Opening Keynote: Getting back to the basics for effective cyber defense | 7:15 - 7:30 AM
In this age of advanced persistent threats and nation state driven cyberattacks enterprises need to focus their energies on building a strong cybersecurity foundation. In this opening keynote, Sumedh Thakar discusses the essentials of good cyber hygiene.
Summit Keynote: How cloud and big data megatrends have created the perfect storm for security | 7:30 - 8:00 AM
In this session, Jim Reavis, Founder and CEO of Cloud Security Alliance, will discuss ideas on how recent mega trends around big data, cloud, and automation have led to an unfortunate tradeoff between security and business goals
Jim Reavis, CEO and Founder, Cloud Security Alliance
Ransomware Isn’t: The true nature of digital extortion and leverage | 9 - 9:45 AM
Scott Scheferman, one of our industry's leading experts on ransomware and someone who has personally been involved in scores of ransomware recovery projects, gives us an under the hood look into the ugly realities of ransomware related extortion and the leverage used by attackers
Scott Scheferman, Principal Cyber Strategist, Eclypsium
Understanding attack motivations: What is more valuable than PII and PHI? | 9:45 - 10:30 AM
The one and only Chris Roberts teams up with Scott Scheferman and security rock star Alexandre Blanc to talk about why we must worry about much more than the PII and PHI that flows through our organizations. What could be more valuable that PII? Security data perhaps?
Scott Scheferman, Principal Cyber Strategist, Eclypsium
Fighting encryption with encryption: 10 ways to use encryption to defend against ransomware and extortion | 10:30 - 11:15 AM
In this session, Arti, Nate and Werner, deliver a quick tutorial on how enterprises can effectively use encryption for better defense against ransomware and extortion. Presented as a top ten list, this session covers ten areas where encryption can play a pivotal role in improving security posture.
Ransomware and Extortion Defense Solution Landscape | 11:15 AM - 12:00 PM
In this session David Monahan, BISO for AbbVie's Allergen BU shares his analysis on how enterprises should approach their ransomware defense strategy. This session offers a tangible framework that attendees can take back to their own organizations.
They want your data: Protecting structured and unstructured data against modern cyber attacks | 12:15 PM - 1:00 PM
In this session our presenters will showcase how to use combination of Titaniam for structured data, Seclore for unstructured data, and Rubrik for backup to creates a broadly effective ransomware and extortion resistance strategy for your enterprise.
Taking an "Assumed Breach" posture for your cyber defense | 2:15 - 2:45 PM
In this session Ashok Banerjee, VP Privacy and Security Engineering at VMWare will present a framework that assumes compromise and prepares a security controls that stand in the face of successful infiltration of an enterprises network. Neelima, Chris, and Scott will share observations on Ashok's presentation
Demo: Retaining control of the data and IP you share with partners | 2:45 PM - 3:15 PM
In this session Titaniam VP Products, Pakshi Rajan and Seclore VP Business Development, Wally Bitaut team up to demonstrate how to set up Titaniam, with additional functionality from Seclore, to ransomware proof data resident with third parties.
Building a secure and compliant foundation in the AWS cloud | 3:15 PM - 3:45 PM
This session will focus on how Symetra Financial is using cloud-native technologies aligned to well-architected build patterns to guard against data loss and ransomware events.
Chuck Chemis, Principal Cloud Architect, will describe how Symetra has deployed Landing Zones to establish a secure, compliant multi-account AWS environment. Based on best-practice blueprints, the carefully designed set of guardrails. policies and controls create the foundation for a strong, multi-layer security posture - all managed through a common governance lens. We recognize that the landscape and attack vectors are constantly shifting as to where vulnerabilities can be exploited. The bad actors only have to get it right once. As an organizations, we have to get-it-right every time in order to prevent security concerns from becoming issues.
Protecting your core security functions: Keeping your SOC healthy and immune to data compromise | 3:45 PM - 4:30 PM
In this session, Matt Chase from Palo Alto Networks Cortex XSOAR discusses how to set up their SOAR solution in a FIPS 140-2 compliant and ransomware/extortion proof manner using Titaniam. Pakshi Rajan from Titaniam does a product demonstration
OpenSearch showcases the industry’s only breach and extortion proof search platform. Case Study: FBI Leak Aug 2021 | 4:30 PM - 5:00 PM
In this session Eli Fisher and Kyle Davis from AWS OpenSearch team up with Pakshi Rajan from Titaniam to showcase the industry's only ransomware proof enterprise search platform: Titaniam enabled OpenSearch!
Ransomware, Extortion and Data Privacy? What is the connection?
In this Privacy Panel hosted by the Data Diva, Debbie Reynolds, we will discuss the inevitable connection between data compromises brought about by ransomware and the long term impact on data privacy. Jeff and Alexandre share experience driven insights on this topic.
In this session Chip Harris, an experienced ethical hacker, penetration tester, and forensic investigator, shares ideas on the scope of attacks as well as effective defense strategies from an OT perspective.
Closing Comments and non-profit support program announcement
We will close the summit with a few words from Titaniam CEO, Arti Raman and a special announcement featuring Titaniam's work with non-profits. We will also introduce the important work being done by Stanford CISO for Support Services, Leda Muller as part of her non-profit initiate with Pocket Security
Arti Raman, CEO Titaniam
Leda Muller, CISO/Assistant Director of Support Services, Stanford University