||Women Who Lead Present “The Daredevil Prescription”
Join us in the ILTA Lounge as Kaveri Subbarao Nauhaus, Senior Counsel & Director, Litigation at Clark Hill PLC, speaks about breaking down the real barriers to focus on what you truly want…and position yourself to go get it!
We’ll explore leveraging meaningful risks to your advantage and the truths that are revealed by doing so – the obstacles you think are in your way of those big aspirations may not be the ones you think they are. Isn’t it time you channeled your inner Evil Knievel and redefined risk for yourself? Your empire is waiting.
||Keynote: Beyond Prevention — How to Keep Sensitive Information Safe with Active Monitoring
Mary Singh is a Senior Detection & Response Engineer at Expel. In this role she develops rules and strategies to detect and respond to security events on network, endpoint, and cloud.
She's a recovering consultant-turned-engineer with 17 years of experience in information operations, intrusion detection and incident response. Prior to Expel, Mary worked at Mandiant, investigating over 100 security incidents involving the federal government, defense industrial base, and Fortune 500 companies. Prior to Mandiant, Mary conducted attack prevention, detection, and vulnerability assessments in the U.S. Air Force and as a consultant with Booz Allen.
||Session: Best Practices for Cloud Authentication and Identity
Are you ready to move some of your applications to the cloud? How will you manage your identity and access and extend your authentication and access from on-prem to cloud applications?
In this session, you will learn some of the best practice and architecture to design a cloud identity, through a product similar to Azure AD. We will also discuss some of the common cloud misconfiguration that would lead to unauthorized access.
||Ask the Expert Chat, NetDocuments: Alvin Tedjamulia, CTO and Co-Founder
Visit the Ask the Expert Stage to watch the presentation, and have your questions ready for the live chat with NetDocument’s expert.
||Session: Endpoint Security Controls
With phishing attacks on the rise, and with AI and bots attacking endpoints with no signs of slowing, developing and continuously improving your endpoint security strategy should be a significant component of your overall cyber security strategy. Studies have shown that a majority of breaches originate at endpoints. How do you protect yours?
||Session: The Other Guys – Locking Down Your Peripherals
A look at how to lock down various devices on your networks and what typical vulnerabilities you see in them. Incorporate vulnerability scans, typical devices that need attention, and best practices (changing default usernames, removing SSL/TLS1, SNMP, etc.). Spend some time on videoconferencing and how to secure that traffic, deal with outside spam callers. Granting access to service vendors. A look at some traditional security holes and resolutions with these devices, including scanning devices, plug ins, copiers, printers, phones, audio listening devices, and other IoT devices.
||Ask the Expert Chat, Arctic Wolf Networks: Brian Van Den Heuvel, Principal, Presales Systems Engineer
Visit the Ask the Expert Stage to watch the presentation, and have your questions ready for the live chat with Arctic Wolf Networks’s expert.