Free-To-Attend Cyber Security Online Event!

May 04 - 06, 2021

Agenda Day 1

  • Realizing the threat landscape
  • Understanding the legal landscape 
  • A perfected supply chain attack
  • Ransomware to RaaS 
  • Risk assessment 
  • Governance
  • Privacy

Erez Liebermann

Chief Counsel, Cybersecurity and Privacy

10:00 am - 10:45 am EST Breaking The Response Cycle: Proactive Measures To Enhance Your Security Posture

Mark Manglicmot - VP Security Services, Arctic Wolf

Many organizations are facing a series of universal security effectiveness problems. A lack of talent, time, and experience has led to a vicious cycle of continually responding to incidents only as they are discovered. Unfortunately, today’s weaknesses are tomorrow’s threats; and in order to strengthen any environment’s security posture it’s crucial to move beyond reactive and into a proactive state of security. Join us as we discuss tips on how to move beyond a reactive state and begin to find opportunities for proactive improvements.  

This session provides:

  • A review common challenges that have led to detrimental response cycles
  • An understanding how a proactive approach can greatly reduce your threat exposure.
  • Identification what is necessary to move into a proactive security posture.
  • Lessons learned from a security expert how to find areas or improvement.


Mark Manglicmot

VP Security Services
Arctic Wolf

11:00 am - 11:45 am EST Trust & Transaction: Understanding Power Dynamics Between Hackers and Corporate Risk

Samantha Cowan - Head of Compliance, HackerOne

Every organization is tasked with the constant challenge of managing risk and trust. Trust is essential in business -- trusting employees, software, customers, etc. Risk is constant and necessary and equates to the relationship between capital at risk and earnings at risk. What do you have to lose in the wake of a breach (customer data, employee data, etc.); are you trusting and investing in the right people and technologies to keep it safe? Hackers already exist in the corporate environment, whether you like it or not. Inviting them proactively introduces more reward. 


Key discussion points include:

  • Have you tipped the risk vs. trust scale in the right direction? 
  • Beyond the bounty, how do companies influence power dynamics and interact with hackers without increasing risk to their businesses? 
  • How can working with hackers actually improve brand trust?


Samantha Cowan

Head of Compliance

12:00 pm - 12:45 pm EST The Journey to SASE: Where We’ve Been And Where We’re Headed

Jay Klauser - VP, Worldwide Sales Engineering and Alliances, NetMotion

Seemingly from nowhere, the concept of Secure Access Service Edge (SASE) has gone from a fairly obscure term – first coined by Gartner in late 2019 - to a philosophy dominating the conversation in 2021. Undoubtedly accelerated by the huge shifts brought on by the 2020 global lockdown, SASE has caught the attention of professionals working across the IT, network and security landscape as they prepare their post-pandemic strategies. 

  • Will draw upon original, previously unreleased data from a survey of more than 750 CXO and director level IT professionals.
  • Explain the core concepts behind SASE – you’re probably further along than you realize
  • How to embrace zero trust as part of your journey
  • The SASE journey is a marathon not a sprint – where to begin
  • The future is uncertain – how SASE will help shape the new normal


Jay Klauser

VP, Worldwide Sales Engineering and Alliances

1:00 pm - 1:45 pm EST Threat Intelligence Evolution

Sarah Sabotka - Head of Global Cyber Threat Intelligence, Experian
  • Protecting the distributed workforce
  • Updating the approach to the new and different threat landscape
  • Assessing insider threats malicious and otherwise
  • Reimagining risk management
  • Continually adding more fruitful, imaginative and rich intelligence sources
  • Collecting and actioning supply chain threat intelligence insights  

Sarah Sabotka

Head of Global Cyber Threat Intelligence