According to Gartner, 79% of companies have experienced at least one cloud data breach during the pandemic. But the migration of critical business data to the cloud shows no sign of slowing. In fact, it’s accelerating. Yet, despite powerful trends and mounting threats, traditional data security has simply not kept pace with the cloud. Security teams still struggle to even understand the reality of what sensitive data they have in the cloud and its associated risks. This is not a sustainable status quo. Data is increasingly a business most valuable asset. And until organizations can align around a shared Data Reality, cloud security will remain several steps behind intensifying security threats and tightening data regulations.
The Future of IT & Cybersecurity
CXO Think Tank
Visionaries
Matt Tesauro
Distinguished Engineer/Director Security Evangelist - Global
Noname Security
About Me
Ibrahim Jackson
Founder
Ubiquitous Preferred Services
About Me
Scot Miller
SVP & CISO
Mr. Cooper
About Me
Brian Brown
CISO
Solis Security Inc
David Bullas
Director of Sales Engineering
Authomize
About Me
Brim Basom
CIO & CTO
Mothers Against Drunk Driving (MADD)
Brian Mork
CISO
Trinity Industries
About Me
Jodi Watkins
Chief Commercial Officer
GTN Technical Staffing and Consulting
About Me
Tamar Bar Ilan
Co-founder & CTO
Cyera US Inc.
About Me
Nick Sims
Head of IT - Structural Heart
Abbott
Royi Barnea
Head of Channel Sales US
Cynet
Andre Rall
Head of Cloud Security
Uptycs
Jodi Watkins
Chief Commercial Officer
GTN Technical Staffing and Consulting
About Me
Robert Smith
Field CISO
Noname Security
About Me
EVENT DETAILS
November 2, 2022
Agenda
12:30 PM-1:00 PM
Welcome & Registration
1:20 PM-2:15 PM
Panel
Cloud Data Security
Panelists
Chair
Jodi Watkins
Chief Commercial Officer
GTN Technical Staffing and Consulting
Speaker
Tamar Bar Ilan
Co-founder & CTO
Cyera US Inc.
Speaker
Scot Miller
SVP & CISO
Mr. Cooper
Speaker
Brian Mork
CISO
Trinity Industries
Speaker
Nick Sims
Head of IT - Structural Heart
Abbott
2:20 PM-2:55 PM
Keynote
Application Security in a DevOps, Cloud and API World
Security teams are challenged to modernize application security practices in light of accelerating shifts to DevOps delivery models and rapid adoption of cloud-native application designs. Applications built on microservices (e.g. serverless, containers, APIs) and delivered continuously are outpacing application security teams ability to secure them. CISOs need to consider new skills, new touch points and new platforms to maintain a strong security posture in light of these trends and the speed at which they are re-shaping IT.
Panelists
2:55 PM-3:15 PM
Networking Break
3:15 PM-3:50 PM
Keynote
Cloud Detection & Response (CDR): Putting yourself in the shoes of a threat actor.
Panelists
Speaker
Andre Rall
Head of Cloud Security
Uptycs
3:40 PM-3:55 PM
Disruptor
Native Vs. Open: Choosing the right XDR for your organization
Extended Detection and Response (XDR) continues to be one of the most discussed technologies in cybersecurity. XDR promises far better security outcomes at a lower cost than the current security stack approaches most that most larger enterprises currently have in place. One sticky point that keeps arising in the XDR discussion has to do with the different technology approaches XDR providers rely upon to deliver platform capabilities. Most of us have heard the two primary approaches mentioned – Native XDR and Open XDR – but may be confused by all the vendor and analyst messaging. Join our discussion for an overview of these XDR approaches to better understand the benefits and shortcomings of each to help determine which option is better for your organization.
Panelists
Speaker
Royi Barnea
Head of Channel Sales US
Cynet
3:55 PM-4:10 PM
Networking Break
4:10 PM-5:05 PM
Panel
Bridging the Gap Between IT and the Business
Bridging the gap between business and technology is not easy and requires discipline and balance between technology, people, and the business. For so many organizations today, technology is the business. Technology needs to be understood as a critical enabler in every part of the organization from the front line to the back office. It creates new value by crunching data to deliver new insights, it spurs innovation, and it disrupts traditional business models.
For business and technology leaders alike, new actions and behavioral changes can help their organizations make this shift. CIOs must take responsibility for problems, they should convey that when technology fails, many people typically share responsibility.
Panelists
Chair
Ibrahim Jackson
Founder
Ubiquitous Preferred Services
Speaker
Brian Brown
CISO
Solis Security Inc
Speaker
Brim Basom
CIO & CTO
Mothers Against Drunk Driving (MADD)
Speaker
Nick Sims
Head of IT - Structural Heart
Abbott
Speaker
Robert Smith
Field CISO
Noname Security
5:10 PM-5:25 PM
Disruptor
5 Steps to Securing Identity and Access for Everything in the Cloud
Identity and Access are under attack. The only way to protect the identity layer from risks and threats is to continuously monitor identities, assets, access privileges, and activities across cloud environments.
Join Authomize Director of Sales Engineering David Bullas, to learn about the 5 steps you need to take to ensure that your Cloud Identity and Access is secure and in compliance with standards and regulations. The session will review how security teams detect and mitigate Identity and Access risks such as:
- Excessive Access exposing what you build in AWS
- Identity lifecycle risks including partial offboarding
- IdP risks including password stealing and user impersonation



