Agenda | March 19, 2025 | 8:30AM - 2:45PM EDT
Timeline (EDT) | Session Details |
---|---|
8:30 AM | Welcome & Opening RemarksSimon Vernon, Event Chair, SANS Certified Instructor |
8:45 AM | Session One | Mitigating Cloud Misconfigurations with Microsoft Defender for CloudAs cloud-native development accelerates and covers a broader range of services; from Compute, Data & AI, and Networking spread across multi-cloud environments, it is difficult to ensure secure development processes are in place, increasing the chance for misconfigurations that an attacker could exploit. In this session we will explore emerging cloud security risks and how Microsoft Defender or Cloud can enhance your ability to identify and remediate misconfigurations across your infrastructure. Dick Lake, Senior Product Manager, Microsoft |
9:25 AM | Session Two | Navigating Cloud Security in 2025: Trends, Threats, and SolutionsCurious how your security practices stack up against your peers? The 8th Annual Sysdig 2025 Cloud-Native Security and Usage Report provides an in-depth analysis of real-world cloud security trends based on millions of monitored workloads. This year’s report highlights a few identity security challenges and the speed of real-time threat detection and response. We'll explore container risk factors—from short lifespans to image bloat—alongside advancements in vulnerability management, interesting facts about Falco, and a few surprises in compliance. Join us for key findings that will help you shape your 2025 cloud security strategy. Crystal Morin, Senior Cybersecurity Strategist, Sysdig Ron Eddings, CEO, Hacker Valley Media |
10:05 AM | Break |
10:15 AM | Session Three | A New Era in Cloud Runtime Security: Cloud Application Detection & ResponseDetecting and responding to cloud attacks has never been more challenging. Modern attacks and the ever-changing nature of cloud infrastructure and appliacations make security teams' lives more difficult than ever. A new approach is needed - one that can provide a fully traceable & explainable runtime security story spanning the entire cloud technologies stack. Ben Hirschberg, CTO and co-founder of ARMO, will present his new Cloud Application Detection & Response solution and its promise to secure cloud applications at runtime. Ben Hirschberg, CTO and Co-Founder, ARMO |
10:45 AM | Session Four | Cloud Security Maturity Framework: Best practices to Operationalize Cloud SecurityCloud complexity continues to grow in organizations as cloud and AI development accelerate. In response, many organizations have transformed their cloud security operating model, with over 30% of Wiz customers achieving zero critical issues across their cloud environment. This session will cover the best practices and insights from those journeys, including how to democratize security, prioritize risks, and consolidate siloed tooling while bringing along developers, DevOps, SOC, and now AI teams on the cloud security journey. Shashank Golla, Product Marketing, Wiz |
11:15 AM | Session Five | Ready to Boost Your Container Security Confidence?Learn how Tenable Cloud Security reduces complexity to enable robust protection for your containers and Kubernetes deployments. As containers and Kubernetes become more prevalent, so does the complexity of ensuring their security. To help you overcome this challenge, check out this session, which explores how Tenable Cloud Security enables robust protection for your containerized workloads, as part of an overall cloud security strategy. By attending this session you will: -Learn to implement comprehensive vulnerability management for containers from build to runtime. -Gain insights into customizing security policies and managing containerized cloud deployments with precision. Lior Zatlavi, Director of Cloud Security Advocacy, Tenable |
11:45 AM | Break |
12:00 PM | Session Six | Simplifying Cloud Security: Stopping Attacks with Actionable InsightsCloud threats move fast, and security teams need actionable insights to keep up. This technical session explores how to simplify cloud security by detecting and stopping attacks in real-time. Learn key strategies for securing workloads, hardening configurations, and automating responses. Watch a technical walkthrough of Sysdig in action, showcasing how to accelerate detection and response. Discover how GenAI enhances cloud defense and gain expert insights into modern security challenges. Don’t miss this deep dive into cloud protection strategies! Eric Carter, Director of Product Marketing, Sysdig |
12:20 PM | Session Seven | Code Reachability Analysis with Microsoft Defender for CloudAs modern cloud applications grow in complexity, developers integrate an expanding set of services, dependencies, and APIs across multi-cloud environments. This increased interconnectivity makes it challenging to assess the true impact of vulnerabilities, leading to potential security blind spots that attackers can exploit. In this session, we will explore how to prioritize your vulnerabilities using code reachability analysis with Microsoft Defender for Cloud and Endor Labs. You will learn how to identify which security issues pose real threats based on their execution potential. Lara Goldstein, Senior Product Manager, Microsoft |
12:40 PM | Session Eight | How Palo Alto Networks Stays Secure in the Age of Sophisticated Cloud AttacksPalo Alto Networks operates one of the largest cloud-native estates and must continually out-innovate adversaries. To achieve this, we rely on our threat research experts at Unit 42, along with a highly scalable security program that spans development to runtime to SOC. Hear from Jonathan Bregman, Matt Mellen, and Krithi Vasan as they discuss: - Trends in cloud attacks from Unit 42 and why CNAPP must evolve - How Palo Alto Networks built a scalable AppSec program across a vast engineering ecosystem - Why the SOC is crucial for effectively reducing the MTTR in the cloud Join us to see the future of fast, intelligent, scalable cloud security. Jonathan Bregman, Senior Product Marketing Manager, Palo Alto Networks Matt Mellen, Sr Director, InfoSec Palo Alto Networks Krithi Vasan, Sr Director, InfoSec Palo Alto Networks |
1:10 PM | Break |
1:25 PM | Session Nine | Best Practices & Lessons Learned on Securing Files in Your Cloud WorkloadsAs cloud adoption increases, securing file-based workflows is more critical than ever. Malware, ransomware and compliance risks continue to challenge organizations, especially in finance and other, similarly highly regulated industries. In this session, we’ll share key lessons learned from working with leading financial institutions to secure files across cloud applications, storage and collaboration platforms. We’ll cover practical strategies to mitigate file-borne threats and best practices for strengthening cloud security. Walk away with actionable insights to protect your cloud workloads and lower risk. George Prichici, Vice President - Products, OPSWAT |
1:55 PM | Session Ten | Panel DiscussionSimon Vernon, Event Chair, SANS Certified Instructor Crystal Morin, Senior Cybersecurity Strategist, Sysdig Ron Eddings, CEO, Hacker Valley Media Dick Lake, Senior Product Manager, Microsoft |
2:40 PM | Closing RemarksSimon Vernon, Event Chair, SANS Certified Instructor |
Frequently Asked Questions (FAQs)
Q: What is Spring Cyber Fest?
A: Spring Cyber Fest is a multi-day virtual event hosted by SANS, bringing together cybersecurity experts and practitioners to share insights, best practices, and actionable strategies across various tracks like threat hunting, cloud security, ransomware, and more. Attendees can expect expert-led sessions, hands-on demos, emerging threat insights, and networking opportunities—all at no cost.
Q: How many CPE credits can I earn?
A: You will earn 1 CPE credit for every hour you attend live or watch the recordings. For example, a 120-minute session earns you 2 CPE credits. This is a great opportunity to advance your professional development while learning from industry leaders.
Q: Do I need a SANS account to register?
A: Yes, a free SANS account is required to register. If you don’t already have one, creating an account is quick and easy during the registration process.
Q: What can I expect from the event if I’m new to SANS?
A: Expect high-quality, expert-led content tailored for cybersecurity professionals. Each track features sessions designed to provide practical knowledge, innovative solutions, and insights into the latest threats. You’ll also have the opportunity to ask questions and interact with presenters during live sessions.
Q: Do I need to register for reach track separately?
A: Yes, registration is required for each track you’d like to attend. With five distinct tracks, you can customize your experience by choosing the topics most relevant to you. Don’t worry—registering for multiple tracks is quick and easy!
Q: When will more details about the event be available?
A: Detailed agendas and speaker lineups will be released closer to the event date. By registering, you’ll receive updates and announcements directly in your inbox, so you’re always in the loop.
Q: Can I attend if I have a busy schedule?
A: Absolutely! Sessions are designed to be flexible, and recordings will be available after the event to those who are registered. You can attend live sessions whenever possible and catch up on the rest at your convenience.
Q: Is Spring Cyber Fest free to attend?
A: Yes, Spring Cyber Fest is completely free! There’s no cost to register or attend any of the sessions.
Q: Who should attend Spring Cyber Fest?
A: Spring Cyber Fest is designed for both cybersecurity practitioners and executives. The event offers a variety of sessions covering an array of topics, ensuring relevant insights for professionals across different roles, industries, and experience levels.
Q: Is the event global?
A: Yes! Spring Cyber Fest is a global event, accessible to attendees worldwide. The virtual format ensures you can join from anywhere to explore cutting-edge content and connect with the cybersecurity community.
Q: Will recordings be available?
A: Absolutely. All sessions will be recorded and made available for registered attendees. You’ll have the flexibility to revisit sessions at your convenience or catch up on those you couldn’t attend live.
Q: Will there be opportunities for networking?
A: Yes, Spring Cyber Fest includes opportunities to engage with fellow attendees and speakers through live Q&A sessions and interactive chats.
Q: How do I ask questions during sessions?
A: During live sessions, you’ll have access to a Q&A chat feature where you can submit questions directly to the speakers.
Q: I’ve registered—what happens next?
A: Once registered, you’ll receive email updates with details about the event agenda, session links, and any additional information you need to make the most of Spring Cyber Fest.