireside Chat with Michael Isbitski, Director of Cybersecurity Strategy, Sysdig

This is Tooltip!
Sponsored by: Sysdig
This is Tooltip!
Moderated by: Steven Hill
This is Tooltip!
Keynote
This is Tooltip!
12:15 PM – 1:00 PM
This is Tooltip!

Cloud Security Assessments 101

This is Tooltip!
Sponsored by: Mandiant
This is Tooltip!
Presented by: Doug Saylors, Co-Lead, Cybersecurity Practice, ISG

Cloud security assessments are increasingly popular these days—and rightly so. According to a recent IBM/Ponemon study, 45% of breaches this year will occur on cloud platforms, with a large percentage the fault of your company, not your CSP. With so much at risk, it’s clear why organizations are turning to cloud security assessments to highlight vulnerabilities. But you’ve got options when it comes to assessments … everything from operational assessments using DIY checklists and open-source tools to enterprise solutions coupled with Cyber Risk Quantification solutions. This keynote breaks down the world of cloud security assessments to help you choose the right one.

This is Tooltip!
Fireside Chat
This is Tooltip!
1:00 PM – 1:15 PM
This is Tooltip!

Fireside Chat with Paul Mudgett, Sr. Manage of Security Transformation Services, Mandiant

This is Tooltip!
Sponsored by: Mandiant
This is Tooltip!
Moderated by: Steven Hill
This is Tooltip!
Premier Session
This is Tooltip!
1:30 PM – 2:00 PM
This is Tooltip!

The Future of Authentication for Employees and Customers

This is Tooltip!
Sponsored by: Okta
This is Tooltip!
Presented by: Jameeka Green Aaron, Chief Information Security Officer, Okta

A strong customer identity foundation should empower businesses with simple, secure, and adaptable identity platforms to fit their unique needs while creating a seamless experience for employees and customers. Identity is much more than logging-in and signing-up; it provides a way to connect with the people who matter most to your brand, to establish trust, and increase conversion opportunities. Discover ways to balance security with friction and to create a safe authentication experience without compromising on privacy.

This is Tooltip!
Spotlight Custom Webinar
This is Tooltip!
2:15 PM – 2:45 PM
This is Tooltip!

Cloud Attacks Are Here: Threat Actors Like Containers, Too!

This is Tooltip!
Sponsored by: Sysdig
This is Tooltip!
Panelists: Anna Belak, Director of Thought Leadership, Michael Isbitski, Director of Cybersecurity Strategy, & Michael Clark, Director of Threat Research, Sysdig

Cloud adoption is the trend of the decade, and threat actors are tailoring their methods to this new attack surface. Cryptojacking is the most prevalent type of cloud attack due to the low risk and high reward for the perpetrator. But even newer technology like containers is being used for evil as attackers plant unpleasant surprises in public repositories, exposing your business to potential supply chain compromise.

 

Join us to learn about what Sysdig’s Threat Research Team is seeing out there and what you can do to protect yourself.   They will discuss their individual thoughts on these questions:

  • What types of attacks are popular in the cloud and why?
  • How cryptojacking works and how to avoid becoming a victim?
  • What is hiding in malicious Docker images and how to protect yourself?
This is Tooltip!
Premier Session
This is Tooltip!
2:45 PM – 3:15 PM
This is Tooltip!

Rapid Ransomware Recovery with True Continuous Data Protection

This is Tooltip!
Sponsored by: Zerto
This is Tooltip!
Presented by: Chris Rogers, Technology Evangelist, Zerto

Ransomware is the biggest threat to all organizations of every size and every industry. The frequency and severity of attacks is ever increasing and the unprepared are paying ransoms of millions and ending up in the news. It is vital to understand how your organization can recover rapidly from any attack to avoid disruption without paying a ransom, especially in the cloud.

Join Chris Rogers from Zerto, a Hewlett Packard Enterprise company to learn more about:

  • Ransomware attack scenarios and how they cause downtime and data loss at different scales
  • Why recovery point objective and recovery time objective are crucial in a ransomware attack
  • The types of recovery needed to recover, including: files, whole application stacks, entire data centers, the cloud, and even multiple sites after an attack
  • How you can use best-in-class Zerto continuous data protection to beat ransomware every time
  • How you can Get Out of Ransomware Jail With Zerto Free Edition
This is Tooltip!
Spotlight Custom Webinar
This is Tooltip!
3:30 PM – 4:00 PM
This is Tooltip!

Common Entry Points Exposed on the Internet

This is Tooltip!
Sponsored by: Mandiant
This is Tooltip!
Presented by: Jonathan Cran, VP, Research & Engineering, & Nader Zaveri, Sr. Manager, Incident Response & Remediation, Mandiant

Legacy tools designed before the cloud era do not deliver comprehensive visibility into the entire external attack surface, leaving assets out of sight and potentially vulnerable. Confirming this, Mandiant observed 21K+ critical and high severity issues across the customer base from January to March 2022.

Join Jonathan Cran and Nader Zaveri for a discussion on the common entry points identified by Attack Surface Management in Q1 2022. They’ll discuss:
• How organizations end up with exposed external assets
• The methodology behind issue identification at scale
• Actions the security team can take to harden the external attack surface
• Where an attack surface management approach fits into the overall cyber defense program at any organization

This is Tooltip!
Panel
This is Tooltip!
4:00 PM – 4:45 PM
This is Tooltip!

How to Get the Most from Your Cloud Security Resources

This is Tooltip!
Sponsored by: AttackIQ
This is Tooltip!
Panelists: Fernando Montenegro, Sr. Principal Analyst, Cybersecurity, Omdia; Ben Opel, Director for Customer Success, AttackIQ

It may feel that cyber attackers have seemingly boundless time and resources, while you have neither. However, there are ways you can tighten your cyber defense that won’t require you to do battle with the CFO first. In fact, you may already be paying for cloud security tools that you aren’t using. In this session, learn how to best assess your cloud security risks, optimize your defenses, validate your controls, and orchestrate your security tools to ensure you’re using your cloud security resources most efficiently and protecting your organization against the most important threats.

This is Tooltip!
Meeting The Challenge of Modern Security Threats In The Cloud
This is Tooltip!
October 6, 2022
This is Tooltip!
11:00 AM – 5:00 PM ET (8:00 AM – 2:00 PM PT)
Speakers
This is Tooltip!
PaulMudgett
This is Tooltip!
Paul Mudgett
Sr. Manager, Security Transformation Services, Mandiant
Paul Mudgett is a Senior Manager with Mandiant’s Security Transformation Services group. Mudgett has over 25 years of experience in information security and technology including serving as CISO for a Statewide agency prior to joining Mandiant in 2019. He currently leads proactive security assessments and works with Mandiant’s incident responders.
Doug Saylors
This is Tooltip!
Doug Saylors
Partner at ISG, Lead Cybersecurity Practice, CISSP
Doug Saylors co-leads the global Cybersecurity practice for ISG, a leading global technology research and advisory firm. He is responsible for assisting ISG’s clients with holistic Cybersecurity strategies, advanced operating model development, solution design and enablement with a specialty in digital transformation initiatives.
Michael_Clark
This is Tooltip!
Michael Clark
Director of Threat Research, Sysdig
Michael is the Director of Threat Research at Sysdig, managing a team of experts tasked with discovering and defending against novel security threats. Michael has more than 20 years of industry experience in many different roles, including incident response, threat intelligence, offensive security research, and software development.
Anna_Belak
This is Tooltip!
Anna Belak
Director of Thought Leadership, Sysdig
Anna has nearly ten years of experience researching and advising organizations on cloud adoption with a focus on security best practices. As a Gartner Analyst, Anna spent six years helping more than 500 enterprises with vulnerability management, security monitoring, and DevSecOps initiatives.
Mike_Isbitski
This is Tooltip!
Michael Isbitski
Director of Cybersecurity Strategy, Sysdig
Mike has researched and advised on cybersecurity for over 5 years. He's versed in cloud security, container security, Kubernetes security, API security, security testing, mobile security, application protection, and secure continuous delivery. He's guided countless organizations globally in their security initiatives and supporting their business.
Jameeka Green Aaron
This is Tooltip!
Jameeka Green Aaron
Chief Information Security Officer, Okta
Jameeka Green Aaron is the Chief Information Security Officer (CISO), responsible for the holistic security and compliance of Auth0’s platform, products, and corporate environment. She is a recognized industry leader and brings 20 years of experience to the role, with a career that has spanned a wide variety of industries.
Fernando_Montenegro
This is Tooltip!
Fernando Montenegro
Senior Principal Analyst, Cybersecurity, Omdia
Fernando is a Senior Principal Analyst on Omdia’s cybersecurity research team, based in Toronto, Canada. He focuses on the Infrastructure Security Intelligence Service, which provides vendors, service providers, and enterprise clients with insights and data on network security, content security, and more.
Joe Onisick headshot
This is Tooltip!
Joe Onisick
Principal, Transformation Continuum
Joe Onisick is a technical business leader whose roles have ranged from Chief Technology Officer to Vice President of Sales with stops along the way building $100M technology practices and launching products, bringing them to $1B in annual revenue. Onisick’s passion lies in marrying ever-shifting business requirements into the right technologies.
Chris Rogers_Zerto
This is Tooltip!
Chris Rogers
Technology Evangelist, Zerto
Chris Rogers is a Technology Evangelist at Zerto with 11 years of experience as an IT Professional focusing on data center virtualization and Data Protection. Chris is passionate about helping organizations remain resilient and running amidst cybersecurity threats like ransomware.
Ben Opel
This is Tooltip!
Ben Opel
Director for Customer Success, AttackIQ
Ben Opel is a Director for Customer Success at AttackIQ, where he helps customers enhance their cybersecurity capabilities to achieve their security objectives; he is also an instructor at AttackIQ Academy. A former officer in the U.S. Marine Corps, Ben integrated Marines in defensive cyberspace operations in support of U.S. national security.
Sponsors
Keynote
Premier
Panel
© 2022 Informa USA, Inc., All Rights Reserved | Privacy Policy | Terms of Service