Agenda | November 8, 2024 | 9:00AM - 3:00PM ET
Timeline (EDT) | Session Details |
---|---|
9:00 AM | Welcome & Opening RemarksIsmael Valenzuela, Senior Instructor & Course Author, SANS Institute |
9:20 AM | Session One | PAM Roadmap: Key Strategies for Effective Deployment and Team EngagementThe introduction of PAM to any organization carries a degree of risk. If not introduced and implemented correctly, it can disrupt your IT operations and alienate your administrative staff. Planning and prior consultation with your teams are key to success. Join this session to: - Understand the value of workflow mapping - Explore best practices for deployment and learn how to engage your team - Compare strategies for introducing PAM to your IT teams - Learn about new methodologies that can make transitioning to PAM easier Martin Cannard, VP of Product Strategy, Netwrix |
10:00 AM | Break |
10:15 AM | Session Two | Transforming Security: The Power of SSE for Zero Trust AccessIn today’s rapidly evolving digital landscape, securing the edge has become paramount. This webinar delves into the transformative potential of Security Service Edge (SSE) in fortifying Zero Trust access. Join us as we explore how SSE integrates with existing security frameworks to provide comprehensive protection for distributed networks. Attendees will gain insights into the latest SSE technologies, best practices for implementation, and real-world case studies demonstrating its effectiveness. Whether you’re an IT professional, security expert, or business leader, this session will equip you with the knowledge to enhance your organization’s security posture and embrace a Zero Trust approach. John Spiegel, Director of Strategy and Field CTO, HPE, HPE Aruba Networking Jaye Tillson, Director of Strategy, HPE, HPE Aruba Networking |
10:45 AM | Session Three | Securing 5G Networks with Zero TrustThe rapid deployment of 5G networks has unlocked unprecedented connectivity for businesses, but it has also introduced new security challenges. One of the most critical threats is the cellular man-in-the-middle (MITM) attack, where an attacker intercepts and manipulates data traffic between a mobile device and the network. As organizations increasingly rely on 5G to power their remote workforces, IoT devices, and edge computing, the need for robust security frameworks has never been greater. This is where Zero Trust architecture comes into play. In this session, we will explore how Cradlepoint’s 5G solutions, combined with Zero Trust principles, safeguard against cellular MITM attacks by continuously verifying the identity of users and devices, securing data traffic, and ensuring that no trust is granted without verification. Attendees will learn how to protect their 5G-enabled infrastructures and maintain secure, reliable connectivity in a constantly evolving threat landscape. Peter Silva, Senior Product Marketing Manager, Ericsson Alex Ryan, Senior Threat Intelligence Analyst, Ericsson |
11:15 AM | Session Four | Beyond a Step-by-Step Blueprint: Defending Against RansomwareAre you prepared for a ransomware attack? Join this informative session featuring Javier Perez, Sr. Director of Product Marketing and Tech Evangelist as he unveils critical insights for ransomware incident response. Javier Perez, Sr. Director of Product Marketing, Security, Veeam |
11:45 AM | Break |
12:00 PM | Session Five | Keynote: Technology for the Good of the CommunityJoin us for this enlightening keynote session where you will learn the following: - How AI is evolving from large language models to large quantitative models, and associated security implications- The intersectionality of quantum computers and cybersecurity- Recommendations for how organizations should protect their crown jewels data from threats of today, and tomorrow And so much more!! Don't miss it. Rob E. Williams, Head of Global Channels, SandboxAQ |
12:50 PM | Afternoon Kick-offIsmael Valenzuela, Senior Instructor & Course Author, SANS Institute |
1:00 PM | Session Six | Mastering Just-In-Time (JIT) Privileged Access Management with NetwrixUnlock the potential of Just-In-Time (JIT) Privileged Access Management (PAM) to enhance your security while maintaining operational efficiency. Join this session to: - Compare different types of JIT PAM and their best use cases - Identify when to implement or avoid JIT strategies - Discuss the integration of identity and privilege orchestration - Learn about scenarios where JIT excels or falls short - Experience a live demo with Netwrix solutions, showcasing how easy it is to get started with JIT PAM Martin Cannard, VP of Product Strategy, Netwrix |
1:20 PM | Session Seven | Trust Issues: Securing Your Firmware Before It Ruins Your Supply ChainFirmware has several definitions, and just hearing the word can invoke tension and stress for IT admins and security professionals. Firmware lives, among other places, under the hood of your shiny servers, networking gear, and endpoints. We tend to assume it is secure—until it isn’t, and your supply chain becomes a buffet for attackers. In this session, we’ll peel back the layers on why Zero Trust isn’t just for the network and apps—your infrastructure needs some love, too. Attackers are like water, always taking the path of least resistance, targeting network appliances and vulnerabilities below the operating system to extend their foothold on compromised systems. Zero Trust at the firmware level can keep those sneaky threats out and show you how to build a security plan to protect against pre-operating system threats that aren’t just duct tape and wishful thinking. Visibility into not only your devices but all of the components inside your devices makes all the difference. IT, security, and procurement teams must work together to stop gear from being compromised before it gets to their data center. So, grab your whiskey, tune in, and get ready to make your supply chain suck a whole lot less. Paul Asadoorian, Principal Security Evangelist, Eclypsium |
1:50 PM | Break |
2:05 PM | Session Eight | Panel : Title Coming Soon!Session Details Coming Soon! |
2:50 PM | Wrap-UpIsmael Valenzuela, Senior Instructor & Course Author, SANS Institute |