Join the SynerComm team to collaborate with industry visionaries and your peers on the latest strategies and challenges we face evolving IT infrastructure, data centers and InfoSec programs to meet todays and tomorrows business needs. Right sizing the public cloud footprint, implementing zero-trust security principles, leveraging automation and AIOps to optimize operations and combat more sophisticated threats like WormGPT are the table stakes. The industry is seeking better ways to quantify cyber investments. Don’t miss out! An Educational and Entertaining way to Earn CPE credits! We encourage you to extend an invitation to your peers!

When: September 13th & 14th 

Where: Potawatomi Hotel & Casino
1721 W Canal St, 3rd Floor, Milwaukee, WI 53233

Audience: Leadership, Architectural, and Operational professionals in medium to large enterprises and service providers.

Attendance is free of charge and limited to qualified attendees only.

Topics

🟩 Infrastructure Design & Implementation
🟧 Cyber Risk and Finance
🟦 Assessing & Validating Controls

Network, Security & Cloud Infrastructure Automation, AIOps, and Identifying Outdated Infrastructure
Let SynerComm’s experts amplify your team’s effectiveness with AIOps

🟩 Green Track – Infrastructure Design & Implementation
The following sessions are featured at IT Summit for this topic. Click each to learn more.

🟩 Hybrid Cloud Common Architectural & Security Issues by SynerComm
🟩 APIs – Today’s most strategic, powerful, and potentially dangerous business toolset by SynerComm
🟩 AIOps & Automation by SynerComm
🟩 Thought Leadership Roundtable ¹ by SynerComm
🟩 Hands-On Workshop: API Lab – Game-Changing APIs in Action ¹ by SynerComm
🟩 Capture the Flag Competition: using Palo Alto Networks Cortex XDR platform ¹ ² by Palo Alto Networks & SynerComm
🟩 Capture the Flag Competition: using Palo Alto Networks Prisma Cloud platform ¹ ² by Palo Alto Networks & SynerComm
🟩 Top 5 “No Code” Automation Use Cases by Netbrain
🟩 Cloud Security Lessons Learned from Recent Cyber Attacks by Palo Alto Networks
🟩 What is Fabric Networking and Why Should You Care? by Extreme Networks
🟩 AI Ops – Preparing yourself and your workforce for the next-generation of network operations by Juniper Networks
🟩 Enhancing your security posture with Zero-Trust and AIOps while demonstrating financial acumen Keynote Session by Bashar Abouseido
🟩 The Adversary Universe by Crowdstrike
¹ Space and materials are limited. Must register in advance to attend.
² Attendees may compete as a team with their company. Must bring your own computer to compete – minimum 1 computer per team.

Cyber Risk and Financial Business Impacts
Map cyber risks to dollars with SynerComm’s INSIGHTS

🟧 Orange Track – Cyber Risk & Finance
The following sessions are featured at IT Summit for this topic. Click each to learn more.

🟧 Data Driven Cybersecurity Strategies; Understand your Destination, Build Better Maps and Plan Better Routes by SynerComm
🟧 Thought Leadership Roundtable ¹ by SynerComm
🟧 “Financification” of Cybersecurity Risk by SynerComm
🟧 The Evolving Landscape of Email Security and the Role of Cyber Insurance by Mimecast
¹ Space and materials are limited. Must register in advance to attend.

Keynotes & Panelists

Bashar Abouseido

SVP, Chief Information security Officer @ Charles Schwab

Cristian Rodriguez

CTO – Americas @ Crowdstrike

Gary S. Chan

Security Mentalist and System VP & CISO @ SSM Healthcare

Kevin Richards

President, Cyber Risk Solutions @ X-Analytics

Roger Grimes

Cybersecurity Author & Data-Driven Defense Evangelist @ KnowBe4

Schedule

Wednesday
Thursday
Sept 13th, 12:15pm-7:30pm

12:15pm

Doors Open

Solution Fair
12:15pm-7:30pm
Visit SELECT and GOLD business partners who are on-site and available to share the latest in IT solutions.

1:00pm

⭐ Keynote Session
1:00pm-2:30pm in Serenity Room

Extreme Social Engineering - Part 1
Gary S. Chan, Security Mentalist

Implementing the Zero-Trust Model and AIOps
Bashar Abouseido - SVP & CISO @ Charles Schwab

 

2:35pm

Terabytes from Tehran: The Opening Day that ALMOST didn't happen
2:35pm-3:15pm in Clarity Room
by Recorded Future
🟦 Blue Track - Assessing & Validating Controls

Are you still running on a 20th Century network?
2:35pm-3:15pm in Inspire Room
by Extreme Networks
🟩 Green Track - Infrastructure Design & Implementation

2:35pm-3:15pm in Serenity Room
by Wiz
🟦 Blue Track - Assessing & Validating Controls

3:15pm

Break
3:15pm-3:30pm

3:30pm

3:30pm-5:25pm in Harmony Room
by SynerComm
🟩🟦🟧 All Tracks
3:30pm-4:05pm in Prosperity Room
by SynerComm
🟩 Green Track - Infrastructure Design & Implementation
3:30pm-4:05pm in Inspire Room
by SynerComm
🟩 Green Track - Infrastructure Design & Implementation
3:30pm-4:05pm in Serenity Room
by SynerComm
🟦 Blue Track - Assessing & Validating Controls
3:30pm-4:05pm in Clarity Room
by SynerComm
🟧 Orange Track - Cyber Risk & Finance

4:10pm

4:10pm-4:45pm in Prosperity Room
by SynerComm
🟩 Green Track - Infrastructure Design & Implementation
4:10pm-4:45pm in Clarity Room
by SynerComm
🟦 Blue Track - Assessing & Validating Controls
4:10pm-4:45pm in Serenity Room
by SynerComm
🟦 Blue Track - Assessing & Validating Controls
4:10pm-4:45pm in Inspire Room
by SynerComm
🟦 Blue Track - Assessing & Validating Controls

4:50pm

4:50pm-5:25pm in Prosperity Room
by SynerComm
🟩 Green Track - Infrastructure Design & Implementation
4:50pm-5:25pm in Inspire Room
by SynerComm
🟩 Green Track - Infrastructure Design & Implementation
4:50pm-5:25pm in Serenity Room
by SynerComm
🟦 Blue Track - Assessing & Validating Controls
4:50pm-5:25pm in Clarity Room
by SynerComm
🟧 Orange Track - Cyber Risk & Finance

5:30pm

Food & Refreshments
5:30pm-7:30pm

6:00pm

6:00pm-7:30pm in Prosperity Room
by Palo Alto Networks & SynerComm
🟩 Green Track - Infrastructure Design & Implementation
6:00pm-7:30pm in Serenity Room
by SynerComm
🟦 Blue Track - Assessing & Validating Controls

¹ Space and materials are limited. Must register in advance to attend.
² Attendees may compete as a team with their company. Must bring your own computer to compete - 1 computer per team.

Sept 14th, 7:30am-5:00pm

7:30am

Doors Open

Solution Fair
7:30am-3:15pm
Visit SELECT and GOLD business partners who are on-site and available to share the latest in IT solutions.

8:00am

⭐ Keynote Session
8:00am-9:40am in Serenity Room

Extreme Social Engineering - Part 2
Gary S. Chan - Security Mentalist

The Adversary Universe
Cristian Rodriguez - CTO, Americas @ Crowdstrike

 

9:40am

Break
9:40am-9:50am

9:50am

9:50am-10:30am in Serenity Room
by Skybox Security
🟩 Green Track - Infrastructure Design & Implementation

 

9:50am-10:30am in Harmony Room
by Netbrain
🟩 Green Track - Infrastructure Design & Implementation

 

The Evolving Landscape of Email Security and the Role of Cyber Insurance
9:50am-10:30am in Clarity Room
by Mimecast
🟧 Orange Track - Cyber Risk & Finance

10:35am

10:35am-11:15am in Serenity Room
by Juniper Networks
🟩 Green Track - Infrastructure Design & Implementation

 

10:35am-11:15am in Harmony Room
by Semperis
🟦 Blue Track - Assessing & Validating Controls
10:35am-11:15am in Clarity Room
by SynerComm
🟧 Orange Track - Cyber Risk & Finance

11:20am

11:20am-12:00pm in Harmony Room
by SynerComm
🟩 Green Track - Infrastructure Design & Implementation

 

11:20am-12:00pm in Prosperity Room
by SynerComm
🟩 Green Track - Infrastructure Design & Implementation

 

11:20am-12:00pm in Inspire Room
by SynerComm
🟦 Blue Track - Assessing & Validating Controls

 

11:20am-12:00pm in Serenity Room
by SynerComm
🟦 Blue Track - Assessing & Validating Controls

 

11:20am-12:00pm in Clarity Room
by SynerComm
🟧 Orange Track - Cyber Risk & Finance

12:00pm

Lunch
12:00pm-1:15pm

01:15pm

1:15pm-1:55pm in Clarity Room
by Infoblox
🟩 Green Track - Infrastructure Design & Implementation

 

1:15pm-1:55pm in Harmony Room
by KnowBe4
🟦 Blue Track - Assessing & Validating Controls

 

1:15pm-1:55pm in Serenity Room
by Palo Alto Networks
🟩 Green Track - Infrastructure Design & Implementation

2:00pm

2:00pm-2:40pm in Prosperity Room
by SynerComm
🟩 Green Track - Infrastructure Design & Implementation

 

2:00pm-2:40pm in Harmony Room
by SynerComm
🟩 Green Track - Infrastructure Design & Implementation

 

2:00pm-2:40pm in Inspire Room
by SynerComm
🟦 Blue Track - Assessing & Validating Controls

 

2:00pm-2:40pm in Serenity Room
by SynerComm
🟦 Blue Track - Assessing & Validating Controls

 

2:00pm-2:40pm in Clarity Room
by SynerComm
🟧 Orange Track - Cyber Risk & Finance

2:45pm

2:45pm-4:10pm in Prosperity Room
by Palo Alto Networks & SynerComm
🟩 Green Track - Infrastructure Design & Implementation

 

2:45pm-3:25pm in Harmony Room
by SynerComm
🟩 Green Track - Infrastructure Design & Implementation

 

2:45pm-3:25pm in Serenity Room
by SynerComm
🟦 Blue Track - Assessing & Validating Controls

 

2:45pm-3:25pm in Inspire Room
by SynerComm
🟦 Blue Track - Assessing & Validating Controls

 

2:45pm-3:25pm in Clarity Room
by SynerComm
🟧 Orange Track - Cyber Risk & Finance

3:30pm

3:30pm-4:10pm in Harmony Room
by SynerComm
🟩 Green Track - Infrastructure Design & Implementation

 

3:30pm-4:10pm in Inspire Room
by SynerComm
🟦 Blue Track - Assessing & Validating Controls

 

3:30pm-4:10pm in Clarity Room
by SynerComm
🟧 Orange Track - Cyber Risk & Finance
4:15pm

🎟️ Business Partner Raffle
4:15pm-5:00pm in Serenity Room
Must be present to win!

¹ Space and materials are limited. Must register in advance to attend.
² Attendees may compete as a team with their company. Must bring your own computer to compete - 1 computer per team.

Don’t forget to register for IT Summit today

Select Partners

Select partners are top-tier sponsors of it summit who present sessions and are on-site and available for more information in the solution fair.

Gold partners

Gold partners are sponsors of it summit who are on-site and available for more information in the solution fair.

Sessions

Enhancing Your Security Posture with Zero-Trust and AIOps while demonstrating financial acumen

Time

Wednesday, September 13, 2023
1:30pm-2:00pm in Serenity Room

Abstract

Bashar brings a unique perspective as he has been actively involved in the ML/AI market since 2017. Key ML/AI opportunities to be discussed include:

  • Intelligent automation to provide faster improved event context
  • Security control and tool consolidation versus continuously adding threat specific, static controls

A few of the ML/AI risks and threats to be discussed include:

  • The need to defend against more sophisticated multi-channel attacks
  • The need for ML/AI Model(s) Validation, Confidence, Safeguards/Overrides and Lifecycle Oversight process
  • Handling black swan events

Speaker

Bashar Abouseido – SVP, Chief Information Security Officer @ Charles Schwab

Bashar’s career spans 3 decades in IT having held Software Architect, Security Architect, Security & Risk Management roles leading to his current role for the last decade as SVP and CISO at Schwab.

Experience the Power of Hidden Influence – Extreme Social Engineering

Times

Wednesday, September 13, 2023
2:00pm-2:20pm in Serenity Room

Thursday, September 14, 2023
9:00am-9:20am in Serenity Room

Abstract

Gary S. Chan is a renowned security mentalist and CISO at SSM Health. He has a degree in Electrical Engineering & Computer Science from MIT. Witness Gary’s mind-bending routines leveraging security concepts, game theory, math, and other techniques to understand, predict, and influence people.

Speaker

Gary S. Chan – Security Mentalist and Speaker

Gary S. Chan – Security Mentalist and Speaker

Gary has decades of experience in security and is trained in behavioral profiling, conflict management, negotiation, interrogation, and mediation. He architected anti-fraud systems for state agencies, led the information security teams for a large-cap technology company, currently owns a security consulting company (Alfizo.com), currently leads the security teams for a large multi-state healthcare system, and was an evaluator and mentor for cybersecurity start-ups as part of a venture capital fund. He served as President of the FBI St. Louis Citizens Academy Alumni Association and Technology Officer for the Greater St. Louis Association of Certified Fraud Examiners. He holds four security certifications and a degree in Electrical Engineering & Computer Science from MIT.

Thought Leadership Roundtable

Time

Wednesday, September 13, 2023
3:30pm-5:25pm in Harmony Room

Abstract

The IT Summit Roundtable is an opportunity for leadership roles to gather and discuss challenges that their company and industry face now and will face in the coming years.

Join this session to hear from panelists and share your journey on the following topics:

The quantification of Cyber Risk – Technological, Operational and Financial 
Panelist: Kevin Richards, X-Analytics

  • The evolution of InfoSec Programs 
  • The hype cycle – capturing the promise of financial, data-driven InfoSec Program analysis 

Securing the plant floor – what does an OT Cybersecurity strategy look like and why is it important? 
Panelist: Vicky Bruce, Rockwell Automation 

DR/BCP Update
Panelist: Ric Ruiz, FIS Sr Recovery Manager, Victor Vinogradov, CISO WAB  

  • Fail-Over Testing Scope 
  • Modelling\What if analysis – Digital Twins 
  • Data Governance 

Information Assurance Testing – When to rotate suppliers/testers for different perspective tools and professional services?
Panelist: Brian Judd, SynerComm

AIOps Data Governance – Pii Exposure
Panelist: Victor Vinogradov, WAB

Infrastructure, Operations, Principles, Toolsets and Personnel Needs 

  • The Zero-Trust Model Journey 
  • Automation, AIOps, Technical Debt and/or Aged Infrastructure 
  • The SASE versus SSE and SD-WAN Journey 
  • The role of Public Cloud Infrastructure 
  • Staffing, Skillsets and Tool Requirements for Day 0, Day 1 and Day 2 Operations 
  • Technology Sourcing 
  • Short- and long-term impact of chipset lead times 
  • Your Public Cloud Footprint 
  • Right sizing the cost 
  • How many public cloud platforms do you need (AWS, Azure, GCP) 
  • Platform Site License Agreements 
  • Subscriptions versus Perpetual License 

Annual Predictions for the Future (next 1-3 years) 

Speaker

Moderators:

Mark Sollazo – President, CEO, Co-founder @ SynerComm
Kirk Hanratty – VP, Co-founder @ SynerComm

Panelists:

Bashar Abouseido – SVP, Chief Information Security Officer @ Charles Schwab

Bashar’s career spans 3 decades in IT having held Software Architect, Security Architect, Security & Risk Management roles leading to his current role for the last decade as SVP and CISO at Schwab.

Kevin Richards – President, Cyber Risk Solutions @ X-Analytics

Kevin is a Cybersecurity Strategy & Risk Executive with over 30 years of experience in information security and enterprise risk management. Working with large multi-national corporations, as well as the United States Department of Defense and other U.S. Federal, State and Local agencies, Kevin provides an array of technical and pragmatic perspectives on building and protecting an organization’s critical information assets.

Currently, Kevin serves as President – Cyber Risk Solutions with Secure Systems Innovation Corporation (SSIC), a cyber risk analytics firm whose mission is to improve how businesses manage cyber risk through the power of data analytics. Kevin leads the strategic development and customer success of SSIC’s cyber risk business worldwide. Foundational within this business is the development and market growth of the X-Analytics (www.x-analytics.com), SSIC’s market leading cyber risk decisioning application.

Vicky Bruce – Global Capability Manager, Cybersecurity Services @ Rockwell Automation

Vicky is an experienced OT professional who has worked in field service, technical consulting, partnership development, and product management during her 13 years with Rockwell Automation. Her current responsibilities include leading the Network & Cybersecurity Services Product management Team focused on creating world class Industrial Cybersecurity Services for companies around the globe.

A tall task – ransomware defense, information security program efficacy and agility in an unpredictable world – day 1

Keynote Session

Time
Wednesday, September 11, 2024
1:00pm-2:30pm in Serenity Room

Abstract
In this keynote will discuss practical risk assessment, architectural, operational and governance trends, insights and lessons learned as we all embark on a journey to prevent, detect and recover from a ransomware attacks… while AI-enabling your organization… and meeting your business needs.

We will discuss the role risk frameworks (NIST CSF), controls frameworks (CIS CSC) and financial modeling play in the board room and in the field. Dealing with the complexity of the Known Knowns, Known Unknowns and Unknown Unknowns threats requires a shift in leadership’s expectations of your Information Security program. To deal with the complexity there is a need to not only assess risk but also validate vulnerabilities to focus your resources on what moves the needle. In parallel we are evolving architectural and security tools capabilities from threat-specific controls to behavioral-based visibility access your endpoints, networks and applications. What is the vision for a future minimum viable toolset and how do we get there?

Speaker
Moderators:

Mark Sollazo – President, CEO, Co-founder @ SynerComm
Kirk Hanratty – VP, Co-founder @ SynerComm

The Adversary Universe

Keynote Session

Time

Thursday, September 14, 2023
8:00am-9:40am in Serenity Room

Abstract

2022 was a year of explosive, adaptive and damaging threats. As adversaries continue to be relentless in their campaigns, they become faster and more sophisticated in their attacks. In this session, Cristian will share notable themes, trends and events across the cyber threat landscape from the CrowdStrike 2023 Global Threat Report, and the recently published 2023 Hunting Report.

Speaker

Cristian Rodriguez – Field CTO, Americas @ Crowdstrike

Cristian Rodriguez, Field CTO for the Americas at CrowdStrike, has been a trusted advisor to cybersecurity leaders across a range of industries including financial services, academic, and federal, state and local governments for 18 years. He has provided expertise and assistance to address the technical and business challenges executives face when investing in new cyber technologies, but more importantly, when implementing new policies around their investments.

As a mainstay at CrowdStrike for the past 8+ years, he’s contributed to various white papers on mapping to compliance standards such as NIST, PCI and HIPAA; and has lead Local Government and Healthcare SE programs. Previous roles include field and consulting systems engineering with the likes of Optiv, Websense (Forcepoint), and Zimperium.

Better Together

by

Time

Wednesday, September 13, 2023

Abstract

Between AIT and DIT we have solutions for just about every area of IT and security, especially as it falls into a PDCA cycle.

Speakers

Marc Spindt – VP of Service Delivery / Strategy Consultant @ SynerComm

Marc Spindt has 30 years of Carrier, Large Enterprise, and Service Provider technical, operational, and organizational experience.  Marc has worked with SynerComm for 12 years delighting customers with IT organizational improvement and actionable strategic planning.  Marc has a BS in Computer Science, an MBA, and he served in the U.S. Air Force.  Marc has a long history of building and maturing technology and security services and organizations in industries including Financial Services, Defense Contracting, and Healthcare.

Lisa Niles – Director of Solutions Integration @ SynerComm

Lisa Niles has over 30 years of experience working in security and networking. Lisa’s specialization is understanding the customers business needs and mapping to the correct security controls. 

Lisa experience provides for vast knowledge in many different network environments. The ability to understand business and technical needs and map to various different vendor solutions to achieve desired results. Lisa helps customers understand and improve their network security and implement Industry Best Practice Security Controls Frameworks such as CIS, NIST, PCI DSS, ISO. The ability to help customers integrate and navigate to Frameworks help customers mature, measure and validate their security environment. 

Data Driven Cybersecurity Strategies; Understand your Destination, Build Better Maps and Plan Better Routes

by

Times

Wednesday, September 13, 2023
3:30pm-4:05pm in Clarity Room

Thursday, September 14, 2023
11:20am-12:00pm in Clarity Room

Thursday, September 14, 2023
2:45pm-3:25pm in Clarity Room

Abstract

Organizations today operate in a world fraught with potentially business-ending cybersecurity risk. Mature security teams balance tactics and strategy mapping safer paths and better preparing for the obstacles that inevitably arise. In this session we will share practical and actionable techniques to find balance planning, execution, and reaction to maximize success in navigating your business through the forest of cybersecurity risk.

Concepts to Cover:

Security Frameworks; Assessments; Quantified Maturity; POAMs and Roadmaps; GRC; Continuous Validation; Risk Assessment/Penetration Testing.

Speakers

Marc Spindt – VP of Service Delivery / Strategy Consultant @ SynerComm

Marc Spindt has 30 years of Carrier, Large Enterprise, and Service Provider technical, operational, and organizational experience.  Marc has worked with SynerComm for 12 years delighting customers with IT organizational improvement and actionable strategic planning.  Marc has a BS in Computer Science, an MBA, and he served in the U.S. Air Force.  Marc has a long history of building and maturing technology and security services and organizations in industries including Financial Services, Defense Contracting, and Healthcare.

“Financification” of Cybersecurity Risk

by

Time
Wednesday, September 13, 2023
4:50pm-5:25pm in Clarity Room

Thursday, September 14, 2023
10:35am-11:15am in Clarity Room

Thursday, September 14, 2023
2:00pm-2:40pm in Clarity Room

Thursday, September 14, 2023
3:30pm-4:05pm in Clarity Room

Abstract

Commonly employed cybersecurity risk assessment and reporting is akin to “check engine” lights, simple gauges, and basic warning message like “obstacle ahead.” If you are not already, you should improve your visibility to the world around your organization by adding a windshield. Join us to learn how available industry and insurance data on cybersecurity incidents and impact can help you forecast and decompose financial loss based on your risk management practices, and prioritize cybersecurity investment.

Consepts over cover

Evolution of Security Reporting (tool results -> assessments -> quantification -> “financification”; Techniques to financially quantify cybersecurity risk; Materiality; Precision, accuracy, and utilization of quantified cybersecurity risk; quick approach to incorporating “financification.”

speakers

Marc Spindt – VP of Service Delivery / Strategy Consultant @ SynerComm

Marc Spindt has 30 years of Carrier, Large Enterprise, and Service Provider technical, operational, and organizational experience.  Marc has worked with SynerComm for 12 years delighting customers with IT organizational improvement and actionable strategic planning.  Marc has a BS in Computer Science, an MBA, and he served in the U.S. Air Force.  Marc has a long history of building and maturing technology and security services and organizations in industries including Financial Services, Defense Contracting, and Healthcare.

Authz – OWASP’s #1 API Security Risk in 2023

by

Times

Wednesday, September 13, 2023
4:10pm-4:45pm in Inspire Room

Thursday, September 14, 2023
11:20am-12:00pm in Inspire Room

Abstract

Authz, short for authorization, is yet again at the top of the list for API security according to OWASP, the Open Web Application Security Project. In this session, we will address how authz has changed, why it remains the biggest challenge in web app API security, and some modern approaches to managing it. This session offers a mix of high-level and technical content, and is an excellent fit for software teams that strive to secure their web applications.

Speakers

Bill Kiley – Software Architect @ SynerComm

Bill has been designing and developing web applications for 10+ years. He leads the software team at SynerComm in building the CASM® (Continuous Attack Surface Management) app and consults on software security. With a deep interest in data modeling, Bill enjoys solving problems with automation and building secure-by-design applications.

Exploring Modern Phishing Techniques

by

Times

Wednesday, September 13, 2023
4:10pm-4:45pm in Clarity Room

Thursday, September 14, 2023
2:00pm-2:40pm in Serenity Room

Abstract

Phishing attacks have been around for a long time, but modern phishing techniques are constantly evolving, incorporating new technologies and tactics. This talk will delve into the latest phishing techniques used to bypass security controls.

Speakers

Isaac Trzebiatowski – Information Assurance Consultant @ SynerComm

Isaac brings more than 11 years of extensive experience in the Information Technology industry, with a dedicated focus on Security for the past 7 years.

Prior to joining SynerComm, Isaac held a position at a Fortune 500 Insurance company for 4 years, where he played a pivotal role in defensive and offensive security efforts. During this time, he spearheaded web application testing, penetration testing, and vulnerability management. Some of Isaac’s responsibilities included interfacing with stakeholders throughout the company, calculating risk based on internal environment knowledge, and developing and fine-tuning detection and alerting capabilities.

Adversary Simulations

by

Times

Wednesday, September 13, 2023
4:50pm-5:25pm in Serenity Room

Thursday, September 14, 2023
2:00pm-2:40pm in Inspire Room

Thursday, September 14, 2023
2:45pm-3:25pm in Inspire Room

Abstract

A behind the scenes look at the work our pentest replay and adversary simulation practice area engages in to continually tune our Playbook intellectual property to keep our offerings best in class.

Speakers

Dylan Webb – Sr. Information Assurance Consultant @ SynerComm

Dylan has over 13 years of experience as a full-time Penetration Tester and Information Security Consultant. Dylan began his IT career 17 years ago as a Systems Administrator which included the role of lead security technician. Prior to joining SynerComm, Dylan was a Senior Information Assurance Consultant where he conducted penetration tests, web application security assessments, and social engineering exercises.

Dylan also conducted product assessments while working at a Global Fortune 100 company in the Industrials sector. He interfaced with many different business units to conduct security assessments of the company’s products which included those used for Industrial Control Systems, Building Technology, and Healthcare/Medical devices.

Developing an Evasive C2 Agent

by

Times

Wednesday, September 13, 2023
4:10pm-4:40pm in Serenity Room

Thursday, September 14, 2023
3:30pm-4:10pm in Inspire Room

Abstract

Utilize a homegrown EchoC2 agent to discuss developing an evasive Command & Control (C2) agent from scratch. EchoC2 leverages the ICMP protocol for C2 tasking and is written in Rust.

Speakers

Dylan Reuter – Information Assurance Consultant @ SynerComm

Dylan has been working in IT for 6 years. Prior to joining SynerComm, he worked as a software engineer, writing efficient and scalable multi-tenant software for an ERP company in the southern tech hub of Austin, Texas. During his time as a software engineer, Dylan worked professionally with several languages and technologies such as: Python, Perl, GoLang, JavaScript, SQL, and Rust. Dylan’s responsibilities later transitioned to cyber security and penetration testing. He is currently pursuing his Offensive Security Experienced Professional (OSEP) certification.

Attack Surface Management – The Best of Automation, People, Process & Playbooks

by

Times

Wednesday, September 13, 2023
3:30pm-4:05pm in Serenity Room

Thursday, September 14, 2023
11:20am-12:00pm in Serenity Room

Thursday, September 14, 2023
2:45pm-3:25pm in Serenity Room

Abstract

The secret sauce to effective Continuous Penetration Testing (CPT) is to automate everything that can be done safely and continue to use expert penetration testers to perform everything else. Learn about SynerComm’s CPT Playbooks and find out what your company may be missing between annual pentests.

Speakers

Alex Philiotis – Information Assurance Consultant @ SynerComm

Alex brings 3 years of consulting experience and just shy of two years of penetration testing experience. Alex started his career working in business consulting in 2019 shortly before receiving his bachelors from Loyola University Chicago. While working, Alex began pursuing offensive and information security as a passion on the side.

After leaving the business consulting world to further pursue offensive security, Alex earned his OSCP in early 2022, followed by his OSWP and OSWA in quick succession.

In his early career, Alex has built a broad and diverse set of security skills with a focus on external penetration testing. His certifications and education have provided him with a strong background in networking and web application assessments. 

Building a Wi-Fi Deauthentication Detector

by

Time

Wednesday, September 13, 2023
6:00pm-7:30pm in Serenity Room

Abstract

Join us as we provide an introduction to the Arduino IDE and the ESP8266 microcontroller. Receive a free ESP8266, and build your own Wi-Fi deauthentication detector. We will walkthrough assembly, flashing, and configuration steps. Capacity limited to the first 30 attendees.

Space and materials are limited. Must register in advance to attend.

Speakers

Ryan Zagrodnik – Information Assurance Consultant @ SynerComm

Ryan brings over sixteen years of red and blue team experience. Ryan started his career in 2007 as a System Administrator for a large health insurance corporation. Ryan earned his CISSP in 2011 and has been working in offensive security ever since. Prior to starting at SynerComm, Ryan spent three years on an internal red team for a Fortune 1000. Ryan also spent several years working in offensive and defensive security roles for the U.S. Department of Defense and Department of Education contractors.
 
Ryan has a broad and diverse security background with a specialization in web application testing. His multiple security roles have allowed him to pick up Network, Development, and Systems Administration capabilities. Ryan has worked with Development teams to deploy security solutions that integrate with their CICD pipelines.
 
Ryan also has experience deploying, customizing, and maintaining enterprise-level security tools such as Splunk, PaloAlto, CrowdStrike, FireEye, Snort, and Nessus. Ryan also has a strong background in intrusion detection and development of custom IDS rules.

Hybrid Cloud – Common Architectural & Security Issues

by

Times

Wednesday, September 13, 2023
3:30pm-4:05pm in Inspire Room

Wednesday, September 13, 2023
4:50pm-5:25pm in Inspire Room

Thursday, September 14, 2023
11:20am-12:00pm in Harmony Room

Thursday, September 14, 2023
2:00pm-2:40pm in Harmony Room

Abstract

We will share strategies to take your hybrid architecture and security to the next level by identifying common architectural issues and layered security posture risk and provide recommendations on how to leverage standards and automation to remediate them.

Speakers

Aaron Howell – Managing Consultant: Multi-Cloud Architecture & Innovations @ SynerComm

Aaron has over 15 years of information technology (IT) experience, operating in the complete lifecycle of Information Technology. He works on projects, designing and implementing multiple solutions across various platforms, supports and improves operations, and drives effective transitions to new infrastructure and technology. Aaron is a “Full Stack” consultant experienced with Scripting & Development, Cloud (AWS and Azure) & Systems, and Network & Security.

AIOps & Automation

by

Times

Wednesday, September 13, 2023
4:10pm-4:45pm in Prosperity Room

Thursday, September 14, 2023
2:45pm-3:25pm in Harmony Room

Thursday, September 14, 2023
3:30pm-4:10pm in Harmony Room

Abstract

How do you know your infrastructure is out of date…AI based operations. Insights to automate your network OPs. Saving money, time, and downtime.

Speakers

Andy Piché – Sr. Information Solutions Consultant @ SynerComm

Andrew Piche has over 20 years of hands-on experience working on security, networking, data center, and cloud-based solutions. Andrew is experienced working with Palo Alto, Juniper, and Cisco equipment in enterprise, service provider, and data center environments. He has delivered solutions and supported customers in Enterprise, Carrier, Commercial and Government organizations.

Andrew has developed, operated, and supported security, networking, and application delivery solutions using a variety of products from multiple vendors. He is a Palo Alto Certified Network Security Consultant (PCNSC) since 2018 and is the lead in firewall migrations, Best Practice Assessments, and training. He has developed and supported solutions ranging from implementing network security and segmentation to server/system virtualization solutions, support for application load balancing and network segmentations via the F5 solution extend Andrew’s experience beyond traditional firewall skill sets. As a Senior Information Solutions Consultant for SynerComm, Andrew has the background, experience, and customer-focus to treat each customer as though they are SynerComm’s only customer.

APIs – Today’s most strategic, powerful, and potentially dangerous business toolset

by

Times

Wednesday, September 13, 2023
3:30pm-4:05pm in Prosperity Room

Thursday, September 14, 2023
2:00pm-2:40pm in Prosperity Room

Abstract

Understand how and why API’s are great for operations and security tool integration and also why you need a strategy, security and standards before opening up vast amount’s of data access What you don’t know can and will hurt you.

Speakers

Lisa Niles – Director of Solutions Integration @ SynerComm

Lisa Niles has over 30 years of experience working in security and networking. Lisa’s specialization is understanding the customers business needs and mapping to the correct security controls. 

Lisa experience provides for vast knowledge in many different network environments. The ability to understand business and technical needs and map to various different vendor solutions to achieve desired results. Lisa helps customers understand and improve their network security and implement Industry Best Practice Security Controls Frameworks such as CIS, NIST, PCI DSS, ISO. The ability to help customers integrate and navigate to Frameworks help customers mature, measure and validate their security environment. 

API Lab – Game-Changing APIs in Action

by

Times

Wednesday, September 13, 2023
4:50pm-5:25pm in Prosperity Room

Thursday, September 14, 2023
11:20am-12:00pm in Prosperity Room

Abstract

In this hands-on API workshop we will explore API layers, API testing via Postman, PAN Dynamic Groups & EDL, Infoblox, and more.

Space and materials are limited. Must register in advance to attend.

Speakers

Lisa Niles – Director of Solutions Integration @ SynerComm

Lisa Niles has over 30 years of experience working in security and networking. Lisa’s specialization is understanding the customers business needs and mapping to the correct security controls. 

Lisa experience provides for vast knowledge in many different network environments. The ability to understand business and technical needs and map to various different vendor solutions to achieve desired results. Lisa helps customers understand and improve their network security and implement Industry Best Practice Security Controls Frameworks such as CIS, NIST, PCI DSS, ISO. The ability to help customers integrate and navigate to Frameworks help customers mature, measure and validate their security environment. 

Aaron Howell – Managing Consultant: Multi-Cloud Architecture & Innovations @ SynerComm

Aaron has over 15 years of information technology (IT) experience, operating in the complete lifecycle of Information Technology. He works on projects, designing and implementing multiple solutions across various platforms, supports and improves operations, and drives effective transitions to new infrastructure and technology. Aaron is a “Full Stack” consultant experienced with Scripting & Development, Cloud (AWS and Azure) & Systems, and Network & Security.

Andy Piché – Sr. Information Solutions Consultant @ SynerComm

Andrew Piche has over 20 years of hands-on experience working on security, networking, data center, and cloud-based solutions. Andrew is experienced working with Palo Alto, Juniper, and Cisco equipment in enterprise, service provider, and data center environments. He has delivered solutions and supported customers in Enterprise, Carrier, Commercial and Government organizations.

Andrew has developed, operated, and supported security, networking, and application delivery solutions using a variety of products from multiple vendors. He is a Palo Alto Certified Network Security Consultant (PCNSC) since 2018 and is the lead in firewall migrations, Best Practice Assessments, and training. He has developed and supported solutions ranging from implementing network security and segmentation to server/system virtualization solutions, support for application load balancing and network segmentations via the F5 solution extend Andrew’s experience beyond traditional firewall skill sets. As a Senior Information Solutions Consultant for SynerComm, Andrew has the background, experience, and customer-focus to treat each customer as though they are SynerComm’s only customer.

CTF Competition:
Hunt Down and Stop Stealthy Attacks with DNS and PAN Cortex XDR

by

Time

Wednesday, September 13, 2023
6:00pm-7:30pm in Prosperity Room

Abstract

The Cortex XDR platform delivers a unified experience for prevention, detection, investigation and response. This CTF environment consists of a series of challenges that vary in their degree of difficulty and require participants to exercise different skill sets to solve. Once a challenge is solved, a “flag” is given to the participant which then results in points being awarded. The winning team/player is the one that solved the most challenges thus having scored highest.

Space and materials are limited. Must register in advance to attend.
Attendees may compete as a team with their company. Must bring your own computer to compete – 1 computer per team.

Speakers

Sai Karki – Systems Engineer @ Palo Alto Networks

Lisa Niles – Director of Solutions Integration @ SynerComm

Lisa Niles has over 30 years of experience working in security and networking. Lisa’s specialization is understanding the customers business needs and mapping to the correct security controls. 

Lisa experience provides for vast knowledge in many different network environments. The ability to understand business and technical needs and map to various different vendor solutions to achieve desired results. Lisa helps customers understand and improve their network security and implement Industry Best Practice Security Controls Frameworks such as CIS, NIST, PCI DSS, ISO. The ability to help customers integrate and navigate to Frameworks help customers mature, measure and validate their security environment. 

CTF Competition:
Prisma Cloud. The visibility and control you love in your Palo Alto firewalls to manage your cloud resources

by

Time

Thursday, September 14, 2023
2:45pm-4:10pm in Prosperity Room

Abstract

In this Capture the Flag training event, you will be capturing countries by answering a series of quiz questions pertaining to the Prisma Cloud environment. To win the game, you will need to capture every available country as quickly as possible. If the time runs out, the team with the most points will win.

The audience will have the opportunity to compete in the Capture the Flag challenge to identify security issues and misconfigurations created on a public cloud environment. Users will use Prisma Cloud to identify as many of these issues as possible within a predetermined amount of time followed by Q&A.

Space and materials are limited. Must register in advance to attend.
Attendees may compete as a team with their company. Must bring your own computer to compete – 1 computer per team.

Speakers

Sai Karki – Systems Engineer @ Palo Alto Networks

Lisa Niles – Director of Solutions Integration @ SynerComm

Lisa Niles has over 30 years of experience working in security and networking. Lisa’s specialization is understanding the customers business needs and mapping to the correct security controls. 

Lisa experience provides for vast knowledge in many different network environments. The ability to understand business and technical needs and map to various different vendor solutions to achieve desired results. Lisa helps customers understand and improve their network security and implement Industry Best Practice Security Controls Frameworks such as CIS, NIST, PCI DSS, ISO. The ability to help customers integrate and navigate to Frameworks help customers mature, measure and validate their security environment. 

Aaron Howell – Managing Consultant: Multi-Cloud Architecture & Innovations @ SynerComm

Aaron has over 15 years of information technology (IT) experience, operating in the complete lifecycle of Information Technology. He works on projects, designing and implementing multiple solutions across various platforms, supports and improves operations, and drives effective transitions to new infrastructure and technology. Aaron is a “Full Stack” consultant experienced with Scripting & Development, Cloud (AWS and Azure) & Systems, and Network & Security.

Top 5 “No Code” Automation Use Cases

by

Time

Thursday, September 14, 2023
9:50am-10:30am in Harmony Room

Abstract

Next-Gen Network Automation tools help enterprises tackle the hundreds of NetOps tasks you face every day. Intent-based network automation solutions are geared towards rapidly accelerating Day-2 operations. From mapping to troubleshooting to monitoring and enforcing intents, an intelligent platform can reduce your MTTR by 95% and detect 50% of network problems before they impact your production environment. Tight integration with major ITSM systems like ServiceNow automates and accelerates incident resolutions and stores them for closed-loop automation. 

Speaker

Peter Giorgiutti – Channel & Services Sales @ Netbrain

Peter Giorgiutti is currently part of the Channel Team at NetBrain. He has over 10 years experience selling Network Performance Monitoring products, previously working across the AsiaPac region for both Riverbed and LiveAction.
 
Peter is passionate about disrupting Day 2 Network Operations and helping organizations take the journey towards Automation. 

The Many Ways to Hack MFA

by

Time
Thursday, September 14, 2023
1:15pm-1:55pm in Harmony Room

Abstract
Everyone knows that multifactor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn’t! I can send you a regular phishing email and completely take control of your account even if you use a super-duper MFA token. Learn the 12+ ways hackers can get around your favorite MFA solution. It will end by telling you how to better defend your MFA solution.

Speaker

Roger Grimes – Cybersecurity Author & Data-Driven Defense Evangelist @ KnowBe4

My career professional goal in life is to get more people and companies to use data and the scientific method to improve their computer security, and I do so as the Data-Driven Defense Evangelist at KnowBe4, a security awareness education company. I am a 30+-year senior computer security consultant and cybersecurity architect specializing in general computer security, identity management, PKI, Windows computer security, host security, cloud security, honeypots, APT, and defending against hackers and malware. I have also written 13 books (9 solo, 4 co-written) and over 1,100 national magazine articles on computer security. I was the weekly computer security columnist for InfoWorld/CSO magazines from 2005 to 2019. I frequently get interviewed for radio shows (including NPR’s All Things Considered), podcasts, magazines (including Newsweek) and television. If I leave this world without having made the Internet a safer place for all people to compute, I have failed.

A Deadly Combo: MFA & Lookalike Domains

by

Time
Thursday, September 14, 2023
1:15pm-1:55pm in Clarity Room

Abstract
In this session we will discuss the key trends and research from the Infoblox Threat Intelligence Group (TIG) on how lookalike domains, a consistent though evolving technique used in phishing emails, are being used in more advanced attacks today, such as those imitating MFA systems.

Speaker

Tony Velada – Senior Channel Solutions Architect @ Infoblox

Tony Velada is a Senior Channel Solutions Architect at Infoblox. Prior to joining Infoblox, he was a Network Engineer at United Airlines, responsible for DNS, DHCP, and IPAM (DDI) across their entire global network, as well as load balancers and network change and configuration management (NCCM). He has over 20 years’ experience in corporate IT, with a focus on network architecture, network engineering, network operations, network tools engineering, and *NIX system administration.

Continuous Threat Exposure Management (CTEM) – A new approach to exposure management

by

Time
Thursday, September 14, 2023
9:50am-10:30am in Serenity Room

Abstract
Gartner® refers to CTEM as “a set of processes and capabilities that allow enterprises to continually and consistently evaluate the accessibility, exposure and exploitability of an enterprise’s digital and physical assets.” In this session we will review Skybox Security’s Research Labs 2023 Vulnerability & Threat Trends Report identifying trends driving the need for new capabilities and processes to improve exposure management.

Speaker

Tom Cline – VP of Cyber Risk @ Skybox Security

15+ years of experience in technology consulting in cybersecurity domain and is an evangelist. His core competencies include – designing enterprise security solution framework to proactively protect organization sensitive data, mapping technology to business, and increasing operational IT efficiency. Tom is a trusted advisor to the CxO’s.

The Evolving Landscape of Email Security and the Role of Cyber Insurance

by

Time
Thursday, September 14, 2023
9:50am-10:30am in Clarity Room

Abstract
Organizations all over the world are growing more skittish over rising economic volatility and intensifying geopolitical tensions. Now is definitely not the time to become lax on cybersecurity. Some companies are turning to cyber insurance, however, over the past two years, the cyber insurance market has experienced large volatility with sometimes as high as triple-digit increases in premiums paid, driven by the growing demand for cyber insurance against higher loss ratios for cyber insurers.

Join us as we discuss the email security landscape, how AI fits into the picture, and how to reclaim control and balance the scales with improved controls and buying power, resulting in a more competitive cyber insurance environment.

Speaker

Toni Buhrke – Director of Sales Engineering @ Mimecast

For the last three years, Toni Buhrke has been a Director of Sales Engineering at Mimecast, and brings more than 20 years of experience in the cybersecurity industry to the role. Toni and her team are responsible for designing customized email security solutions for SLED and Enterprise customers, along with supporting National and Regional partners in the U.S. Prior to joining Mimecast, she was a Global Director of Systems Engineering at Forescout Technologies. During her 12-year tenure there, Toni and her team helped private and public sector organizations and channel partners architect and deploy network access solutions to protect complex networking environments. Throughout her career, Toni’s focus has always been on bridging the gap between technology and her customers. Toni has a Master of Business Administration (MBA) and is a Certified Information Systems Security Professional (CISSP). She is also very active in Women in Technology initiatives throughout the industry.

AI Ops – Preparing yourself and your workforce for the next-generation of network operations

by

Time
Thursday, September 14, 2023
10:35am-11:15am in Serenity Room

Abstract
Everyone is talking about AI, but what is the practical impact to network operations? In this discussion, Colin Doyle (Enterprise Global Architect – Juniper Networks) will address the current hype, separate AI from “AI wash”, and use Juniper’s own AI journey to demonstrate what an AI Ops future may look like for a typical Enterprise organization. How will AI be integrated into solutions? Where will AI Ops provide maximum value? How will existing ops roles change and why? Should I build my own AI cluster? What does “build my own AI cluster” even mean? We don’t expect you to be an expert after 45 minutes; our goal is to elevate your AI knowledge so you can make informed decisions in a marketplace crammed with inflated expectations.

Speaker

Colin Doyle – Global Enterprise Architect @ Juniper Networks

Colin Doyle represents the Enterprise perspective that informs Juniper’s Cloud-Ready DC strategy. Before Juniper, Colin managed a service delivery team at a partner VAR and before that, spent over a decade building JIT networks for global standards bodies. At Juniper, he applied his 20+ years of experience towards developing enablement tools, training new hires, providing strategic feedback for Enterprise solutions, and winning new logos as a major account SE.

Are you still running on a 20th Century network?

by

Time
Wednesday, September 13, 2023
2:35pm-3:15pm in Inspire Room

Abstract
The IT world is full of examples of recent evolution, including cloud-native applications, virtualized appliances, and internet-enabled devices. Can we say the same about the networking world? Until recently, the tool that was a major enabler in the evolution of the other aspects of our IT has lagged behind. That’s changing. Secure, cloud-native management systems fill a key piece of the puzzle as our IT environments lose their boundaries. Open API’s made easily accessible by common scripting languages open the door to insight and control that has been previously elusive at best. Finally, hybrid-cloud network access solutions can provide secure network access, including Zero Trust Network Access solutions that lock down user access per application.

Speaker

Scott Singer – Senior Systems Engineer @ Extreme Networks

Scott Singer is a Senior Systems Engineer at Extreme Networks. In his 20+ years at Extreme Networks, he’s worked for four years on the Federal Team, 10+ years on the Enterprise Team, two years dedicated to K-12 customers, and has spent the last 3+ years supporting Extreme’s partners in the Central U.S. Prior to coming to Extreme Networks, Scott spent 10 years as a co-owner of a Cisco partner where was the CIO/CTO.

Cloud Security Lessons Learned from Recent Cyber Attacks

by

Time
Thursday, September 13, 2023
1:15pm-1:55pm in Serenity Room

Abstract
After two decades of rapid cloud adoption by organizations, 2023 could be considered a turning point for cloud security. The popularity and complexity of cloud technology is expanding the attack surface with vulnerabilities and misconfigurations for cybercriminals to exploit. This session will provide examples of recent cloud attacks and provide a wide angle view of the status of common misalignments leaving the door open to malicious activity. This session will provide observations from our recently released Unit 42 Cloud Threat Report, Volume 7 that provides analysis of data collected over the past 12 months from Unit 42 Incident Response engagements in addition to analyzing cloud security at over 1,000 organizations, 210,000 cloud environments and over 70,000 code repositories. We will wrap up by providing details on how most attacks work and what organizations can do to protect themselves from cyberattacks.

Speakers

Kevin Flanagan – Sr. Director – Cloud Engagement @ Palo Alto Networks

Kevin Flanagan, CISSP, CISA, is the Senior Director for Global Cloud Engagement at Palo Alto Networks. Kevin has more than 25 years of security experience in leading the development of teams, building security programs, and designing security architectures for organizations of all sizes. His team is focused on leading organizations that are looking to improve their resilience as they take advantage of the agility and scale in the cloud.

At Palo Alto Networks, Kevin leads a team of Cloud Engagement Directors that work with the largest organizations across the globe to architect and accelerate security as they continue to evolve and transform their organization throughout the code, build, deploy, and run lifecycle.

Current Trends in Cloud Security Attack and Defense

by

Time
Wednesday, September 13, 2023
2:35pm-3:15pm in Serenity Room

Abstract
If you’re responsible for defending a cloud estate — of any size — you know that there are myriad threats, but which do you focus on first? This talk begins with a survey of the current top threats to cloud infrastructures, such as stolen credentials, misconfiguration, multi-cloud complexity, and even attackers’ use of AI and automation. As we go, we’ll discuss effective defenses against these threats, as well. We’ll wrap up with general tips and best practices for protecting your cloud.

Speakers

Gabe Schuyler – Channel Solutions Engineer @ Wiz

Gabe works as a Channel Solutions Engineer at Wiz, Inc., and hails from Austin, TX. He has decades of experience in the field of cybersecurity and is an enthusiastic proponent of DevSecOps. Prior to Wiz, he worked at Palo Alto Networks, PuppetLabs, and Sony Computer Entertainment. (He’s in the credits of over twenty video games!) Off the clock, he tinkers with wireless communications, picks locks (poorly), and advocates for the application of technology towards positive social change.

Identity Threat Detection and Response: Defending your Hybrid Identity Systems against Attacks

by

Time
Thursday, September 14, 2023
10:35am-11:15am in Harmony Room

Abstract
Identity is the new perimeter. Hybrid Identity Infrastructures (the most prevalent of which are AD and Azure AD/Entra ID) must be protected and defended with purpose-built solutions. Ensuring that you can defend the infrastructure as well as recover it quickly in the event it is rendered completely untrustworthy or unavailable should be core capabilities in your ITDR Toolkit. Learn how to protect your identity infrastructure before, during and after the attack.

Speakers

Steve Walker – Principal Partner Solutions Engineer @ Semperis

Steve Walker, Principal Partner Solutions Engineer at Semperis, has helped build global platforms for some of the world’s largest organizations. He was a member of Product Engineering at Microsoft, where he worked on perhaps the best-known software-as-a-service (SaaS) solution platform: Office365. Steve was also the primary technical resource behind Fortune #1’s move to the Microsoft cloud. Through this expertise, Steve formed a keen awareness of the systemic risks inherent in today’s hybrid identity environments. Organizations of all sizes depend on Microsoft Active Directory (AD), which underpins the vast majority of today’s technology stacks. In his role at Semperis, Steve now helps global organizations protect their AD environments from ransomware and other cyberattacks.

Terabytes from Tehran: The Opening Day that ALMOST didn’t happen

by

Time
Wednesday, September 13, 2023
2:35pm-3:15pm in Clarity Room

Abstract
Ransomware in my ballpark? It’s more likely than you’d think.

Opening Day 2019 was a win for both the Milwaukee Brewers and their security team who battled the St. Louis Cardinals AND an Iranian ransomware group. The security team will explain the timeline of what occurred and why third party vendors can be the biggest threat to your organization.

Speakers

Kaylee Burns – Solutions Engineer @ Recorded Future

Engineer with 5+ years experience in leading Incident Response and building an effective security program. She graduated from University of Arizona’s NSA designated Center of Academic Excellence in digital forensics and cyber defense.

Adam Bauer – Director of Information Security @ Milwaukee Brewers

Cybersecurity Director responsible for investigating and recovering from network intrusions, ransomware/data-breach incidents, insider threats, and other technology-based malicious activities. Setting policy, procedure and incident response for the organization.

Lodging

SynerComm has partnered with the Potawatomi Hotel, which is part of the same building as the event, itself. To book your room: