Preview Available
Identification: SS22DC09
SOCs are already used in many large enterprises to monitor IT and OT networks. Now, as a result of the pandemic and a shift towards remote and hybrid workforce models, these organizations must adapt to both the ever-changing threat environment and the demands of the people tasked to protect them – all while improving our ability to detect and respond to threat.
Integrating VSOC services into a larger cyber program to achieve efficiency, quality of service, and cyber program optimization equal to or better than a traditional on premise service model can be difficult. Questions like “build vs. buy”; what to consider when selecting a VSOC vendor and hybrid vs. dedicated will all need to be addressed. This session will cover those and other topics such as staffing models, technology and toolsets and much more.
Speaker(s):Preview Available
Identification: SS22DC08
High-profile individuals in both the public and private sector are frequent targets of threat actors aiming to exfiltrate data, commit fraud, take over their accounts, disseminate false information, impersonate or extort them. Such forms of malicious exploitation often lead to initial compromise, facilitate costly ransomware attacks, and result in operational, financial, and reputational losses.
This session will highlight the benefits of an intelligence-based security program to reduce executive exposure - and therefore risk - in a world of rapidly evolving threats. We’ll also examine the process of building or maturing an Intelligence program that empowers an agency to move from a reactive to a proactive security posture and stay ahead of the enemy.
Speaker(s):Preview Available
Preview Available
Identification: SS22DC11
What is quantum computing? And why should we care in the security world … it's just a new way of getting a job done right? Is it just hype? Surely it is years away and we have more pressing items to consider, like getting rid of default passwords.
This session will explore a little of the world of Quantum, what is the current state of QC, where is it going and how long it is envisaged to get there and why we should care in the world of cyber security and why governments and national agencies are getting interested in this nascent technology sphere.
Speaker(s):Preview Available
Preview Available
Identification: SS22DC03
The battle rages on in the race to find, recruit and educate the future of the cybersecurity workforce. Join Kiersten Todt, chief of staff at the Cybersecurity & Infrastructure Security Agency (CISA) and Clar Rosso, CEO, (ISC)2, for a discussion on the best practices that hiring managers in the public and private sectors should employ to expand the search for the diverse cybersecurity talent needed on tomorrow’s front lines.
Learning Objective:Preview Available
Identification: SS22DC05
Preview Available
Identification: SS22DC04
In this session, we’ll highlight the work happening at CMS to accelerate the development and maintenance of secure software. Platform container orchestration, continuous delivery pipelines, and a continuous purple team are all parts of the puzzle that makes up the batCAVE.
Speaker(s):Preview Available
Identification: 001
The adoption of Zero Trust has gained momentum fueled by changing threat vectors and move towards remote work that is redefining the security perimeter. Govt Agencies are in a rush to modernize their cyber security architecture to meet these demands and comply with the Executive orders. In this session, we will break down Zero Trust, describe an approach to conducting a Zero Trust maturity assessment and discuss how organizations can implement a roadmap for success.
Speaker(s):Preview Available
Identification: SS22DC06
This session will center around the Secret Service's role of financial investigations and in protecting the nations financial infrastructure and payment systems. The focus will be on digital assets and their role in all forms of complex, cyber-enabled fraud, to include ransomware.
Speaker(s):