September 14, 2022 » 9:00 am - 10:00 am
Closed - Please attend the Keynote Session in Tech Theater I
September 14, 2022 » 11:00 am - 12:00 pm
Wiz - CNAPP – Finding the Worst Security Risks
Enterprise Solutions Engineer
Are you familiar with the new category of ‘CNAPP’? Security challenges in the cloud are different than those that exist on-prem, but the overall processes to build and maintain a secure environment are the same. A cloud-native application protection platform is a simplified security architecture that enables enterprises to holistically benefit from the cloud-native ecosystem. It allows them to leapfrog the cost and complexity of siloed security products to a continuous security fabric, without major investments in tools or developer talent. Learn first-hand from the experts on the ROI/benefits of CNAPP and real-world approaches to deploying in your existing environment.
September 14, 2022 » 12:00 pm - 1:00 pm
Orca Security - Cloud Security: Why Context Matters
Sr. Field Engineer
In 2021 alone, there were dozens of publicly disclosed data breaches involving misconfigured storage buckets, compromised credentials and ransomware. In 2022 and beyond, this is expected to climb as companies continue modernizing their applications and infrastructure in the cloud. Unfortunately, such modernization introduces a number of new challenges related to emerging concepts, technologies and complexities that can leave organizations vulnerable and exposed. During this talk, Zac Wilson from Orca Security will be discussing current and emerging cloud security threats, reasons why cloud security is so challenging, best practices, lessons learned and why context is a key ingredient for delivering effective cloud security.
September 14, 2022 » 1:00 pm - 2:00 pm
Arcserve - Immutable Storage: Level-Up Your Ransomware Readiness
Data is expected to grow to 200 ZB by the end of 2025. That means more data to manage, more data to protect. IDC now recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new "1" is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies allows for a resilient recovery plan – and it’s critical that your cyber security plan includes a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us for this do-not-miss discussion as we share best practices to help keep your data protected and secure via multiple layers of defense.
Presenter, Martin Merrill, Principal Consultant Arcserve
September 14, 2022 » 2:00 pm - 3:00 pm
HouSecCon - Building Cooperation and Understanding Between Security and IT
Dr. Gerald Auger, Phd
Founder, Simply Cyber & CISO
CTO, Set Solutions & Founder
Because many “older” information security/cybersecurity professionals started in an information technology (IT) role first, they understand IT and the role it plays in their organization. Today, it is common to go straight into the security field without working in IT first, but it is still important for the modern security professional and the modern IT professional to have a good understanding of each other’s mindsets and priorities. Join Dr. Gerald Auger and Michael Farnum as they talk about the differences and parallels between IT and info/cyber security. There will also be some bonus discussion for those who are interested in moving from IT to cyber and what that looks like in today’s world.
September 14, 2022 » 4:00 pm - 5:00 pm
Web3 Texas - Digital Wallets and Security
Do you know what a digital (crypto) wallet is?
Maybe you purchased some crypto or bought an NFT, on the whim of a YouTube or TikTok video or maybe a family member or friend showed you how.
In order to have purchased that crypto or NFT, let’s call them “digital assets”, it very likely that you created what’s called a digital wallet, or more commonly referred to as a crypto wallet.
The reality of the future is that in order to participate in the next version of the Web, aka Web3, you WILL need a digital wallet, just as you need a browser or app to access the internet today.
Little do many know, self-custody of these digital assets in one’s digital wallet poses a significant risk, if one does not know how to manage and secure the digital wallet.
In keeping with our mission, Web3 Texas will be presenting on this very topic at a very foundational level.
During this session, you can expect to learn at least, if not more, of the follow basics on digital wallets:
1. What is Web3
2. Why Bitcoin?
3. Major Industries in Web3
4. Pre-reqs to Accessing the Web3
5. Using Digital Wallets
6. How Wallets Work
7. Wallet Map
8. Protecting Wallet Credentials
9. Multi-Wallet & Wallet Twin
10. Wallet Permissions and Sessions
11. Avoiding Scams and Theft
12. Not Your Keys, Not Your Coins
13. Wallet Recovery
We believe that such foundational learning is crucial in everyone’s entrance and participation in Web3.
So please join us, in-person, as we explore Digital Wallets.
September 14, 2022 » 5:00 pm - 5:15 pm
Prize Announcements and Giveaways in Tech Theater I