Arizona has long been a leader in leveraging IT and providing digital services, but across the state and country alike, there are new challenges emerging following the pandemic, and with this comes new threats and risk factors. With that being said, it is critical to have continuous discussions on how these evolving cybersecurity risks can be tackled, in spite of the fact that there are numerous advances in the way of digital transformation. In this exclusive session, Ryan Murray, Deputy Director and Deputy State CISO, Arizona Department of Homeland Security, discusses the state of critical infrastructure protection, as well as:
Digital transformation has created a wealth of opportunity: remote working, cloud migration, and smart devices. But it has also brought with it vulnerabilities inherent in legacy technology, an enlarged attack surface and increased attention from criminal adversaries who seek to disrupt operations or steal intellectual property. Today's CISOs need to focus on these new vulnerabilities and risks. What are the key factors to consider when building a plan to improve security maturity in this new era?
In this panel Bob Schlotfelt, CISO, LACERA and Dan Wilkins, CISO, State of Arizona - DES will discuss:
The nature of warfare is changing. As conventional, cyber and information warfare converge into a highly refined and devastating playbook, we need to rethink many aspects of the way we implement defense tactics. This panel of public and private sector experts will dissect:
Cisco believes that “Security is a Human Right” and should be something that every human on the planet should have access to and have integrated into every aspect of their digital lives. The impact of the Security Poverty Line has provided an advantage for bad actors to prey on the misinformed, unprotected and unprepared and has had a massive impact on businesses large and small across every industry in the world. Join Mike Storm, Distinguished Engineer for Cisco Security CTO, and a 30-year Industry Veteran, as he highlights the Global Cisco strategy to deliver End-to-End Security, as a default, to every system, and person, on the planet.
Click here to view our sponsor booth for more information, chat with our representative and resources.
Cybercrime is big business. Recent estimates have stated cybercrime will cost the world $10 trillion annually by 2025. To understand modern attacks and begin to disrupt the return on investment for cybercrime, one must understand how cybercrime has become a global business. Join Rick McElroy as we look backward to move forward together.
Click here to view our sponsor booth for more information, chat with our representative and resources.
OpenText Security Solutions delivers a complete cyber resilience framework, encompassing data security and management. Email is the primary form of business communication worldwide, making it the number one threat vector for bad actors. Protecting information flowing into and out of the organization is vital for all organizations in today’s virtual world. Come learn why email encryption should be a foundational layer of your data security and compliance strategy.
Click here to view our sponsor booth for more information, chat with our representative and resources.
Phishing attempts are more frequent and persuasive than ever before, and the threats are getting more severe each day. But by implementing security awareness training, your employees can be better prepared to identify and address complex cyberthreats by as much as 40%.
In this session, you'll learn how BullPhish ID provides IT administrators dealing with busy, distracted employees an effortless, affordable security awareness training and phishing simulation solution to drastically reduce risks due to human error.
Click here to view our sponsor booth for more information, chat with our representative and resources.
Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!
Adaptations are needed to keep pace with the changing ransomware environment. This panel will address what you should be ready for. They will also debate valid and invalid approaches to minimizing risk -from technology, government and other activities that will influence how organizations can to respond to threats. This panel will:
The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption. Join us to learn more about where IoT is headed and how you can stay safe while still reaping the benefits of a digital world. This session will illuminate
Threat detection is at the heart of building foundational security to shift with the evolving threat landscape. In this session, we will demonstrate how to build behavioral attack-pattern scenarios correlating detection use cases across different data domains, which helps to keep up with your threat landscape, and learn how you can easily start to build and implement sequence-based detections in your environment. The right methods, frameworks, and detections are fundamental to understanding your threat landscape and comprehending the correct path. We will show how to cover the steps to defend against some of the various compromises that have been identified across the numerous industries.
Click here to view our sponsor booth for more information, chat with our representative and resources.
Internal threats in today's era are complex and crucial in the cybersecurity domain. Understanding dynamic and multivariate user behavior is challenging too. Traditional sequential and timeline-based methods cannot easily address the complexity of temporal and relational features of user behaviors. Hence, we need an AI-based report that enables analysts to understand user behavior patterns that result in identification of anomalies. We can strengthen our security further by including access management as the core of zero trust architecture to create a zero trust extended ecosystem.
Click here to view our sponsor booth for more information, chat with our representative and resources.
Cybersecurity Whole of State is a collaborative effort between State Government, Local Municipalities (Cities/Counties), and Education (K12/Higher Ed) to protect the citizens, individual municipalities, & the state as a whole from cybersecurity threats. Pillars of Whole of State include Information Sharing, Incident Response Planning, Proactive Cyber Protection, Workforce Development, & Policy/Funding. Critical factors of success include governance, strategic plans, execution pans, and continuous validation.
Come to learn more about how this Cybersecurity Whole of State approach is being adopted regionally & nationally. Also, come to find out how you can get involved!
Click here to view our sponsor booth for more information, chat with our representative and resources.
As organizations increasingly migrate more operations from on-premises to hybrid and multi-cloud environments, it becomes a real challenge to retain control as your cloud footprint and complexity grow and consistent security and compliance become unmanageable. Compliance automation and centralized key management across disparate infrastructure can be complex. With the unfettered proliferation of virtual machines and containers, learn how to strengthen your security posture, improve operational efficiency through automation and become more resilient to attacks from bad actors and threats from innocent staff misconfigurations that can lead to unscheduled outages.
Click here to view our sponsor booth for more information, chat with our representative and resources.
Secure Access Service Edge, or SASE, is an emerging cybersecurity framework that Gartner first named in August 2019. With reports showing 62% of employees want to work remote or hybrid and 92% of businesses are adopting a multi-cloud strategy, the need for a new network and security approach is rising.
SASE adopters are turning to managed service partners to navigate these complex migrations in order to assist with the technology choices, costs, resources and more.
Join this session, "SASE Framework: Making the Case for Managed Services," to learn more from the latest research and discuss the approach a global managed service provider deploys.
Click here to view our sponsor booth for more information, chat with our representative and resources.
Breaches happen, and 2021 was a record-breaking year for them. According to research by the Identity Theft Resource Center, as of September 2021 there were 1,291 breaches publicly reported in 2021, compared to 1,108 breaches in 2020. That's a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a discussion of:
Click here to view our sponsor booth for more information, chat with our representative and resources.
Join Iain Rose, Solutions Engineer at Snyk, to learn how Snyk's AppSec and CloudSec platform allows developers to not only build securely but also build at a pace that allows them to stay competitive. This Tech Talk will share how Snyk is differentiated in the market and why our platform is not only trusted by security teams but also loved by developers because it allows security to scale and developers to move faster.
Click here to view our sponsor booth for more information, chat with our representative and resources.
Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!
Information is your most valuable resource, so implementing effective protections and technical controls that bolster your cybersecurity posture are crucial to the health of your organization. Our experts talk about ways to proactively protect your organization’s data, finances and business processes in this open mic format. Panelists will provide answers to pressing issues, including:
As criminal methods evolve, it is crucial that the awareness and countermeasures of potential victims and law enforcement evolve twice as fast to mitigate these potential threats. Business Email Compromise (BEC) and related email account compromise scams resulted in nearly $2.4 billion in reported losses from victims in 2021, the most of any category disclosed to the Internet Crime Complaint Center (IC3.) in this exclusive session Special Agents from the U.S. Secret Service will discuss:
All content from Day 1 will be available on demand from 9 AM - 5 PM EST on Day 2, Wednesday, October 26th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.
Arizona has long been a leader in leveraging IT and providing digital services, but across the state and country alike, there are new challenges emerging following the pandemic, and with this comes new threats and risk factors. With that being said, it is critical to have continuous discussions on how these evolving cybersecurity risks can be tackled, in spite of the fact that there are numerous advances in the way of digital transformation. In this exclusive session, Ryan Murray, Deputy Director and Deputy State CISO, Arizona Department of Homeland Security, discusses the state of critical infrastructure protection, as well as:
Digital transformation has created a wealth of opportunity: remote working, cloud migration, and smart devices. But it has also brought with it vulnerabilities inherent in legacy technology, an enlarged attack surface and increased attention from criminal adversaries who seek to disrupt operations or steal intellectual property. Today's CISOs need to focus on these new vulnerabilities and risks. What are the key factors to consider when building a plan to improve security maturity in this new era?
In this panel Bob Schlotfelt, CISO, LACERA and Dan Wilkins, CISO, State of Arizona - DES will discuss:
The nature of warfare is changing. As conventional, cyber and information warfare converge into a highly refined and devastating playbook, we need to rethink many aspects of the way we implement defense tactics. This panel of public and private sector experts will dissect:
Cisco believes that “Security is a Human Right” and should be something that every human on the planet should have access to and have integrated into every aspect of their digital lives. The impact of the Security Poverty Line has provided an advantage for bad actors to prey on the misinformed, unprotected and unprepared and has had a massive impact on businesses large and small across every industry in the world. Join Mike Storm, Distinguished Engineer for Cisco Security CTO, and a 30-year Industry Veteran, as he highlights the Global Cisco strategy to deliver End-to-End Security, as a default, to every system, and person, on the planet.
Click here to view our sponsor booth for more information, chat with our representative and resources.
Cybercrime is big business. Recent estimates have stated cybercrime will cost the world $10 trillion annually by 2025. To understand modern attacks and begin to disrupt the return on investment for cybercrime, one must understand how cybercrime has become a global business. Join Rick McElroy as we look backward to move forward together.
Click here to view our sponsor booth for more information, chat with our representative and resources.
OpenText Security Solutions delivers a complete cyber resilience framework, encompassing data security and management. Email is the primary form of business communication worldwide, making it the number one threat vector for bad actors. Protecting information flowing into and out of the organization is vital for all organizations in today’s virtual world. Come learn why email encryption should be a foundational layer of your data security and compliance strategy.
Click here to view our sponsor booth for more information, chat with our representative and resources.
Phishing attempts are more frequent and persuasive than ever before, and the threats are getting more severe each day. But by implementing security awareness training, your employees can be better prepared to identify and address complex cyberthreats by as much as 40%.
In this session, you'll learn how BullPhish ID provides IT administrators dealing with busy, distracted employees an effortless, affordable security awareness training and phishing simulation solution to drastically reduce risks due to human error.
Click here to view our sponsor booth for more information, chat with our representative and resources.
Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!
Adaptations are needed to keep pace with the changing ransomware environment. This panel will address what you should be ready for. They will also debate valid and invalid approaches to minimizing risk -from technology, government and other activities that will influence how organizations can to respond to threats. This panel will:
The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption. Join us to learn more about where IoT is headed and how you can stay safe while still reaping the benefits of a digital world. This session will illuminate
Threat detection is at the heart of building foundational security to shift with the evolving threat landscape. In this session, we will demonstrate how to build behavioral attack-pattern scenarios correlating detection use cases across different data domains, which helps to keep up with your threat landscape, and learn how you can easily start to build and implement sequence-based detections in your environment. The right methods, frameworks, and detections are fundamental to understanding your threat landscape and comprehending the correct path. We will show how to cover the steps to defend against some of the various compromises that have been identified across the numerous industries.
Click here to view our sponsor booth for more information, chat with our representative and resources.
Internal threats in today's era are complex and crucial in the cybersecurity domain. Understanding dynamic and multivariate user behavior is challenging too. Traditional sequential and timeline-based methods cannot easily address the complexity of temporal and relational features of user behaviors. Hence, we need an AI-based report that enables analysts to understand user behavior patterns that result in identification of anomalies. We can strengthen our security further by including access management as the core of zero trust architecture to create a zero trust extended ecosystem.
Click here to view our sponsor booth for more information, chat with our representative and resources.
Cybersecurity Whole of State is a collaborative effort between State Government, Local Municipalities (Cities/Counties), and Education (K12/Higher Ed) to protect the citizens, individual municipalities, & the state as a whole from cybersecurity threats. Pillars of Whole of State include Information Sharing, Incident Response Planning, Proactive Cyber Protection, Workforce Development, & Policy/Funding. Critical factors of success include governance, strategic plans, execution pans, and continuous validation.
Come to learn more about how this Cybersecurity Whole of State approach is being adopted regionally & nationally. Also, come to find out how you can get involved!
Click here to view our sponsor booth for more information, chat with our representative and resources.
As organizations increasingly migrate more operations from on-premises to hybrid and multi-cloud environments, it becomes a real challenge to retain control as your cloud footprint and complexity grow and consistent security and compliance become unmanageable. Compliance automation and centralized key management across disparate infrastructure can be complex. With the unfettered proliferation of virtual machines and containers, learn how to strengthen your security posture, improve operational efficiency through automation and become more resilient to attacks from bad actors and threats from innocent staff misconfigurations that can lead to unscheduled outages.
Click here to view our sponsor booth for more information, chat with our representative and resources.
Secure Access Service Edge, or SASE, is an emerging cybersecurity framework that Gartner first named in August 2019. With reports showing 62% of employees want to work remote or hybrid and 92% of businesses are adopting a multi-cloud strategy, the need for a new network and security approach is rising.
SASE adopters are turning to managed service partners to navigate these complex migrations in order to assist with the technology choices, costs, resources and more.
Join this session, "SASE Framework: Making the Case for Managed Services," to learn more from the latest research and discuss the approach a global managed service provider deploys.
Click here to view our sponsor booth for more information, chat with our representative and resources.
Breaches happen, and 2021 was a record-breaking year for them. According to research by the Identity Theft Resource Center, as of September 2021 there were 1,291 breaches publicly reported in 2021, compared to 1,108 breaches in 2020. That's a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a discussion of:
Click here to view our sponsor booth for more information, chat with our representative and resources.
Join Iain Rose, Solutions Engineer at Snyk, to learn how Snyk's AppSec and CloudSec platform allows developers to not only build securely but also build at a pace that allows them to stay competitive. This Tech Talk will share how Snyk is differentiated in the market and why our platform is not only trusted by security teams but also loved by developers because it allows security to scale and developers to move faster.
Click here to view our sponsor booth for more information, chat with our representative and resources.
Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!
Information is your most valuable resource, so implementing effective protections and technical controls that bolster your cybersecurity posture are crucial to the health of your organization. Our experts talk about ways to proactively protect your organization’s data, finances and business processes in this open mic format. Panelists will provide answers to pressing issues, including:
As criminal methods evolve, it is crucial that the awareness and countermeasures of potential victims and law enforcement evolve twice as fast to mitigate these potential threats. Business Email Compromise (BEC) and related email account compromise scams resulted in nearly $2.4 billion in reported losses from victims in 2021, the most of any category disclosed to the Internet Crime Complaint Center (IC3.) in this exclusive session Special Agents from the U.S. Secret Service will discuss:
All content from Day 1 will be available on demand from 9 AM - 5 PM EST on Day 2, Wednesday, October 26th. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.
October 25 - 26, 2022
Southwest US Summit