Tuesday, February 11, 2025
10:00-10:45am
Tuesday - 2/11/25
Enterprise Cybersecurity (Grand A)
In this opening discussion, industry experts will provide a comprehensive overview of the current cybersecurity landscape. Attendees will gain insights into emerging threats, attack vectors, and the latest trends in cybercrime. The session will discuss the impact of these threats on organizations of all sizes and explore the challenges faced by security professionals in mitigating risks.
Register me |
11:00-11:45am
Tuesday - 2/11/25
Enterprise Cybersecurity (Grand A)
Threat intelligence plays a crucial role in preventing and responding to cyberattacks. This session will delve into the importance of collecting, analyzing, and sharing threat intelligence data. Attendees will learn how to leverage threat intelligence to identify potential threats, prioritize risks, and develop effective defense strategies.
Register me |
12:00-12:30pm
Tuesday - 2/11/25
|
1:30-1:55pm
Tuesday - 2/11/25
Enterprise Cybersecurity (Grand A)
The rapid growth of artificial intelligence (AI) is reshaping industries, creating opportunities for businesses of all sizes to innovate and improve. For small and medium-sized businesses (SMBs), AI offers tools that can enhance efficiency, reduce costs, and improve customer experiences. The advent of generative AI has further amplified these opportunities by enabling businesses to create personalized content, enhance customer interactions, and streamline operations. However, the adoption of AI, especially generative AI, also brings challenges, particularly in the areas of security, privacy, and ethics. This session aims to provide SMB leaders with actionable insights to navigate these challenges, enabling them to deploy AI successfully and responsibly.
Register me |
2:00-2:45pm
Tuesday - 2/11/25
Enterprise Cybersecurity (Grand A)
WARNING: This Talk Exposes the Darkest Realities of Cybercrime, Audience Discretion Advised
ECE-05 Cyber threats are evolving beyond basic phishing into sophisticated, multi-stage attacks that exploit dark web leaks, social media footprints, and everyday online behaviors. This talk sheds light on emerging threats through real-world stories of individuals and organizations that have been targeted—some losing their identities, finances, and even jeopardizing their businesses. But the true cost of these threats goes far beyond financial loss. We will expose the devastating human toll—how cybercriminals exploit technology to facilitate human trafficking, ritual sacrifice, and the psychological manipulation that drives victims to suicide. From grey market companies to stalkerware and beyond, we’ll reveal how modern attacks unfold and why traditional defenses are no longer enough. By sharing these harrowing realities, we aim to raise awareness, challenge assumptions, and empower individuals and organizations to better protect themselves in an increasingly hostile digital landscape.
Register me |
3:00-3:45pm
Tuesday - 2/11/25
Enterprise Cybersecurity (Grand A)
APIs have become an integral part of modern applications, but they also introduce new security vulnerabilities. This session will focus on the importance of API security and discuss common vulnerabilities, such as injection attacks, unauthorized access, and data breaches. Attendees will learn about best practices for securing APIs, including authentication, authorization, and rate limiting.
Register me |
4:00-4:45pm
Tuesday - 2/11/25
Enterprise Cybersecurity (Grand A)
The increasing adoption of remote and mobile work has created new challenges for security teams. This session will explore the unique security risks associated with remote and mobile workforces. Attendees will learn about best practices for securing devices, networks, and data, as well as implementing effective access controls and data protection measures.
Register me |
Wednesday, February 12, 2025
9:00-9:45am
Wednesday - 2/12/25
Enterprise Cybersecurity (Grand A)
Identity management is a fundamental component of a robust security strategy. This session will discuss the importance of effective identity management practices and explore common challenges such as credential theft, privilege escalation, and insider threats. Attendees will learn about best practices for identity governance, authentication, and authorization.
Register me |
10:00-10:45am
Wednesday - 2/12/25
Enterprise Cybersecurity (Grand A)
Threats in cyberspace have skyrocketed in recent years. Brute force attacks from automated hacking attempts, keyloggers, ransomware, viruses, malware, email phishing attempts and social engineering attacks are problems that today’s companies must fight back against. With so much corporate and personal information moving online and into the “cloud” there is a very real threat that our data can be stolen, exploited and leveraged against us. Best case, you recover. Worst case, you go out of business. The fact is that many businesses still do not have a comprehensive cybersecurity plan, and those responsible for business continuity and data security are stressed out, not sure how to start, what threats to look for, or how it will impact their business. Not only that, the risk of non-compliance for certain industries is a critical component to having a recovery plan. This session will provide business owners, data professionals, and entrepreneurs a proven 7-step formula for develop a cybersecurity incident response plan without getting stressed out or overwhelmed. They will know what information they will need, how to value assets and assess threats; how to react and recover from a cyberattack; and they will have a blueprint for creating their own cybersecurity plan.
Register me |
11:00-11:45am
Wednesday - 2/12/25
Enterprise Cybersecurity (Grand A)
It's not a question of if, but when, a cyber attack will impact your business. A well-crafted incident response and recovery plan is essential for minimizing the impact of any cyberattacks. This session will discuss the key components of an effective incident response plan, including incident detection, containment, eradication, recovery, and lessons learned. Attendees will learn about testing incident response plans and ensuring that organizations are prepared to respond to a variety of cyber threats.
Register me |
12:00-12:45pm
Wednesday - 2/12/25
Enterprise Cybersecurity (Grand A)
The Human Element: Building a Security Culture to Combat Phishing and Social Engineering Threats
ECE-11 Phishing and social engineering attacks continue to be a significant threat to organizations, and they are only becoming more complex and harder to identify. This session will explore the human element of security and discuss the importance of building a strong security culture. Attendees will learn about strategies for raising awareness, training employees, and fostering a security-conscious mindset, with the goal of understanding how to effecetivly mitigate social engineering and phishing risks.
Register me |
Thursday, February 13, 2025
12:00-12:45pm
Thursday - 2/13/25
Enterprise Cybersecurity (Grand A)
Artificial intelligence has the potential to revolutionize cybersecurity. This session will explore the intersection of cybersecurity and AI, discussing the benefits and challenges of using AI for threat detection, prevention, and response. Attendees will learn about AI-powered security tools and techniques, as well as the ethical implications of using AI in cybersecurity.
Register me |
1:00-1:45pm
Thursday - 2/13/25
Enterprise Cybersecurity (Grand A)
As quantum computing advances, industries face unprecedented challenges to digital security. This presentation explores the role of quantum-safe technologies and standards in addressing these challenges, with a focus on the finance sector. Dr. Keeper L. Sharkey, a leader in quantum technologies and cybersecurity, will highlight key insights from the IEEE SA 1947 Quantum Cybersecurity Framework and the InfraGard Quantum Technologies & Cybersecurity (QT&SC) Cross-Sector Council. Drawing on findings from the Quantum Economic Development Consortium (QED-C) publication on Quantum Key Distribution (QKD) in finance, this talk will delve into practical use cases and actionable strategies for adopting quantum-safe measures. Attendees will gain an understanding of emerging threats, industry trends, and how to future-proof their organizations in the quantum era. The session will be presented by Dr. Keeper L. Sharkey, a renowned quantum chemist, entrepreneur, and thought leader in advanced quantum technologies. With an introduction from Reese Bess Tuttle, Co-founder of AP2T Labs. Both Dr. Sharkey and Reese contribute to the advancement of quantum cybersecurity standards, with Dr. Keeper L Sharkey serving as Chair and Reese Bess Tuttle as Secretary for IEEE SA P1947: Standards for Quantum Cybersecurity Framework.
Register me |