View, browse and sort the ever-growing list of sessions by pass type, track, and format. With this Session Scheduler, you can build your schedule in advance and access it during the show via export or with the Mobile App, once live.
Sessions do fill up and seating is first come, first serve, so arrive early to sessions that you would like to attend. Please note that adding a session into your agenda does NOT guarantee you a seat to the session.
Date: Thursday, May 23
Time: 9:00am - 9:45am
Pass type: All Access, Conference - Get your pass now!
Track/Topic: Security, IT Strategy
Format: Conference Session
Vault Recording: TBD
Audience Level: Intermediate
CASE STUDY: In this presentation, two 20-year security veterans share successful real-world strategies implemented by one of the nation’s largest law firms to achieve ransomware and zero-day attack readiness.
Within weeks of implementing their new strategies and endpoint defenses, the team at Cole, Scott & Kissane blocked the costly, destructive Emotet malware. They stopped Emotet before it could execute ransomware or damage data and systems, saving their organization money and reputation costs.
In this session, learn the strategies that worked: how the CSK team evaluated threats; strengthened endpoint defense while minimizing the security team’s workload; integrated other IT resources into the security effort; and struck the right balance of protection, detection, and response.
The presentation will conclude with six proven steps that catalyze management to invest in cybersecurity. Attendees will be presented with concrete examples and a template for creating their own compelling case.