Agenda
Early Access
Nov 7- 12:00 pm – 4:00 pm ETOn Demand Sessions
Super Monday
Nov 7- 12:30 pm – 4:45 pm ETForrWomen Leadership Summit
- 2:00 pm – 3:15 pm ETZT Certification Workshop
- 3:00 pm – 5:00 pm ETSecurity Analyst Experience (AX) Workshop
- 4:00 pm – 5:00 pm ETExecutive Leadership Exchange (ELE)
- 5:00 pm – 6:00 pm ETWelcome Reception
Tuesday
Nov 8- 10:00 am – 11:20 am ETOpening Remarks & Keynotes
- 11:20 am – 12:00 pm ETMarketplace Break
- 12:00 pm – 1:05 pm ETBreakout & Case Study Sessions
- 1:05 pm – 2:05 pm ETLunch
- 2:05 pm – 3:45 pm ETBreakout & Case Study Sessions
- 3:45 pm – 4:30 pm ETMarketplace Break
- 4:30 pm – 5:45 pm ETKeynote Sessions
- 5:35 pm – 6:35 pm ETReception
Wednesday
Nov 9- 9:30 am – 10:50 am ETKeynote Sessions
- 10:50 am – 11:30 am ETMarketplace Break
- 11:30 am – 12:35 pm ETBreakout & Case Study Sessions
- 12:35 pm – 1:35 pm ETLunch
- 1:35 pm – 2:40 pm ETBreakout & Case Study Sessions
- 2:40 pm – 3:20 pm ETMarketplace Break
- 3:20 pm – 4:30 pm ETKeynote Sessions
- 4:30 pm – 4:35 pm ETClosing Remarks
Super Monday Nov 7
ForrWomen Leadership Summit
Advancing Women’s Leadership in Security & Risk
Join your peers for a meet-and-greet before attending sessions that provide advancement strategies for women leaders and help those same leaders support our next generation. All are welcome to join!
12:30-1:30 PM | Networking Lunch with Forrester’s Security & Risk Women Leaders
Nearly half of Forrester’s Security & Risk Analyst team is made up of women. Come meet this group of powerful leaders and hear how they are on a mission to reshape the industry.
1:30-2:00 PM | Fireside Chat: Moving Beyond “Beating the Odds"
In the last two decades, a significant amount of money and time has been spent in efforts to diversify the tech workforce. While progress is happening, it seems to move at a glacial pace. Women are still significantly underrepresented in tech as a whole, and dramatically underrepresented in tech leadership. The women who do succeed make it by beating the odds and overcoming significant obstacles in their path to success. This problem represents a risk, not just for women, but for the industry as a whole. Join Forrester’s Research Director Amy DeMartine, and Principal Analyst Katy Tynan to discuss how women can move beyond surviving despite the odds, to thriving in an ecosystem of opportunity.
Speakers:
Katy Tynan, VP, Principal Analyst, Forrester
Amy DeMartine, VP, Research Director, Forrester
2:00-2:45 PM | Group Discussion
Connect with your peers to discuss the common barriers and solutions to advancing women’s roles in cybersecurity.
2:45-3:45 PM | Build A Network Of Allies And Mentors To Lead In Cybersecurity
If you’ve ever felt out-of-place in a professional cybersecurity setting – whether at your own company, at a networking event, or at an industry conference – this panel session is for you. We’ve assembled a fantastic panel of senior executives who’ve wrestled with feeling welcome in cybersecurity themselves, and with proven track records of recruiting, mentoring, and retaining women and other people who don’t fit the “pale guy in a hoodie” stereotype. Here’s what you’ll take away if you join us:
- How the panelists have tackled the challenges and implemented the solutions surfaced in the previous working session
- The elements of successful mentorship and allyship that the panelists have observed from both sides of those relationships
- Things that you can do to help open the door wider for others who might not feel welcome – because whatever stage you’re at in your own career in cybersecurity, there will always be people at earlier stages who you can help!
Speakers:
Laura Koetzle, VP, Group Director, Forrester
Angela Cole, Senior Federal Cybersecurity Manager, United States Department of Agriculture (USDA)
Amy S. Hamilton, Department of Energy Senior Advisor , National Cybersecurity Policy and Programs
3:45-4:45 PM | Mentor-Mentee Roundtables
Women mentoring women is what it’s all about. Whether you participate as a mentor or mentee, this will be an inspiring experience. Connect with your peers in the industry and develop meaningful relationships that will last beyond this Event.
ZT Certification Workshop: Preparing For Your Zero Trust Transformation
In an age when cybersecurity threats are everywhere, modern networks must move beyond the static perimeter-based model. Security teams must adapt and redesign networks to improve security. Join this workshop to better understand what it takes to plan for your firm’s Zero Trust strategy. You’ll participate in interactive self-assessments and exercises to help you identify areas to focus your transformation investments. This workshop provides a live sample of Forrester’s Adopting Zero Trust Certification course. By participating, you’ll get a sneak peek into the new Certification, where you can convert your self-assessment into an informed Zero Trust roadmap, launching early 2023!
Speakers:
Heath Mullins, Sr. Analyst, Forrester
Jenna Wohead, Director, Certification, Forrester
Workshop: How to Leverage Security Analyst Experience to Retain Talent in the SOC
Security Analysts are the backbone of your security program. Yet, they often struggle with low quality tools, ad-hoc processes, and subsequent burnout. Security Analyst Experience (AX) is a new term to describe this pain point – specifically, how analysts perceive the tools and processes they use in the SOC. In this workshop, we explain how to operationalize security Analyst Experience (AX) to improve security tooling and processes to help retain talent in the SOC. Learn:
- What security Analyst Experience is
- How Analyst Experience affects your recruiting and retention efforts
- How to adjust your security processes and technology to improve the Analyst Experience
Speakers:
Allie Mellen, Senior Analyst, Forrester
Jeff Pollard, VP, Principal Analyst, Forrester
Executive Leadership Exchange (Invite-Only)
The Executive Leadership Exchange (ELE) is an executive program for up to 75 qualified Security & Risk executives. Please visit the programs tab to learn more.
4:00-4:30 PM | Kickoff & Speed Networking
Analysts Jess Burn and Jinan Budge will kick off Security & Risk 2022 with a preview of our Forum agenda followed by a lively peer networking session designed to acquaint (or reacquaint) ELE members with each other.
Speakers:
Jess Burn, Senior Analyst, Forrester
Jinan Budge, VP, Principal Analyst, Forrester
4:30-5:00 PM | Predictions Preview
Join us for an ELE exclusive live session reviewing our Security, Risk, and Privacy predictions for 2023. VP, Research Director, Joseph Blankenship will walk through this year’s five predictions, overarching themes we identified in the predictions, why each one matters and most importantly what security leaders should do about them
Speakers:
Alla Valente, Senior Analyst, Forrester
Heidi Shey, Principal Analyst, Forrester
Janet Worthington, Sr Analyst, Forrester
Jess Burn, Principal Advisor, Forrester
Jinan Budge, Principal Analyst, Forrester
Welcome Reception
Join us for refreshments and light appetizers. All registered attendees are welcomed.
Tuesday Nov 8
Welcome & Opening Remarks
with Stephanie Balaouras, VP, Group Director, Forrester
Keynote: Securing The Future: Geopolitical Risk Will Redefine Security Strategies For The Next Decade
Globalization and international cooperation have passed their peak, thanks to global supply chain challenges and the threat of a third world war. As global powers work to protect themselves from the fallout, enterprises must prepare for how these changing global dynamics will affect their strategy and their security policies. Attend this keynote for insights into how geopolitical tension will define the next decade and how to adapt your security strategy to mitigate your risk.
Speakers:
Renee Murphy, Principal Analyst, Forrester
Allie Mellen, Senior Analyst, Forrester
Keynote: Privacy And The Immersive Experiences Of The Future
The metaverse does not exist yet. But the promise of a future defined by interoperable, immersive platforms is already driving companies’ investments, changing customer expectations, and shaping new engagement models. Individuals’ personal data, trusted identities, and attributes are fundamental pillars to achieve the promise of immersive digital experiences of the future. While many have plans on how to exploit sensitive personal data, only a few know how to keep them safe. Join this session to:
- Learn how the demand and the collection of individuals’ personal data will evolve as digital experiences become more immersive and intelligent.
- Assess the privacy risks of immersive experiences of the future.
- Design a privacy approach fit for future immersive experiences.
Speakers:
Enza Iannopollo, Principal Analyst, Forrester
Marketplace Break
Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.
Check out our Sponsor Spotlights to learn more about the next great solution for your team. See below for the list of spotlights during this time.
Attend one session:
JupiterOne Reduced Attack Surface by 150%
When you reduce something by 100%, you essentially eliminate it. But what does it mean to reduce something by 150%? JupiterOne will share findings of the recent Total Economic Impact™ of JupiterOne study and highlight how JupiterOne’s cyber asset attack surface management (CAASM) platform provided the depth and breadth of visibility to: identify 250% more cyber assets, reduce the number of SecOps resource hours by 85%, and derive 318% return on investment.
Speakers:
Tyler Shields, Chief Marketing Officer, JupiterOne
ReversingLabs: Going Beyond Basic SBOMs - How Tampering, Secrets & Diffs Expand Software Risk Visibility
This session will go into specific details on SBOMs. Topics that will be covered are “Why do I need an SBOM?” “Who is responsible for an SBOM?” plus more.
Speakers:
Matt Rose, Field CISO, Reversing Labs
Breakout Sessions
Case Study Sessions
Hear real world case studies showcasing the value of partnering with the right technology provider.
Attend one session:
Key Resources: Understanding Mainframe Integrity Vulnerabilities
The integrity of mainframe data and software is critical to the success of your business. Understanding mainframe integrity is a critical component of security strategies. It isn’t just about user authentication/ authorization. An appropriate analogy is locking the front door to your house but leaving your windows open. Learn what is a mainframe integrity vulnerability, why you care, what responsibilities you have with regards to integrity, what you can I do to stay compliant.
Speakers:
Ray Overby, Co-Founder & CTO, Key Resources Inc.
Reciprocity: SumTotal’s Journey From Zero to Strategic Risk Management
Is your organization strong on compliance but lacking when it comes to risk management? Join Sean McClanahan, Compliance Manager of SumTotal’s Cloud Operations (part of Cornerstone OnDemand), and Rob Ellis, SVP of Product Strategy at Reciprocity, as they discuss SumTotal’s journey from a foundational risk program to a strategic approach that ties risk to business priorities. You’ll leave seeing risk differently, delivering better outcomes with less effort and more effectively communicating risk to the C-Suite and Board.
Speakers:
Rob Ellis, Senior Vice President of Product Strategy, Reciprocity
Sean McClanahan, Compliance Manager, SumTotal (part of Cornerstone OnDemand)
Tanium: Transformative Approach to Endpoint Management & Risk Mitigation
Hear from CIOs Jake McClean and Tom Molden on using a transformative approach to IT Operations, Risk Mitigation & Threat Response. They will cover how Tanium uses converged endpoint management to see, control, and remediate every endpoint for Tanium’s thousands of employees around the world, all while getting their weekends back and enabling a more streamlined IT and security organization.
Speakers:
Jake McClean, CIO, Tanium
Tom Molden, CIO Sales, Tanium
ThreatLocker: The Total Economic Impact™ Of ThreatLocker
In this case study, users will learn about the key challenges regarding the cybersecurity landscape that’s solved with the ThreatLocker Solution as well as the cost-benefit analysis and total economic impact it had on it’s users
Speakers:
Ryan Bowman, Director of Solutions Engineering, ThreatLocker
Lunch & Marketplace Break
Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.
Check out our Sponsor Spotlights to learn more about the next great solution for your team. See below for the list of spotlights during this time.
Attend one session:
BeyondTrust: Integrating Privileged Access Management into Your Current Workflow and Processes
Implementing a PAM solution provides impressive features and improved security. As beneficial as this is, it can be difficult to incorporate into your current processes. Because of this PAM is often met with resistance. In this session we will: review the benefits of implementing a PAM solution, look at a typical new hire onboard and how that relates to PAM, least privilege, and session management.
Speakers:
Jason Silva, Senior Solutions Architect, BeyondTrust
HackerOne: Use Ethical Hackers to Resist Attack
Attack surfaces are expanding, spurred on by the continuous release of new digital services and business transformation. In this session, you will learn why it’s time to implement an attack resistance management strategy to find unknown risks missed by automated tools, then unlock the security expertise of ethical hackers to identify critical gaps and prioritize fixes for your exploitable assets.
Speakers:
Sean Ryan, Senior Principal Technical Product Marketing Manager , HackerOne
Illumio: Fortify your Ransomware defenses using Zero Trust Segmentation
Over the past decade, ransomware attacks have plagued organizations globally. Unfortunately, traditional perimeter-based solutions cannot keep up. Once inside, attackers have unfettered access to the network and can move laterally infecting workloads along their path. With the fast-changing security landscape and evolution of attack vectors, organizations need to change their mindset from breach prevention to breach containment. Building robust cyber resilience requires organizations to embrace Zero Trust Segmentation.
Speakers:
Aditya Krishnan, Technical Marketing Engineer, Illumio
Kyndryl: Recovery Retainer Enables Healthcare Providers to Prevent a Cybergeddon
In the months following the start of the pandemic, as ransomware groups targeted the healthcare industry, the customer experienced a ransomware incident which, prior to containment, encrypted 2500+ servers and caused a shut down of its application systems and network. Using its minimum viable company (MVC) strategy, Kyndryl lead the recovery effort ensuring restoration for a phased business resumption, minimizing impact of the attack and also helped develop processes to minimize impact of future attacks.
Speakers:
Rhonda Childress, Chief Innovation Officer, Kyndryl
John Greenough, Head of Market Relations, Security & Resiliency, Kyndryl
Government Lunch Meetup
Connect with your fellow peers in Public Sector for a private networking lunch. Guest Keynote Speaker, Robert M. Lee, CEO & Co-Founder of Dragos, will be in attendance for an exclusive Q&A prior to taking the stage.
Speakers:
Robert M. Lee, CEO & Co-Founder, Dragos
Executive Leadership Exchange (Invite-Only): Networking Lunch
Join a private lunch with fellow ELE attendees.
Speakers:
Jess Burn, Senior Analyst, Forrester
Jinan Budge, VP, Principal Analyst, Forrester
David Levine, VP, Executive Partner, Forrester
Breakout Sessions
Case Study Sessions
Hear real world case studies showcasing the value of partnering with the right technology provider.
Attend one session:
Code42: The Impact of Cultural Drift on Data Protection
Every organization’s culture has a true north that demonstrates how secure that organizations’ data is. As security leaders, we have a choice – is it better to correct behavioral drift away from this true north at the time it happens or give it free reign to establish a new norm? Join to learn more about the critical role culture plays in building a security aware organization as new technologies bring new vectors for data exposure when behavior is unchecked.
Speakers:
Rob Juncker, CTO, Code42
Confiant: Why malvertising matters to your endpoint defense
The digital landscape has dramatically evolved over the past ten years. Phishing, malware attacks and crypto scams using ads as a vector are on the rise. Sophisticated cyber criminals are a threat to any digital user and enterprise organization. This case study will go into detail and provide insight into the detection of Mac malware attacks, malware families and notarized Mac malware.
Speakers:
Louis-David “LD” Mangin, CEO and Co-Founder, Confiant
IBM: How Bed Bath & Beyond scaled their security and risk management program with IBM Security
With nearly a thousand stores and decades as a leading retailer, Bed Bath & Beyond always has the security of its business assets and its customers’ sensitive information as a top priority. As they’ve battled the impact of COVID, as well as changes in strategic direction that are impacting many large organizations, it’s become even more critical to enhance the cybersecurity efforts via policy and standards analysis, risk quantification, and the continuous safeguarding of customers credit card data. Join us for this session, to hear about the on-going journey of building out a leading program in information security and risk management, as well as where they plan to focus on staying ahead of future threats.
Speakers:
Tameka Foster, Director, Risk Operations Center, Bed Bath & Beyond
Rebecca Dodson, Partner, Security Strategy Risk & Compliance, Americas, IBM Security
StrikeReady: Cyber Warfare: Transforming SOC through Adaptive Defense
Geopolitical issues have spilled from urban warfare into cyber warfare, adding a new challenge to security programs. Consequently, we implemented an Active Defense strategy to bolster our defense against aggressive adversaries and respond effectively, as well as transform our Security Operations Center (SOC). This yielded astonishing results, and I’d like to share the blueprint with you.
Speakers:
Wasif Khan, V.P. InfoSec Operations, CNA Insurance
ThreatConnect: Quantifying cyber risk in financial terms
Cyber risk is a continuously changing risk that companies struggle to understand and mitigate. Many companies today try to measure and communicate cyber risk with heat maps, technical metrics, or with subjective analysis. ThreatConnect and Snowflake, an RQ customer, will walk you through a case study to describe how quantified risk is being used to identify, communicate and begin to mitigate cyber risk in a data driven, defensible manner.
Speakers:
Josh Mckibben, Director of Global Security Compliance & Risk , Snowflake
Jerry Caponera, General Manager, Cyber Risk Quantification Products, ThreatConnect
Executive Leadership Exchange (Invite-Only): Early Career Pros and CISOs: Bridging the Gap
In most organizations, executives spend limited amounts of time with early career professionals, leaving most conversations and interactions to their managers. Yet every new hire represents a new opportunity for the security team to cultivate – and retain — talent. In this session, VP and Principal Analyst Jeff Pollard will debut new research on what entry level security personnel want from CISOs, and what they need CISOs to know about them. First, Jeff will share insights from research interviews with entry and early career security personnel that will help CISOs understand their unique perspective. The session will then feature an interactive discussion and peer exchange where attendees will share their best practices for setting up early career team members for success and longevity in their organizations.
Speakers:
Jeff Pollard, VP, Principal Analyst, Forrester
Breakout Sessions
Marketplace Break
Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.
Check out our Sponsor Spotlights to learn more about the next great solution for your team. See below for the list of spotlights during this time.
Attend one session:
Qmulos: Empowering Real-Time Risk Insights Through Converged Continuous Compliance
We know “compliance is not security.” But why? Because we’ve been conditioned to see compliance as a set of checkboxes: No security value or insights to inform decisions, just a cost of doing business. No reason these should be separate functions, yet most enterprises struggle to derive security value from their compliance programs. As Continuous Monitoring becomes a standard requirement, static compliance won’t be an option. Learn how to evolve to Converged Continuous Compliance.
Speakers:
Igor Volovich, Vice President, Compliance Strategy, Qmulos
Rapid7: Precision, Efficiency and Speed: Key Outcomes of XDR
People continue to debate about XDR. Is it a product? An approach? Some use the XDR acronym, but aren’t clear what the capabilities are. Whatever the future holds, Rapid7 believes that XDR outcomes are something for which every organization should strive. We believe the best solutions out there incorporate SIEM capabilities, threat intelligence/digital risk protection, and automation and orchestration that help speed response times and greatly decrease your risk exposure.
Speakers:
Jeffrey Gardner, Detection & Response Practice Advisor, Rapid7
Terranova Security: The Importance of Building a Security-Aware Culture
Growing a security-aware culture is essential to keep your organization secure. Discover how you can do just that by leveraging the Security Culture Index (SCI). This feature enables you to transcend one-dimensional risk assessments with unique, data-driven ratings for your organization’s end-users. In this session, you’ll learn how end-users will benefit from SCI info, the components that fuel successful SCI implementation, and you’ll also get an overview of the Terranova Security Awareness Platform.
Speakers:
Charles Boisseau, Director of Sales – Americas & EMEA, Terranova Security
Analyst-Led Meetups
Spend some time in these small, interactive group roundtable discussions focused on key security topics. Forrester analysts will kick-off the discussion, but bring your topic or question to the meetup and help spark the conversation. First-come, first-served.
Attend one session:
A CISOs Guide To Leading Change
During this session, you will learn from peers how they identify, align with, and influence critical stakeholders whose support is needed to successfully execute on their cybersecurity programs. Below are the topics we will cover:
- Who are the supporters, and detractors for your cybersecurity program, and how do you influence them?
- How do you deal with organizational politics?
- How do you lead your organization, and your team, through change?
Speakers:
Jinan Budge, VP, Principal Analyst, Forrester
Zero Trust In the Cloud
During this session, you will learn from your peers how they are thinking about cloud and ZT. Below are the topics we’ll explore during our conversation.
- What is your organization’s actual threat surface in the cloud?
- How is cloud facilitating or inhibiting your journey to Zero Trust?
- How can you work across the organization to apply Zero Trust, to the cloud and elsewhere.
Speakers:
David Holmes, Senior Research Analyst, Forrester
Planning For Post-Quantum Encryption
During this session, you will learn from your peers how they are approaching the transition from RSA and ECC to post-quantum encryption. Below are the topics we’ll explore during our conversation.
- Timelines for transition and where to start
- The NIST post-quantum competition
- Implementing cryptographic migration internally and working with third parties
Speakers:
Sandy Carielli, Principal Analyst, Forrester
AfterWords: Geopolitical Risk Will Redefine Security Strategies For The Next Decade
Ever wanted a chance to go backstage and be a part of the conversations that go on in the Green Room? Well now is your time! In this casual Q&A session, our opening keynoters, Allie Mellen and Renee Murphy, will be available to answer any questions you had coming out of their opening session.
Speakers:
Allie Mellen, Senior Analyst, Forrester
Renee Murphy, Principal Analyst, Forrester
Guest Keynote - ICS Threats: From Pipe Dream To PIPEDREAM
Threats to industrial control systems (ICS) and critical infrastructure are nothing new. What’s changed is the pervasiveness of the ability to carry out cyber-attacks against these systems and the geopolitical environment which makes these systems prime targets by adversaries. Robert M. Lee, CEO and Co-founder of Dragos will discuss ICS threats from cascading IT attacks to today’s ICS-focused malware as well as strategies for defending modern infrastructure.
Speakers:
Robert M. Lee, CEO & Co-Founder, Dragos
Keynote: Unleash Your Potential With ZTE
Amidst the cacophony of Zero Trust messaging, Zero Trust Edge has emerged as an ideal technology for security leaders to embrace. The combination of networking and security controls positions ZTE as a simple solution for multiple problems and accelerates overall ZT adoption. This session will focus on the following areas:
- ZTE- what it is, and what it isn’t
- How ZTE enables edge computing
- How and why to apply ZTE from an organizational perspective
Speakers:
Heath Mullins, Sr. Analyst, Forrester
Evening Reception
Join us for an opening night reception full of networking, fun, food and refreshments.
Wednesday Nov 9
Boardroom Session with ThreatLocker: Zero Trust at the Endpoint: Fighting Ransomware
The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it for endpoints, and the technologies you need to take control of your environment in the fight against ransomware.
This session will have limited capacity and is first come, first served. Breakfast will be provided.
Speakers:
Ryan Bowman, Director of Solutions Engineering, ThreatLocker
Keynote: From CISO To Chief Trust Officer: The Next Step Forward In CISO Career Paths
Sparked by the trust imperative and in response to companies moving away from business models that put them at odds with their customers, a new C-suite role has emerged: chief trust officer. It’s also the next step in the career path for CISOs. No other role in the C-suite brings the insights and empathy necessary to become an effective CTrO as the CISO. The trust imperative will force firms to accept that cybersecurity is a core competency, requiring CISOs to become CTrOs to inspire trust and secure the future. Attend this keynote to:
- Understand how informal customer-facing activity helped train CISOs to step in as CTrOs.
- Learn how the CTrO role helps CISOs escape the clutches of IT to truly become a C-level executive.
- Find out how other CISOs became CTrOs: some by design and some by accident.
- Discover the essential elements of the CTrO organization and responsibilities.
Speakers:
Jeff Pollard, VP, Principal Analyst, Forrester
Keynote Panel: Take A Zero Trust Approach To Threat Prevention, Detection, And Response
This panel, moderated by Forrester Research VP, Group Director, Laura Koetzle, will be a dynamic discussion of threat prevention, detection, and response using Zero Trust principles by security experts from technology partners. Forrester’s Zero Trust model of information security protects data and systems by denying access to applications and data by default, implementing security monitoring, and automating response actions. Attend this session to see how these capabilities work together as a comprehensive security approach.
Speakers:
Laura Koetzle, VP, Group Director, Forrester
Chris Meenan, VP Product Management, IBM
Jerry Caponera, General Manager, Cyber Risk Quantification Products, ThreatConnect
Ryan Bowman, Director of Solutions Engineering, ThreatLocker
Marketplace Break
Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.
Check out our Sponsor Spotlights to learn more about the next great solution for your team. See below for the list of spotlights during this time.
Attend one session:
Critical Start: Reduce Risk Through Increased Cybersecurity Team Productivity
As cybersecurity leaders and managers prepare for scrutiny on spending budgets due to macro inflationary pressures, organizations are looking to automation and managed services providers to realize more value from their technical security controls investments. Learn how you can reduce your organizational risk and improve your security posture by focusing on increasing the effectiveness of your security operations center through metric-driven productivity gains.
Speakers:
Chris Carlson, SVP Product, Critical Start
ThreatConnect: Using data to drive cyber risk quantification and ROI based mitigation
According to recent reports, 70% of Security and Risk Management (SRM) leaders will be deploying Cyber Risk Quantification (CRQ) solutions that are driven by statistical and machine learning techniques in the next two years. ThreatConnect RQ is the only CRQ solution that provides multiple models for calculating cyber risk in financial terms including FAIR, Semi Automated FAIR, and Machine Learning / Statistical methods. This session will provide an overview of CRQ, how and where various models apply, and how you can rapidly deploy and make actionable recommendations from CRQ using a data driven approach.
Speakers:
Jerry Caponera, General Manager, Cyber Risk Quantification Products, ThreatConnect
AfterWords: From CISO to Chief Trust Officer: The Next Step Forward In CISO Career Paths
Ever wanted a chance to go backstage and be a part of the conversations that go on in the Green Room? Well now is your time! In this casual Q&A session, our opening keynote, Jeff Pollard, will be available to answer any questions you had coming out of his session.
Speakers:
Jeff Pollard, VP, Principal Analyst, Forrester
Executive Leadership Exchange (Invite-Only): Workshop - Building A Healthy Security Team Culture
For years, the cybersecurity industry has suffered from both a staff and skills shortage. Forrester has determined much of it is self-inflicted – the result of counterproductive practices for recruiting, training, and retaining people and a well-deserved reputation for fostering toxic cultures. This session will allow the participants to deep dive into these issues, and share how they can instill the behavioral norms that will reshape any team into a healthy and high-performing one.
Speakers:
Jinan Budge, VP, Principal Analyst, Forrester
Heidi Shey, Principal Analyst, Forrester
Breakout Sessions
Case Study Sessions
Hear real world case studies showcasing the value of partnering with the right technology provider.
Attend one session:
BeyondTrust: Best Practices: Privileged Access Management Security and Privilege Protection
The term best practice is used a lot, and the definition can differ between organizations based on risk appetite and tolerance. Similarly, the term, ‘PAM’ is also often mis or overused. This session will look at how PAM is defined today, understanding how privileges are used within your organization, and some useful tips to start or mature your security model. This will help your organization move towards just-in-time and a Zero Trust security model.
Speakers:
Jason Silva, Senior Solutions Architect, BeyondTrust
CyberProof: Unexpected Benefits of Large-Scale Cloud Native Security Architectures
CyberProof transformed a global insurance company in a highly regulated market to a cloud native architecture. As an early adopter of the Microsoft security stack including the Microsoft Sentinel SIEM, CyberProof and our client overcame many challenges to meet the needs of this complex transformation while achieving many expected and unexpected benefits. As a result, we believe the cloud native security architecture is the future and the time to transform is now. Attend this session to understand why.
Speakers:
Tony Velleca, CEO, CyberProof
KnowBe4: Building a Security and Risk Conscious Culture
In this session, participants will better understand how to achieve a higher impact security culture and how to view awareness through the lens of organizational culture.
Speakers:
Joanna Huisman, SVP of Strategic Insights & Research, KnowBe4
Kyndryl: Learn Lessons from Hundreds of Ransomware Recoveries and Help Cybergeddon
Cyberattacks and ransomware incidents are increasing in frequency and complexity. Successful attacks can be swift and crippling, leading to a ‘Cybergeddon’. Recovery can often take weeks and taxes the delivery teams. Learn from experts who have led recoveries from over hundreds of ransomware and other cyber incidents over the past years, talk about their learnings and best practices for recovering from such attacks and maintaining the core purpose and integrity under duress
Speakers:
John Greenough, Head of Market Relations, Security & Resiliency, Kyndryl
Rhonda Childress, Chief Innovation Officer, Kyndryl
Onspring: Success Story Spotlight: American Family Insurance
Development in Onspring can be very rapid, but what do you do when everything around you is changing? Learn how to navigate your use of Onspring while your business, the processes, and roles continue to change. This session will also review how you can integrate Onspring with other internal technologies, and share advice on how to avoid breaking existing infrastructure and harmonize cross-functional teams.
Speakers:
John Aaholm, GRC Technology Lead, American Family Insurance
Lunch & Marketplace Break
Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.
Check out our Sponsor Spotlights to learn more about the next great solution for your team. See below for the list of spotlights during this time.
Attend one session:
IBM: IBM Security Active Governance Services (AGS) and Xacta® Demo
Come see the power of automation in the new tailored IBM Security AGS solution that operationalizes cybersecurity compliance and ensures both time-and cost-effectiveness. In this demo you will learn how the most time-consuming tasks of compliance can be automated and streamlined such as control selection, implementation, validation, continuous monitoring, and more.
Speakers:
Evelyn Anderson, IBM Distinguished Engineer, IBM Master Inventor, IBM
Hugh Barrett, Chief Product Officer, Xacta
Orca Security: Cloud Security - How Attackers Get to your Data
You might think your storage bucket is secure because your CSPM is not flagging any misconfigurations. But does that stop an attacker from finding a path? In this session, we will review Orca’s agentless CNAPP solution and how context prioritizes risk to assets and business impact.
Speakers:
Gus Evangelakos, Director of Field Engineering, Orca Security
Reciprocity: See Risk Differently! Start with your Business Priorities!
LThe impact of risk on business priorities can be hard to see making InfoSec investments difficult to justify. Yet, it’s your responsibility to help your Executives choose the right level of investment to defensibly protect your company as it operates, grows and expands. Join Reciprocity as we discuss how a unified, real-time view of risk —framed around your business priorities—provides the contextual insight needed to clearly communicate with key stakeholders to make smart, strategic decisions.
Speakers:
Lori McKellar, Senior Director - Product Marketing, Reciprocity
Veterans Appreciation Lunch
Leading up to Veterans Day, we invite all those who have served or are currently serving our country to join us for a special appreciation lunch.
Government Lunch Meetup
Connect with your fellow peers in Public Sector for a private networking lunch.
Breakout Sessions
Case Study Sessions
Hear real world case studies showcasing the value of partnering with the right technology provider.
Attend one session:
Censys: Using Censys to Discover Russian Ransomware C2 Networks
On June 24, 2022, Censys uncovered two Russian hosts leveraging a publicly-available Command and Control tool, a commercial exploit tool, direct links to two Bitcoin nodes, and ransomware kits tied to the Medusa Locker ransomware group by leveraging JARM and certificate pivoting as well as investigating historical postures of said hosts. We will walk you through this process and provide you with the playbook necessary to launch your own proactive threat hunts.
Speakers:
Matt Lembright, Director of Federal Applications, Censys
Illumio: Zero Trust Segmentation – ROI every step of the way
Segmentation projects have long suffered because traditional network centric approaches are overly complex, and are often unable to show any benefit until fully executed. Zero Trust Segmentation is different. Decoupled from the infrastructure, and focused on providing value at each step it enables agencies to progressively adopt microsegmentation to reduce the threats of ransomware and breaches, and continuously increase their cyber resilience – across data centre, endpoint and cloud. Join this session to find out how.
Speakers:
Gary Barlet, Federal Chief Technology Officer, Illumio
Interos: Supply Chain Resilience in a Time of Techtonic Geopolitical Shifts
For decades, the confluence of globalization and digitization drove supply chains toward increasing complexity, optimization, opaqueness, and insecurity. These physical and digital ties are fracturing at a rapid pace along geopolitical fault lines, powered by growing interstate hostilities, global trade wars, the Splinternet and emerging technologies, and an unprecedented pace of regulatory change. This session will detail the challenges and opportunities associated with these ‘techtonic’ shifts and how organizations can take steps toward greater resilience during significant geopolitical uncertainty.
Speakers:
Dr. Andrea Little Limbago, VP of Research and Analytics , Interos
OneTrust: Scaling Trust by Design
Telus is on a mission to drive meaningful change — from transforming healthcare to making our food supply more sustainable to reducing our environmental footprint while connecting Canadians in need. Pam Snively has played a pivotal role in this transformation – evolving alongside the business from Chief Privacy Officer to the company’s first Chief Trust Officer. In this session she will share her journey transforming privacy, ethics, and data literacy at Telus to extend trust and make a meaningful impact.
Speakers:
Jason Sabourin, GRCP, CIPP/E, CIPM, CSPO Director, Product Management, OneTrust
Pam Snively, Chief Data & Trust Officer, TELUS
Tessian: Simplifying Email Data Loss Prevention with Behavioral Intelligence
Organizations are routinely faced with combating unknown risks and humans making mistakes that policies cannot predict. The impact can be catastrophic since investigating and mitigating these incidents drains time and resources. There is a simpler option that allows a deeper understanding into data loss prevention. Join B. Riley Financial and Tessian as we discuss how to reduce insider threat and data loss risk with a behavioral intelligence based approach.
Speakers:
Aaron J. Goodwin, Chief Information Security Officer , B. Riley Financial
Jen Gerhart, Senior Customer Success Manager, Tessian
Marketplace Break
Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.
Check out our Sponsor Spotlights to learn more about the next great solution for your team. See below for the list of spotlights during this time.
Attend one session:
Code42 Incydr Prevents Data Loss from Insiders
Attendees will learn how Code42 Incydr, the leading Insider Risk Management solution, helps security teams detect, investigate and contain data loss. Combining the strengths of DLP, CASB, UEBA and Security Education and Awareness, Incydr stops data loss and theft without disrupting legitimate collaboration in cloud-based, hybrid work environments. This presentation addresses protection of valued IP – source code, business plans, Salesforce lists, regulated data – from moving to untrusted locations like Git, Google Drive, OneDrive and iCloud.
Speakers:
Joe Payne, President & CEO, Code42
StrikeReady: Performance-Enhancing AI-based Cyber Assistant
Ever faced with a time crunch and wanted to delegate some tasks? Or do you want to automate end-to-end without the pain of writing playbooks? Have you wondered what tools other cyber defenders use to handle certain situations? You’re not alone. StrikeReady has democratized human intelligence with the first-ever AI-based cyber assistant, CARA, so you can augment your skills, knowledge, and scale. Get to know CARA at this session.
Speakers:
Anurag Gurtu, Chief Product Officer, StrikeReady
Analyst-Led Meetups
Spend some time in these small, interactive group roundtable discussions focused on key security topics. Forrester analysts will kick-off the discussion, but bring your topic or question to the meetup and help spark the conversation. First-come, first-served.
Attend one session:
Real Talk: What XDR is and How and When to Leverage It
During this session, you will learn from your peers how they are approaching extended detection and response (XDR). Below are the topics we’ll explore during our conversation.
- What is extended detection and response (XDR) beyond the buzzword?
- What dependencies and requirements do you need to consider before leveraging XDR?
- What are the top benefits and challenges security teams find using XDR?
Speakers:
Allie Mellen, Senior Analyst, Forrester
Balancing IAM with Employee Experience
During this session, you will learn from your peers how they are approaching the optimization of security and convenience for workforce identity access management and governance. Below are the topics we’ll explore during our conversation.
- Joiner/Mover/Leaver user workflows and associated identity process challenges and improvements considering new remote workforce reality
- Using the “passwordless journey” as a contributor to improving the digital employee experience
- Reducing IAM operational burden to improve employee experience for those in support services, systems administration, and security operations roles
Speakers:
Geoff Cairns, Principal Analyst, Forrester
Securing cloud native technologies
During this session, you will learn from your peers how they are approaching Securing cloud native technologies. Below are the topics we’ll explore during our conversation.
- What are the challenges of securing containers.
- What goes into securing serverless applications and their ecosystem.
- What are the benefits of infrastructure as code (Iac) security.
Speakers:
Janet Worthington, Senior Analyst, Forrester
Keynote Panel: Insider Risk Reduction Requires Two Parts Culture, One Part Security
Insider incidents are responsible for almost a quarter of data breaches. Data breaches, however, are not the only risk that can be triggered by insiders. Organizations have to address the risk posed by insiders through accidental disclosure, policy violations, and malicious actions. Reducing insider risk, however, requires more of a cultural approach than a security-centric strategy. This panel will discuss an insider risk approach that focuses on the people, not technology.
Speakers:
Joseph Blankenship, VP, Research Director, Forrester
Alla Valente, Senior Analyst, Forrester
Dr. Deanna D. Caputo, Chief Scientist for Insider Threat Capabilities and Senior Principal Behavioral Psychologist , MITRE
Ryan Boyer, Insider Threat Program Manager, CISA
Keynote: Adopt Minimum Viable Security To Drive Trust
Business leaders prioritize both innovation and security — minimum viable security (MVS) bridges the two by aligning security requirements with the product’s context and the development team’s agility. MVS enables security leaders to contribute directly to the early-stage products that drive hypergrowth. During this session, we will:
- Explore why security teams struggle to support rapid prototyping and concept testing … and why that matters.
- Explain how an MVS approach adds the right level of security into early-stage products and positions them for security success later, without stymieing innovation today.
- Provide a framework and best practices to help security leaders understand what security issues to prioritize during early-stage product development.
Speakers:
Sandy Carielli, Principal Analyst, Forrester
Closing Remarks
with Stephanie Balaouras, VP, Group Director, Forrester
Early Access
Nov 7- 1:00 pm – 1:30 pm ETDiversity, Equity, Inclusion
Tuesday
Nov 8- 10:00 am – 11:20 am ETOpening Remarks & Keynotes
- 12:00 pm – 1:05 pm ETBreakout Session
- 2:05 pm – 3:45 pm ETBreakout & Case Study Sessions
- 4:30 pm – 5:45 pm ETKeynote Sessions
Wednesday
Nov 9- 9:30 am – 10:50 am ETKeynote Sessions
- 11:30 am – 12:35 pm ETBreakout & Case Study Sessions
- 1:35 pm – 2:40 pm ETBreakout & Case Study Sessions
- 3:20 pm – 4:35 pm ETKeynote Sessions & Closing Remarks
Tuesday Nov 8
Welcome & Opening Remarks
with Stephanie Balaouras, VP, Group Director, Forrester
Keynote: Securing The Future: Geopolitical Risk Will Redefine Security Strategies For The Next Decade
Globalization and international cooperation have passed their peak, thanks to global supply chain challenges and the threat of a third world war. As global powers work to protect themselves from the fallout, enterprises must prepare for how these changing global dynamics will affect their strategy and their security policies. Attend this keynote for insights into how geopolitical tension will define the next decade and how to adapt your security strategy to mitigate your risk.
Speakers:
Renee Murphy, Principal Analyst, Forrester
Allie Mellen, Senior Analyst, Forrester
Keynote: Privacy And The Immersive Experiences Of The Future
The metaverse does not exist yet. But the promise of a future defined by interoperable, immersive platforms is already driving companies’ investments, changing customer expectations, and shaping new engagement models. Individuals’ personal data, trusted identities, and attributes are fundamental pillars to achieve the promise of immersive digital experiences of the future. While many have plans on how to exploit sensitive personal data, only a few know how to keep them safe. Join this session to:
- Learn how the demand and the collection of individuals’ personal data will evolve as digital experiences become more immersive and intelligent.
- Assess the privacy risks of immersive experiences of the future.
- Design a privacy approach fit for future immersive experiences.
Speakers:
Enza Iannopollo, Principal Analyst, Forrester
Breakout Sessions
Case Study Sessions
Hear real world case studies showcasing the value of partnering with the right technology provider.
Attend one session:
Key Resources: Understanding Mainframe Integrity Vulnerabilities
The integrity of mainframe data and software is critical to the success of your business. Understanding mainframe integrity is a critical component of security strategies. It isn’t just about user authentication/ authorization. An appropriate analogy is locking the front door to your house but leaving your windows open. Learn what is a mainframe integrity vulnerability, why you care, what responsibilities you have with regards to integrity, what you can I do to stay compliant.
Speakers:
Ray Overby, Co-Founder & CTO, Key Resources Inc.
Reciprocity: SumTotal’s Journey From Zero to Strategic Risk Management
Is your organization strong on compliance but lacking when it comes to risk management? Join Sean McClanahan, Compliance Manager of SumTotal’s Cloud Operations (part of Cornerstone OnDemand), and Rob Ellis, SVP of Product Strategy at Reciprocity, as they discuss SumTotal’s journey from a foundational risk program to a strategic approach that ties risk to business priorities. You’ll leave seeing risk differently, delivering better outcomes with less effort and more effectively communicating risk to the C-Suite and Board.
Speakers:
Rob Ellis, Senior Vice President of Product Strategy, Reciprocity
Sean McClanahan, Compliance Manager, SumTotal (part of Cornerstone OnDemand)
Tanium: Transformative Approach to Endpoint Management & Risk Mitigation
Hear from CIOs Jake McClean and Tom Molden on using a transformative approach to IT Operations, Risk Mitigation & Threat Response. They will cover how Tanium uses converged endpoint management to see, control, and remediate every endpoint for Tanium’s thousands of employees around the world, all while getting their weekends back and enabling a more streamlined IT and security organization.
Speakers:
Jake McClean, CIO, Tanium
Tom Molden, CIO Sales, Tanium
ThreatLocker: The Total Economic Impact™ Of ThreatLocker
In this case study, users will learn about the key challenges regarding the cybersecurity landscape that’s solved with the ThreatLocker Solution as well as the cost-benefit analysis and total economic impact it had on it’s users
Speakers:
Ryan Bowman, Director of Solutions Engineering, ThreatLocker
Breakout Sessions
Case Study Sessions
Hear real world case studies showcasing the value of partnering with the right technology provider.
Attend one session:
Code42: The Impact of Cultural Drift on Data Protection
Every organization’s culture has a true north that demonstrates how secure that organizations’ data is. As security leaders, we have a choice – is it better to correct behavioral drift away from this true north at the time it happens or give it free reign to establish a new norm? Join to learn more about the critical role culture plays in building a security aware organization as new technologies bring new vectors for data exposure when behavior is unchecked.
Speakers:
Rob Juncker, CTO, Code42
Confiant: Why malvertising matters to your endpoint defense
The digital landscape has dramatically evolved over the past ten years. Phishing, malware attacks and crypto scams using ads as a vector are on the rise. Sophisticated cyber criminals are a threat to any digital user and enterprise organization. This case study will go into detail and provide insight into the detection of Mac malware attacks, malware families and notarized Mac malware.
Speakers:
Louis-David “LD” Mangin, CEO and Co-Founder, Confiant
IBM: How Bed Bath & Beyond scaled their security and risk management program with IBM Security
With nearly a thousand stores and decades as a leading retailer, Bed Bath & Beyond always has the security of its business assets and its customers’ sensitive information as a top priority. As they’ve battled the impact of COVID, as well as changes in strategic direction that are impacting many large organizations, it’s become even more critical to enhance the cybersecurity efforts via policy and standards analysis, risk quantification, and the continuous safeguarding of customers credit card data. Join us for this session, to hear about the on-going journey of building out a leading program in information security and risk management, as well as where they plan to focus on staying ahead of future threats.
Speakers:
Tameka Foster, Director, Risk Operations Center, Bed Bath & Beyond
Rebecca Dodson, Partner, Security Strategy Risk & Compliance, Americas, IBM Security
StrikeReady: Cyber Warfare: Transforming SOC through Adaptive Defense
Geopolitical issues have spilled from urban warfare into cyber warfare, adding a new challenge to security programs. Consequently, we implemented an Active Defense strategy to bolster our defense against aggressive adversaries and respond effectively, as well as transform our Security Operations Center (SOC). This yielded astonishing results, and I’d like to share the blueprint with you.
Speakers:
Wasif Khan, V.P. InfoSec Operations, CNA Insurance
ThreatConnect: Quantifying cyber risk in financial terms
Cyber risk is a continuously changing risk that companies struggle to understand and mitigate. Many companies today try to measure and communicate cyber risk with heat maps, technical metrics, or with subjective analysis. ThreatConnect and Snowflake, an RQ customer, will walk you through a case study to describe how quantified risk is being used to identify, communicate and begin to mitigate cyber risk in a data driven, defensible manner.
Speakers:
Josh Mckibben, Director of Global Security Compliance & Risk , Snowflake
Jerry Caponera, General Manager, Cyber Risk Quantification Products, ThreatConnect
Breakout Sessions
Guest Keynote - ICS Threats: From Pipe Dream To PIPEDREAM
Threats to industrial control systems (ICS) and critical infrastructure are nothing new. What’s changed is the pervasiveness of the ability to carry out cyber-attacks against these systems and the geopolitical environment which makes these systems prime targets by adversaries. Robert M. Lee, CEO and Co-founder of Dragos will discuss ICS threats from cascading IT attacks to today’s ICS-focused malware as well as strategies for defending modern infrastructure.
Speakers:
Robert M. Lee, CEO & Co-Founder, Dragos
Keynote: Unleash Your Potential With ZTE
Amidst the cacophony of Zero Trust messaging, Zero Trust Edge has emerged as an ideal technology for security leaders to embrace. The combination of networking and security controls positions ZTE as a simple solution for multiple problems and accelerates overall ZT adoption. This session will focus on the following areas:
- ZTE- what it is, and what it isn’t
- How ZTE enables edge computing
- How and why to apply ZTE from an organizational perspective
Speakers:
Heath Mullins, Sr. Analyst, Forrester
Wednesday Nov 9
Keynote: From CISO To Chief Trust Officer: The Next Step Forward In CISO Career Paths
Sparked by the trust imperative and in response to companies moving away from business models that put them at odds with their customers, a new C-suite role has emerged: chief trust officer. It’s also the next step in the career path for CISOs. No other role in the C-suite brings the insights and empathy necessary to become an effective CTrO as the CISO. The trust imperative will force firms to accept that cybersecurity is a core competency, requiring CISOs to become CTrOs to inspire trust and secure the future. Attend this keynote to:
- Understand how informal customer-facing activity helped train CISOs to step in as CTrOs.
- Learn how the CTrO role helps CISOs escape the clutches of IT to truly become a C-level executive.
- Find out how other CISOs became CTrOs: some by design and some by accident.
- Discover the essential elements of the CTrO organization and responsibilities.
Speakers:
Jeff Pollard, VP, Principal Analyst, Forrester
Keynote Panel: Take A Zero Trust Approach To Threat Prevention, Detection, And Response
This panel, moderated by Forrester Research VP, Group Director, Laura Koetzle, will be a dynamic discussion of threat prevention, detection, and response using Zero Trust principles by security experts from technology partners. Forrester’s Zero Trust model of information security protects data and systems by denying access to applications and data by default, implementing security monitoring, and automating response actions. Attend this session to see how these capabilities work together as a comprehensive security approach.
Speakers:
Laura Koetzle, VP, Group Director, Forrester
Chris Meenan, VP Product Management, IBM
Jerry Caponera, General Manager, Cyber Risk Quantification Products, ThreatConnect
Ryan Bowman, Director of Solutions Engineering, ThreatLocker
Breakout Sessions
Case Study Sessions
Hear real world case studies showcasing the value of partnering with the right technology provider.
Attend one session:
BeyondTrust: Best Practices: Privileged Access Management Security and Privilege Protection
The term best practice is used a lot, and the definition can differ between organizations based on risk appetite and tolerance. Similarly, the term, ‘PAM’ is also often mis or overused. This session will look at how PAM is defined today, understanding how privileges are used within your organization, and some useful tips to start or mature your security model. This will help your organization move towards just-in-time and a Zero Trust security model.
Speakers:
Jason Silva, Senior Solutions Architect, BeyondTrust
CyberProof: Unexpected Benefits of Large-Scale Cloud Native Security Architectures
CyberProof transformed a global insurance company in a highly regulated market to a cloud native architecture. As an early adopter of the Microsoft security stack including the Microsoft Sentinel SIEM, CyberProof and our client overcame many challenges to meet the needs of this complex transformation while achieving many expected and unexpected benefits. As a result, we believe the cloud native security architecture is the future and the time to transform is now. Attend this session to understand why.
Speakers:
Tony Velleca, CEO, CyberProof
KnowBe4: Building a Security and Risk Conscious Culture
In this session, participants will better understand how to achieve a higher impact security culture and how to view awareness through the lens of organizational culture.
Speakers:
Joanna Huisman, SVP of Strategic Insights & Research, KnowBe4
Kyndryl: Learn Lessons from Hundreds of Ransomware Recoveries and Help Cybergeddon
Cyberattacks and ransomware incidents are increasing in frequency and complexity. Successful attacks can be swift and crippling, leading to a ‘Cybergeddon’. Recovery can often take weeks and taxes the delivery teams. Learn from experts who have led recoveries from over hundreds of ransomware and other cyber incidents over the past years, talk about their learnings and best practices for recovering from such attacks and maintaining the core purpose and integrity under duress
Speakers:
John Greenough, Head of Market Relations, Security & Resiliency, Kyndryl
Rhonda Childress, Chief Innovation Officer, Kyndryl
Onspring: Success Story Spotlight: American Family Insurance
Development in Onspring can be very rapid, but what do you do when everything around you is changing? Learn how to navigate your use of Onspring while your business, the processes, and roles continue to change. This session will also review how you can integrate Onspring with other internal technologies, and share advice on how to avoid breaking existing infrastructure and harmonize cross-functional teams.
Speakers:
John Aaholm, GRC Technology Lead, American Family Insurance
Breakout Sessions
Case Study Sessions
Hear real world case studies showcasing the value of partnering with the right technology provider.
Attend one session:
Censys: Using Censys to Discover Russian Ransomware C2 Networks
On June 24, 2022, Censys uncovered two Russian hosts leveraging a publicly-available Command and Control tool, a commercial exploit tool, direct links to two Bitcoin nodes, and ransomware kits tied to the Medusa Locker ransomware group by leveraging JARM and certificate pivoting as well as investigating historical postures of said hosts. We will walk you through this process and provide you with the playbook necessary to launch your own proactive threat hunts.
Speakers:
Matt Lembright, Director of Federal Applications, Censys
Illumio: Zero Trust Segmentation – ROI every step of the way
Segmentation projects have long suffered because traditional network centric approaches are overly complex, and are often unable to show any benefit until fully executed. Zero Trust Segmentation is different. Decoupled from the infrastructure, and focused on providing value at each step it enables agencies to progressively adopt microsegmentation to reduce the threats of ransomware and breaches, and continuously increase their cyber resilience – across data centre, endpoint and cloud. Join this session to find out how.
Speakers:
Gary Barlet, Federal Chief Technology Officer, Illumio
Interos: Supply Chain Resilience in a Time of Techtonic Geopolitical Shifts
For decades, the confluence of globalization and digitization drove supply chains toward increasing complexity, optimization, opaqueness, and insecurity. These physical and digital ties are fracturing at a rapid pace along geopolitical fault lines, powered by growing interstate hostilities, global trade wars, the Splinternet and emerging technologies, and an unprecedented pace of regulatory change. This session will detail the challenges and opportunities associated with these ‘techtonic’ shifts and how organizations can take steps toward greater resilience during significant geopolitical uncertainty.
Speakers:
Dr. Andrea Little Limbago, VP of Research and Analytics , Interos
OneTrust: Scaling Trust by Design
Telus is on a mission to drive meaningful change — from transforming healthcare to making our food supply more sustainable to reducing our environmental footprint while connecting Canadians in need. Pam Snively has played a pivotal role in this transformation – evolving alongside the business from Chief Privacy Officer to the company’s first Chief Trust Officer. In this session she will share her journey transforming privacy, ethics, and data literacy at Telus to extend trust and make a meaningful impact.
Speakers:
Jason Sabourin, GRCP, CIPP/E, CIPM, CSPO Director, Product Management, OneTrust
Pam Snively, Chief Data & Trust Officer, TELUS
Tessian: Simplifying Email Data Loss Prevention with Behavioral Intelligence
Organizations are routinely faced with combating unknown risks and humans making mistakes that policies cannot predict. The impact can be catastrophic since investigating and mitigating these incidents drains time and resources. There is a simpler option that allows a deeper understanding into data loss prevention. Join B. Riley Financial and Tessian as we discuss how to reduce insider threat and data loss risk with a behavioral intelligence based approach.
Speakers:
Aaron J. Goodwin, Chief Information Security Officer , B. Riley Financial
Jen Gerhart, Senior Customer Success Manager, Tessian
Keynote Panel: Insider Risk Reduction Requires Two Parts Culture, One Part Security
Insider incidents are responsible for almost a quarter of data breaches. Data breaches, however, are not the only risk that can be triggered by insiders. Organizations have to address the risk posed by insiders through accidental disclosure, policy violations, and malicious actions. Reducing insider risk, however, requires more of a cultural approach than a security-centric strategy. This panel will discuss an insider risk approach that focuses on the people, not technology.
Speakers:
Joseph Blankenship, VP, Research Director, Forrester
Alla Valente, Senior Analyst, Forrester
Dr. Deanna D. Caputo, Chief Scientist for Insider Threat Capabilities and Senior Principal Behavioral Psychologist , MITRE
Ryan Boyer, Insider Threat Program Manager, CISA
Keynote: Adopt Minimum Viable Security To Drive Trust
Business leaders prioritize both innovation and security — minimum viable security (MVS) bridges the two by aligning security requirements with the product’s context and the development team’s agility. MVS enables security leaders to contribute directly to the early-stage products that drive hypergrowth. During this session, we will:
- Explore why security teams struggle to support rapid prototyping and concept testing … and why that matters.
- Explain how an MVS approach adds the right level of security into early-stage products and positions them for security success later, without stymieing innovation today.
- Provide a framework and best practices to help security leaders understand what security issues to prioritize during early-stage product development.
Speakers:
Sandy Carielli, Principal Analyst, Forrester