PAST EVENTS

Data Breaches: Defending Against and Responding To

 

Strategies to help your organization prepare for, defend against and respond to breaches.

 

December 14, 2021

 

9:00am-4:00pm CDT; 10:00am-5:00pm EDT

 

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: ONLINE 

      


Overview

 

It is not a matter of if, but when your organization will be breached. Against these threats, enterprises try to build higher and more secure walls around their data and networks. This seems to be a never-ending arms race, as even the most sophisticates systems may, before long, present weaknesses that malicious technology can overcome.


What You Will Learn

 

In this one day conference attendees will learn:

  • How to Stop Ransomware with Autonomous Response
  • How to Reduce Ransomware Dwell Time
  • Fortifying Your Defenses – a CISO’s Perspective (Fireside Chat)
  • Breaches & Ransomware: How to Handle, How to Respond (Panel Discussion)
  • How to Prevent Data Breaches through the Back Door – DNS

Conference Price: $0.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


9:00am-10:00am:  Fireside Chat: A CISO’s Perspective on Fortifying Your Defenses

 

Fred Kwong, Ph.D., AVP of Security, Identity, and Operations / CISO, Delta Dental Plans Association

 

Kwong

 


10:00am-10:30am: Refreshment Break

 


10:30am-11:30am: How to Reduce Ransomware Dwell Time

 

David Sylvester, Vice President of Cybersecurity, Lumu Technologies

 

According to one recent report, the average dwell time for a ransomware attack is 43 days. Every day an attacker is inside the network increases the chances that an incident will evolve into a full blown data breach which is why security teams need to prioritize Attack Dwell Time (ADT) as the most critical performance metric. This session will explain how to quantify ADT and how to reduce it.

 

Sylvester

 


11:30am-12:30pm:  Stopping Ransomware with Autonomous Response

 

Brianna Leddy, Director of Analysis, Darktrace

 

New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.

 

In this session Brianna Leddy, Darktrace’s Director of Analysis, will unpack some of today’s most advanced ransomware threats.

 

Uncover how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.

 

This presentation will discuss:

  • Recent ransomware threat trends, including double extortion and RDP attacks
  • How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office
  • Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day

 

Leddy

 


12:30pm-1:30pm: Luncheon

 


1:30pm-2:30pm: Breaches & Ransomware: How to Handle, How to Respond (Panel Discussion)

 

Moderator: Annur Sumar, Chief Technology Officer, Cloud Unity

 

Panelists will include:

  • John Germain, Chief Information Security Officer, Duck Creek Technologies
  • Victor Hsiang, Chief Information Security Officer, GATX
  • Other IT CISOs sharing experiences and lessons learned

 

 

 

Sumar            Germain       Hsiang

 


2:30pm-3:00pm: Refreshment Break

 


3:00pm-4:00pm: Preventing Data Breaches Through the Back Door – DNS

 

Krupa Srivatsan, Director of Cybersecurity Product Marketing, Infoblox

 

Data breaches cause business disruption, brand damage and loss of productivity. Today, data resides everywhere as networks get more complex and more distributed than ever, and employees work from anywhere. This means protecting your data becomes much more difficult. Data can be stolen from a network via various channels but there is one back door that attackers often use – your DNS.

 

Join this session to learn:

  • How data exfiltration over DNS works
  • What detection methods can be used and
  • Best practices for a unified and fast data breach response

 

 

Srivatsan

 


Conference Price: $0.00 per person

 

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

 

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the breaks, you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


CONFERENCE CO-SPONSORS