Agenda
The Agenda is currently being developed, check back for updates.
Monday, October 9, 2023 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
3:30 PM - 3:50 PM | 3:30 PM - 3:50 PM ![]() ![]() What is the state of the MSSP and security MSP market? What are the key services and offerings that managed security service providers offer to their clients? How many tools are technologies are in the average MSP/MSSP stack? How often do MSPs/MSSPs interact with their clients? How often are MSPs/MSSPs seeing certain types of attacks at their client sites? MSSP Alert conducted research in June and July of 2023 together with Arctic Wolf. Join us for this fireside chat to kick off the conference to share these research findings and find out how your business aligns with these benchmarks. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3:50 PM - 4:15 PM | 3:50 PM - 4:15 PM ![]() Cyberattacks happen every day, and MSP's and MSSP's are positioned to be the defenders for end user organizations and also for individuals. Service providers can be the heroes here, by understanding how the dark side works and being the "Jedis" in the war against cybercrime. In this session you'll be guided by just such a Jedi in the war against cybercrime as he takes you on a tour of the Dark Web. You'll get a view of in-process ransomware attacks, learn how to proceed in an active cybercrime to secure the people and the business, and get important best practices for dealing with an active incident. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
4:15 PM - 5:00 PM | 4:15 PM - 5:00 PM ![]() Imagine hackers using your RMM to install Ransomware on all your clients simultaneously? It’s the ultimate nightmare scenario every MSP fears the most. Progressive Computing was one such victim of the Kaseya VSA attack in 2021 and victoriously battled to win back their business after ransomware was installed across their entire client base. This is a personal story. A human story. An emotional story. Prepared to be frightened and inspired. Key Learning Objectives:
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
5:00 PM - 7:00 PM | 5:00 PM - 7:00 PM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Tuesday, October 10, 2023 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7:15 AM - 8:00 AM | 7:15 AM - 8:00 AM More Managed Service Providers (MSPs) are delivering security services outside of traditional MDR services. But standing up a SOC is capital intensive and challenging with the talent shortage and thousands of point solutions. How do you find the right master MSSP partner to deliver advanced security for your clients? Join Overwatch by High Wire Networks over breakfast to explore what aspects to outsource, how to find the right MSSP partner, and how to maintain value delivery to your customers through a partnership. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7:30 AM - 8:30 AM | 7:30 AM - 8:30 AM
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
8:30 AM - 9:00 AM | 8:30 AM - 9:00 AM ![]() Preparing a disaster response plan is one thing. But have you practiced the plan itself in a simulation? Learn why this step, often skipped, is so important, and some best practices for creating and practicing your plan. Be ready when an incident occurs. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:00 AM - 9:30 AM | 9:00 AM - 9:30 AM ![]() ![]() An official from CISA's JCDC talks about the agency's cyberdefense plan for MSPs, how the agency works with the managed services market, and what's to come in the months ahead. Key Learning Objectives:
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:35 AM - 10:20 AM | 9:35 AM - 10:20 AM If there’s one thing, we’re certain of its cybersecurity requires great team collaboration and cooperation. But with dozens of cyber tech vendors, stretched MSPs, and limited end-user IT resources, how do you manage an effective security operations (SecOps) program? Our panel includes an MDR provider, an MSP, and an IT department manager to share their views on how to strike the right balance in a Shared Responsibility Model to achieve powerful yet practical SecOps. | 9:35 AM - 10:20 AM ![]() ![]() ![]() This panel will examine the importance of community in surviving cybersecurity incidents and delve into the origin story of a new offering from CompTIA, the Emergency Response Team. Learn what this team can do to help your organization if you experience an incident. Find out how you, too, can help in providing the community that is needed by other MSPs that may experience an incident. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:20 AM - 10:45 AM | 10:20 AM - 10:45 AM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:45 AM - 11:30 AM | 10:45 AM - 11:30 AM ![]() ![]() Find your sweet spot, drive new revenue streams and deliver enhanced solutions to clients. This panel discussion will examine how MSSPs and MSPs can leverage a client’s existing infrastructure through the use of an Open XDR approach. Key Learning Objectives:
| 10:45 AM - 11:30 AM ![]() An official from CISA's JCDC talks about the agency's RMM and best practices for MSPs. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
11:35 AM - 12:20 PM | 11:35 AM - 12:20 PM ![]() Ransomware turned 10. There was a 55.5% increase in HTTPS vs HTTP phishing attacks. The last year has been one for the record books in numerous ways and the realm of cyber threats was no exception. As traditionally active threat categories, such as malware, trended downward, others spiked unexpectedly. Analysts, researchers and security companies have been working quickly and constantly to identify and block emerging threats, but attackers have been just as quick in devising new tricks and tactics. Key Learning Objectives:
| 11:35 AM - 12:20 PM ![]() Virtual CISO services can enhance your managed security service business, but there are a number of factors to consider when looking to provide this as part of your portfolio. In this session/panel, we’ll dive into what you need to know to create, package, price, and sell vCISO services, whether you are new to offering these services or are looking to refine your offering for better service, efficiency, and profitability. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
12:20 PM - 1:30 PM | 12:20 PM - 1:30 PM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1:30 PM - 2:15 PM | 1:30 PM - 2:15 PM ![]() Snapshot-in-time penetration tests are limited in scope, limited by human testers, limited by time, and limited by findings based on what the testers are presented with during the testing period. The results have a very short shelf life with little insight into how to properly prioritize and correct the findings. Continuous Security Testing allows an organization to understand their security posture every day, discover new issues immediately, and prioritize findings based on the business's needs. Finally, Continuous Security Testing allows an organization to immediately validate remediation. Key learning objectives:
| 1:30 PM - 2:15 PM In an era where cloud technology has revolutionized the way organizations operate, ensuring robust cloud security is paramount. But not just for the security of your cloud assets. With attackers increasingly traversing back and forth between on-premises and cloud environments, ignoring the link between the two could mean allowing threats to spread. And while you've heard about attackers exploiting on-prem devices to get to cloud, we're increasingly seeing the opposite as well. Join as we look at the state of the market in cloud security, and as we explore a recent attack that exploited cloud infrastructure to pivot to the on-premises environment. Learn what this real-world incident means for you and gain insights for safeguarding your organization against cloud-based threats.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2:20 PM - 3:05 PM | 2:20 PM - 3:05 PM ![]() ![]() ![]() Learn how AI and ML are affecting cybersecurity in both positive and negative ways and how AI based solutions can help you and your clients combat the threats posed by generative AI. Key Learning Objectives:
| 2:20 PM - 3:05 PM ![]() In this session, Sunny Kaila, CEO of IT By Design, a global talent authority with over 600 team members, will discuss how a focus on talent development and growth can help SMBs grow their businesses 10x. In this session, Sunny will discuss different talent strategies that Leaders can use to help create self-transforming teams that lead and hold each other accountable. Creating organizations where your teams lead and drive accountability themselves, allowing owners to have a balanced and fulfilling life, while also supporting the growth of their team and leaders. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3:05 PM - 3:30 PM | 3:05 PM - 3:30 PM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3:30 PM - 4:15 PM | 3:30 PM - 4:15 PM ![]() ![]() In an ever-evolving cyber threat landscape, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) play a critical role in safeguarding businesses from sophisticated attacks. This presentation abstract provides a glimpse into our upcoming session, where we will explore the realm of cutting-edge cyber threats and unveil an exclusive partnership opportunity with Perception Point.
| 3:30 PM - 4:15 PM ![]() Specializing in vertical markets offers a number of business benefits to MSSPs. In this session, you’ll hear from BlackSwan Cybersecurity which has created three specialties – education, healthcare, and auto dealerships. You’ll learn how the company broke into these markets; how the specialization has helped in operations, sales, technology, and other functions; and what you can do to prepare for specializing in a vertical market yourself. Key Learning Objectives:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
4:20 PM - 5:05 PM | 4:20 PM - 5:05 PM Join our expert panel to learn how MSPs can strengthen cyber resilience. Discover alarming stats about cyber threats and the lack of incident response plans. Explore the importance of cybersecurity frameworks in preventing and responding to attacks. Get practical tips for crafting an effective incident response plan from an MSP perspective. Equip your business to thrive in the digital age. Key Learning Objectives:
| 4:20 PM - 5:05 PM ![]() This discussion centers around establishing an organization's security maturity level (SML) and taking that knowledge and crafting a real security strategy that improves the enterprise security practice. The talk centers around the breakdown of needs into measurable efforts that when completed raise the SML of the enterprise. The SML allows a company to create a meaningful roadmap to achieve their security strategy. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
5:05 PM - 7:00 PM | 5:05 PM - 7:00 PM
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Wednesday, October 11, 2023 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7:15 AM - 8:00 AM | 7:15 AM - 8:00 AM ![]() The cybersecurity industry is full of acronyms, and “XDR” is one that is not universally well understood. This acronym was introduced by Gartner in 2018. Flash forward to 2023, and many vendors claim they are offering ‘XDR’ in some form. But what does it actually mean? What can, and should, XDR do for an MSP and MSSP, and why is it such an important consideration? Key Learning Objectives:
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7:30 AM - 8:30 AM | 7:30 AM - 8:30 AM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
8:30 AM - 9:15 AM | 8:30 AM - 9:15 AM ![]() The key to selling your company is knowing what drives valuation and what specific buyers (Strategics and Private Equity) look for in assessing a technology service provider. In this session, Linda will share the 8 key variable buyers look for when valuing a company, and "best in class" KPIs to strive for when preparing for a sale. Whether you are contemplating a sale in 12 months or 60 months, this is a session you won't want to miss. Key Learning Objectives:
| 8:30 AM - 9:15 AM ![]() We get it. Battling cybercrime is tough, especially for those running small businesses. MSPs often have limited budget, staff, and time, making investment in strong cybersecurity difficult. As a result, SMBs have become an excellent target for cybercriminals. Threat actors prey on finding vulnerabilities you’ve yet to lock down. With threats constantly evolving and becoming more sophisticated, it's challenging for small businesses to keep up with the latest preventive measures. Technology alone cannot prevent every attack and unfortunately, SMBs are bearing the brunt of this reality. However, the good news is that as technology evolves, so does the support system for SMBs. Key Learning Objectives:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:20 AM - 10:05 AM | 9:20 AM - 10:05 AM ![]() Is your managed service business stuck at its current annual recurring revenue level? Are you struggling to double the size of your business? This is the session for you. Learn the steps you need to take to take the business to the next level. | 9:20 AM - 10:05 AM ![]() Advanced malware, phishing threats, as well as EDR and XDR false positives are a vast drain on time, money, and skilled MDR SOC resources. Today, a sandbox detonation environment is the last line of defense for identifying malicious threats that bypass existing security controls. But not all sandbox technology is created equal. Sandbox technology has evolved beyond single file submissions to a fully automated solution with integrations into industry-leading EDR, XDR, SIEM, and SOAR platforms, such as CrowdStrike and SentinelOne. Join this session to get up to date on sandboxing and how critical it is to the success or failure of the SOC. Key Learning Objectives:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:05 AM - 10:30 AM | 10:05 AM - 10:30 AM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:30 AM - 11:15 AM | 10:30 AM - 11:15 AM ![]() ![]() Everybody has been experimenting with tools like ChatGPT, but it is there really an opportunity for MSP's when it comes to advanced technologies such as artificial intelligence and machine learning? We'll take a look at how MSP's can use these technologies today, what managed services end user customers are expecting from them, and how you can get ready for the next opportunities around data, analytics, machine learning and AI. | 10:30 AM - 11:15 AM Msps and MSSPs have adopted one of the most difficult roles in the Defense ecosystem. These service providers perform control capabilities on behalf of their clients in the Defense Industrial Base and as such, bear the burden of validating implementation on their client's behalf. MSPs and MSSPs will need a CMMC L2 certification or as validated by a 3rd party; required to implement all 110 controls. As such, they will need a System Security Plan along with a Shared Responsibility Matrix and be fully prepared for assessment. How would you prepare and what is meaningful to an assessor? Key Learning Objectives:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
11:20 AM - 12:00 PM | 11:20 AM - 12:00 PM ![]() The MSP M&A market, including PE investments, has been super hot over the past few years. In this session we'll examine the trends and the impact interest rates have had on M&As this year. You will hear about MSP valuations in 2023 and what PE firms are looking for when it comes to investing in managed service providers. Plus, we'll offer key tips on how to increase your valuation before you put your business on the market. Whether you are ready to sell today or you want to get ready in the next 5 years, this is the session you won't want to miss. |