Monday Tech Sessions

Free to attend Technical SessionsMonday, October 25, 2021

The Monday Technical Sessions are broken down into 15 different sessions from 9:30 a.m. – 3:30 p.m. Each session has a different topic led by a top leader in the field to teach on a specific training item in cyber security. 


Agenda:

8:45-9:15 AM
Join WiCyS to Discuss Opportunities to Get Involved and Support Women in Cyber Security


9:00-9:20 AM
Namaste! Meditation and Mindfulness Session
Facilitator: Clark Whiting, Sr. Security Architect, Best Buy


TECH SESSIONS 9:30-10:20 AM
Women in Cyber – Mentorships, The Circle of Life
Moderator: Tina Meeker, Sr. Director, Sleep Number
Panelists: Amy Fox, VP of Business Development, Ambient Consulting; Carey Lewis, Strategic Sales, Island;
Milinda Rambel Stone, CISO, Bremer Bank;

Mentorships are the circle of life throughout a cybersecurity or business career, and it is even more critical in providing support and unlocking career opportunities to advancing our profession to be the best it can be. Join this panel of impressive information security and business executive as they share stories and strategies to how mentorship helped boost their growth both as mentors and mentees.


Consider a Career in Cyber
Moderator: Judy Hatchett, CISO, Surescripts;
Jennifer Czaplewski, Senior Director, Cyber Security, Target;
Brigadier General Stefanie Horvath, Mobilization Assistant to the Director of Operations; Executive Director Enterprise Services, U.S. Cyber Command, MNIT; Faisel Kaleem, Professor, Department of Computer Science and Cybersecurity, Metropolitan State (MN) University; Jim Nash, Assistant Minority Leader, Minnesota House of Representatives

The session will showcase leaders in cyber security to discuss the career opportunities, salary ranges, and broad range of industries in which you can be employed, how a non-traditional tech background can be valuable and the growth opportunity for women in this traditionally male dominated field.


Taking a People-Centric Approach to Securing the Remote Workforce
Brian Reed, Director, Cybersecurity Strategy, Proofpoint

Today’s threat landscape is constantly evolving, and securing your remote workforce is critical to success. Understanding people risk and protecting your most important asset—your people— with a people-centric approach to security, should be the fundamental focus of your cybersecurity program


TECH SESSIONS 10:30-11:20 AM
Cloud Email and Collaboration Vulnerabilities
Michael Hansen, Sr Solutions Engineer, Avanan

Cloud Email and Collaboration tool has quickly become the go-to applications for remote work, accelerating dramatically in usage over the last year. Millions of users turned to Cloud Email and Collaboration Tools to help keep businesses going since the start of the pandemic —and hackers have noticed. As these tools are still relatively new, much is unknown about how it operates and how hackers will approach it. While the increased usage has been well-documented, what’s not been documented is whether the app is vulnerable to hacking. We will talk about discoveries that have already been made, potential risks that we see in the future, and how to best secure this relatively new communication vector.


Did You Just Click That!?
Michael Wyatt | Director, Threat Management | Surescripts LLC

We are all trained in our jobs and personal lives to be weary of suspicious emails and never click links or open attachments in them. But what happens when you do? We will look at phishing emails we have received and actually click links and/or open attachments to see what they try to do to our systems and accounts. Afterwards we’ll try and answer any security questions around phishing campaigns and or phishing in general.


Women in Cyber – Building & Leading Diverse Teams is an Artform
Tina Meeker, Sr. Director, Information Security, Sleep Number; Adam Mishler, VP, Global Chief Information Security Officer, Best Buy; Keely Ross, Enterprise Sales Executive, Zoom Video Communications; William Scandrett, Chief Information Security Officer, Allina Health

Building & Leading Diverse teams is an artform. Success means making a clear and visible commitment through recruiting, leading, and guiding team members through change and evolution while positioning your organization to pivot quickly to changing demographics, team member needs and market trends. Learn strategies and practices from this panel of proven architects of diverse teams.


1:30 AM-12:30 PM
Networking Break with Solutions Strategy Partners in EXPO


TECH SESSIONS 12:30 AM-1:20 PM
The Significance of AI & ML in Cybersecurity
Tom Cameron, Solutions Architect, BlackBerry powered by Cylance AI

Artificial intelligence (AI) has become a security industry buzzword so broadly applied as to become almost meaningless. When every product boasts AI capabilities, security decision makers may quickly become cynical, even in the face of the most exciting innovation shaping cybersecurity today.
• What is the benefit of a cybersecurity solution powered by Artificial Intelligence and Machine Learning?
• Why does the number of generations of AI matter?
• How smart is the AI machine?
• How does AI provide a predictive advantage to prevent breaches
for my organization?
• How can a ‘Prevention First’ cybersecurity approach help
my business?


A walk on the darkside – exposing the ransomware actors
Dave Gold, VP, Business Strategy, SentinelOne

Over the past few years, Ransomware attacks have evolved from an economic nuisance to a full-blown threat to public health, safety, and even national security. Ransomware has taken over as the malware of choice for financially motivated attacks. Ransomware groups have become professional enterprises with very profitable businesses and brands built around encrypting and holding your data hostage. While ransomware attacks are not new, many organizations are not properly prepared to handle a ransomware attack. This talk will dig into the history of ransomware, the groups and methods being used to target you, and a discussion on how to better prepare your organization to stop ransomware attacks.


Insights from Target’s Enterprise Journey to adopt FIDO
Tom Sheffield, Senior Director Technology, Target
Join us to hear Target’s journey to adopt FIDO as a primary authentication capability across the Enterprise. We will share stories of some of the challenges and obstacles we had to overcome along the way. Our goal was not to drive users to our help desk so clarity of messages was key requirement in our program so we will talk about the importance of clear communication. We will share some of the key metrics that we identified along the way and how they helped to influence our program execution.


TECH SESSIONS 1:30-2:20 PM
How to Effectively Grow your Leadership as a Cyber Security Professional?
Alex Volk, Senior Engineer, ReliaQuest

CIAM in an Uncertain World
D. Keith Casey, API Problem Solver. Okta, Inc

In today’s uncertain world, organizations must find ways to ensure their customers can engage with their services at any time, from any device, in a secure and safe manner. That is where customer identity and access management comes in or “CIAM”. A CIAM solution must not only meet today’s security and compliance standards, but also create frictionless customer experiences to meet customers where they are and in the ways they need. Join our sessions as we discuss CIAM in more detail, how priorities have shifted this year and what CIAM maturity looks like.


Key Challenges, Tips and Findings on Effective Risk Management Programs
Bob Bennett, Co-Founder, NaviLogic

Risk programs, and especially third-party risk programs, are made up of a lot of components. Based on our experience, we will talk about both the challenges and solutions we see working in the marketplace today, and give attendees some helpful ideas to help improve their risk programs in practice.



TECH SESSIONS 2:30-3:20 PM
Hacktivism: Its past, present and future and what can we learn from it
Dr. Vasileios Karagiannopoulos, Reader in Cybercrime and Cybersecurity, Portsmouth University

This talk will initially define the different dimensions of hacktivism and provide an overview of its history up to the present day. It will then discuss the organizational and tactical aspects of hacktivist groups and will highlight some lessons we can learn from past examples regarding dealing with hacktivism in the future.


Cheaper by the Dozen: Application Security on a Limited Budget
Chris Romeo, CEO, Security Journey

Everyone wants to improve application security in their organization, but what if you don’t have a million dollars to spend? How do small/medium organizations make any progress with application security? What if you could experience a catalog of application security open-source projects and receive advice on knitting them together into a program?

Explore the various application security open-source projects that exist in the OWASP universe. Learn how to choose suitable projects to match your organizational needs. Training/ awareness, process/measurement, and tools are the categories available. Each project includes purpose, a plan for use, a risk rating, human resources for success, and impact. Explore how to engage your organization with a plan, experience enormous advances, and change application security forever.


Why Asset Management Fails for Cybersecurity (and How to Fix it)
John Seaman, Regional Director, Axonius

Despite the fact that every major cybersecurity framework lists asset management as the most foundational element, security teams still struggle with the downstream impact of incomplete, inaccurate, and outdated asset data. Without an accurate understanding of everything in an environment, all other initiatives suffer.

But there’s good news. It doesn’t have to be this way.

Join this session to learn:
• How security frameworks like the CIS 20 and industry-specific mandates like NIST and HIPAA approach asset management requirements
• How previous approaches to solving asset management fall short
• How cybersecurity initiatives like incident response, vulnerability management, and CMDB reconciliation are impacted
• A new approach that leverages existing data to solve the asset management challenge for cybersecurity


3:30 PM-5:00 PM
Join us in the EXPO Hall to network with fellow attendees and connect with our Solutions Strategy Partners.


Networking Reception in EXPO

Join us after the Seminar in the EXPO Hall to network with fellow attendees and connect with our Solutions Strategy Partners.

Thank you to our Tech Session Seminar Supporters


Sponsorship Opportunities

To learn about available sponsorship opportunities, contact Jennifer Churchill at 763-548-1306 or jennifer.churchill@eventshows.com.