December 10 - 12, 2018
The Ritz-Carlton, Amelia Island, FL

Monday, December 10, 2018

11:00 am - 11:45 am Registration

11:45 am - 1:15 pm Networking Lunch

1:15 pm - 1:25 pm Orientation

1:25 pm - 1:35 pm Chairperson's Opening Remarks

1:35 pm - 2:05 pm True Cyber-Resilience: Merging the Capabilities of Cybersecurity, Business Continuity and Enterprise Resilience

The growing number of information security breaches and attacks are a top threat to business operations. Integrating incident response and continuity planning with enterprise risk management empowers well-coordinated actions in the case of an actual event. Accountability, transparency and continuous improvement are key attributes to sound risk management. The core of information security risk management merges governance, emerging technologies, system hardening and cultural awareness. Enterprises control readiness and must balance sustainable programs that safeguard information along with meeting the organizational business objectives.
 In this session:
  • Leveraging investments and creating a consistent cyber defense
  • Emphasizing best practices with authentication, patching, vulnerability management and penetration testing
  • Improving security training and providing clear protocols of escalation
Providing consistent and coordinated information

2:05 pm - 2:35 pm Evolving Threat Hunting: Ransomware, Wannacry, Continual Creepers, What’s Next?

Cyber criminals continue to successfully penetrate and exploit corporate networks mining for data. Proactive hunting and mitigating of potential security incident is necessary since current cyber threats are often missed by traditional tools.  Threat hunting assumes a breach with the focus on quickly detecting and responding with clear visibility of the network and endpoints. In this session, explore the necessary proactive stance along with the current types of threats.
•Developing corporate threat hunting capabilities as an integral tool
•Gaining insights into leading threat trends
•Exploring the weaponizing of AI, malware, and other threat vectors

2:40 pm - 3:10 pm Business Meetings

3:10 pm - 3:40 pm Business Meetings

3:40 pm - 4:10 pm Business Meetings

Master Class

4:15 pm - 5:00 pm Levers of Human Deception: Science and Methodology Behind Social Engineering
Erich Kron - Security Awareness Advocate KnowBe4
No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different lever that social engineers and scam artists pull to make us more likely to do their bidding.

Join Enrich Kron CISSP, Security Awareness Advocate at KnowBe4, as he provides fun and engaging examples of mental manipulation in everyday life: from the tactics used by car dealers, to sophisticated social engineering and online scams. Additionally, he'll look at how to ethically use the very same levers when educating our users.

Key Takeaways:

  • The Perception vs. Reality Dilemma
  • Understanding the OODA (Observe, Orient, Decide, Act) Loop
  • How social engineers and scam artists achieve their goals by subverting OODA Loop's different components
  • How we can defend ourselves and our organizations

img

Erich Kron

Security Awareness Advocate
KnowBe4

BrainWeave

4:15 pm - 5:00 pm When Shrinkage is Good- Reduce Incident Response from Hours to Minutes


5:00 pm - 5:15 pm Networking Break

Ignite Session : 3 Quick Fire Presentations in 30 Minutes. Talk about getting to the crux of the matter, fast!

5:15 pm - 5:25 pm Securely Share Files Beyond Your Enterprise Borders with Full Governance and Control


Ignite Session : 3 Quick Fire Presentations in 30 Minutes. Talk about getting to the crux of the matter, fast!

5:25 pm - 5:35 pm AI- Anticipating Attacks or Striking Back?


Ignite Session : 3 Quick Fire Presentations in 30 Minutes. Talk about getting to the crux of the matter, fast!

5:35 pm - 5:45 pm Rising Importance of Risk Scores: Best Practice Decision Making and Appropriate Use

CISO Roundtable Discussions- Engage in your choice of targeted discussions for open exchange among industry peers.

5:50 pm - 6:30 pm A. New Defenses Against Common Attacks

CISO Roundtable Discussions- Engage in your choice of targeted discussions for open exchange among industry peers.

5:50 pm - 6:30 pm B. Reducing Cost and Complexity in Endpoint Security

CISO Roundtable Discussions- Engage in your choice of targeted discussions for open exchange among industry peers.

5:50 pm - 6:30 pm C. Achieving Visibility and Confidence with Third Party Risk Management

6:30 pm - 7:00 pm Networking Cocktail