Agenda
Schedule may be subject to modifications
Monday, October 14, 2024 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
12:00 PM - 6:00 PM | 12:00 PM - 6:00 PM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
5:00 PM - 6:00 PM | 5:00 PM - 6:00 PM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Tuesday, October 15, 2024 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7:00 AM - 7:00 PM | 7:00 AM - 7:00 PM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7:30 AM - 8:15 AM | 7:30 AM - 8:15 AM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7:30 AM - 7:00 PM | 7:30 AM - 7:00 PM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
8:15 AM - 8:30 AM | 8:15 AM - 8:30 AM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
8:30 AM - 9:00 AM | 8:30 AM - 9:00 AM Patrick Beggs , CISO , ConnectWise Amanda Lee , Vice President Corporate Communications , ConnectWise For the first time, ConnectWise CISO Patrick Beggs will publicly share what went on inside ConnectWise this year as the company dealt with its own incident – an exploited vulnerability in an older version of its remote control software. Beggs will be joined by ConnectWise VP of Corporate Communications, Amanda Lee, and together they will tell the story of how they leveraged AI for incident response and communications both internally and externally.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:00 AM - 9:30 AM | 9:00 AM - 9:30 AM In an era where cyber threats evolve faster than traditional defenses, proactive identification and remediation of vulnerabilities is critical. Attack Surface Management (ASM) seeks to pinpoint and address exploitable weaknesses in customers’ security postures before adversaries strike. With the average time to develop a zero-day exploit standing at 22 days, the need for rapid and efficient patching is paramount. This presentation delves into the essential tools and processes MSPs and MSSPs must deploy—ranging from asset inventory to retesting—to effectively manage ASM. Moreover, leveraging Machine Learning within the Vulnerability AI layer of Cortex, Chris demonstrates how to streamline this process, enabling partners to stay ahead in the cybersecurity arms race. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:35 AM - 10:20 AM | 9:35 AM - 10:20 AM Media Landry , SVP of Sales , Foresite Cybersecurity Richard Moorman , Senior Cybersecurity Advisor , Foresite Cybersecurity Robert Hilson , VP of Marketing , Apptega Competition up. Margins down. Revenue sideways. If you’re running a managed IT business in 2024, this isn’t an unusual state: to quote an old guy – nasty, brutish and short. But for growth-minded service providers, security and compliance furnish both opportunities for rapid margin, revenue, and retention expansion, as well as essential safeguards against emerging risk. And the kicker: they can be added to your line card and delivered continuously essentially for free.
| 9:35 AM - 10:20 AM Effective incident response (IR) is critical for organizations to mitigate the impact of cyber incidents. Traditional tabletop exercises, while valuable, often lack the immersive and interactive elements necessary to fully engage participants and simulate real-world scenarios. This presentation will explore the innovative use of an online multiplayer IR game environment as a powerful tool for enhancing IR preparedness by fostering collaboration and introducing situations novel to these exercises.
| 9:35 AM - 10:20 AM Cyber criminals have embraced AI just as fast – if not faster – than those of us who use AI for defense or other legitimate purposes. In this presentation, you’ll get a primer on “what is AI” and how it impacts the CIA triad security model (confidentiality, integrity, and availability). This history lesson will include a discussion of problems involving AI policy and new shadow IT threat AI tools. Plus, you’ll learn how to “Think Evil” to improve your cybersecurity.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:20 AM - 10:45 AM | 10:20 AM - 10:45 AM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:45 AM - 11:30 AM | 10:45 AM - 11:30 AM As cybersecurity becomes integral to daily life, MSSPs face commoditization and profitability pressures. This presentation will explore how to differentiate from others by building an exciting, authentic, and successful MSSP business where people want to work for you and businesses want to buy from you. Discover strategies to build a value-driven culture, align services with client needs, and innovate to maintain a competitive edge.
| Evolve or Die: How to Navigate Customer Expectations, Technology and Pricing in a Changing Landscape 10:45 AM - 11:30 AM MSSPs have evolved from traditional firewall management to broader services due to demand. Originally for large enterprises, they now serve smaller businesses, impacting pricing and expectations. This presentation addresses how and why MSSPs can refine their go-to-market strategies.
| 10:45 AM - 11:30 AM MSSPs are experts at providing outsourced cybersecurity services to end customers. Yet many MSSPs miss the opportunity to fully leverage their incident response practices and operations maturity as a competitive sales advantage in the market. Join this presentation to discuss practical cases from the field on how to take advantage of industry standards to help your cybersecurity services business be more successful in sales, negotiations, service delivery and objections management. In this session you will:
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
11:35 AM - 12:20 PM | 11:35 AM - 12:20 PM Discover best practices in integrating TIPs into your SOC. See why TIPs are essential for maintaining a competitive edge, as we cover key adoption indicators and practical integration steps. Learn how to monetize TIPs through enhanced services and new revenue streams, with real-world case studies offering a clear path to success.
| 11:35 AM - 12:20 PM Are we losing our cybersecurity war? The answer is "Yes!" Every year the number of cybersecurity breaches continues to increase and the cost of those breaches grows exponentially. This is not a sign of a winning strategy.
| 11:35 AM - 12:20 PM Ransomware news has become like white noise to buyers. There’s so much of it now, your buyers may very well be numb and be tuning it out. But that doesn’t mean you can’t still use news reports about cybersecurity to your advantage. In this presentation you will learn how to take advantage of cyber news without becoming Chicken Little so that you can better protect customers, shorten sales cycles and prove InfoSec value.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
12:20 PM - 1:30 PM | 12:20 PM - 1:30 PM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1:30 PM - 2:15 PM | 1:30 PM - 2:15 PM Jeff Cratty , Sr. Director of Advanced Technologies , Blue Mantis Kristy Davis , Founder , The Clarity Company Timothy Guim , President & CEO , PCH Technologies Jessica C. Davis , Editorial Director, Channel Brands , CyberRisk Alliance Join this panel of pioneering MSPs who are blazing the trail to sell AI and related services into end-customer businesses.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2:20 PM - 3:05 PM | 2:20 PM - 3:05 PM On July 26, 2023, the SEC adopted rules requiring registrants to disclose their cybersecurity risk management strategy and governance, as well as the material impact of cybersecurity incidents. This reflects a larger trend globally of regulators requiring more accountability for incident readiness and response, IRR. As security leaders are increasingly under scrutiny, what proactive measures should they be considering for risk mitigation and incident preparedness? Moreover, how can MSSPs help enterprises to plan for incident response to ensure they are containing and eradicating the threat, recovering affected systems, and learning from the incident to improve future security posture? Join this session for new data from a survey of 500 security leaders that sheds light on what they are prioritizing for IRR today and how MSSPs can capitalize on this information. | 2:20 PM - 3:05 PM Helping customers make decisions on the right cybersecurity tools to deploy or the right projects to complete can be a challenging task. See what options are available to help customers make informed decisions by using compliance requirements and true risk quantification.
| 2:20 PM - 3:05 PM Don't miss this opportunity to delve into the critical challenge of fostering a cybersecurity culture beyond the IT department and the experts. Today's cybersecurity professionals need effective strategies to encourage everyone to recognize and embrace their own role in maintaining cyber safety. This session is more than just a discussion; it's a call to action for cybersecurity leaders to drive change and create a resilient, aware, and proactive digital environment for all.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3:05 PM - 3:30 PM | 3:05 PM - 3:30 PM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3:30 PM - 4:15 PM | 3:30 PM - 4:15 PM Mike Saylor , CEO , Blackswan Cybersecurity Dan Adams , CEO , Up-Skill, LLC Jessica C. Davis , Editorial Director, Channel Brands , CyberRisk Alliance Hiring and keeping top notch employees is key for service provider companies. Channel research firm Canalys poled MSPs about the biggest external challenges to their businesses, and talent acquisition and rose to the top of the list, above evolving cybersecurity threats.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
4:20 PM - 5:05 PM | 4:20 PM - 5:05 PM Don't miss this opportunity to review findings from a qualitative cybersecurity workforce study that shows U.S. organizations are at an increased risk of cybersecurity threat. This workforce deficit impacts regulatory compliance, insurance, and operations. However, thousands of experienced, capable, skilled, and available cybersecurity professionals are being filtered out of the hiring process.
| 4:20 PM - 5:05 PM Customers are increasingly asking MSSPs for visibility into the dark web - the area of the internet where cybercriminal gangs plan their attacks, purchase malware and exploits, and leak their victims data. In this session, dark web intelligence expert Andy Scutt will explain how monitoring this hidden part of the internet can help MSSPs to identify security threats earlier in the cyber kill chain, enhance their existing services, and ultimately protect their customers from emerging threats. You will review scenarios showing how MSSP’s SOC, incident response, and threat-hunting teams can use dark web monitoring to support their services. | 4:20 PM - 5:05 PM Fred Langston , Chief Product Officer , Critical Insight Trevor Smith , Executive Vice President , Brite Jeff Hill , Sr. Director, MSSP Americas , Stellar Cyber, Inc. Andrew Shaughnessy , Director of Cyber Risk Solutions , Converge This panel, led by Jeff Hill, will interview three MSSP thought leaders and drive an engaging conversations on the future of AI and Automation.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
5:05 PM - 7:00 PM | 5:05 PM - 7:00 PM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7:00 PM - 9:00 PM | 7:00 PM - 9:00 PM Join us for an exclusive celebration of the Top 250 MSSPs in the world for 2024. We are revealing the 2024 list for the first time during our annual event MSSP Alert Live. This special evening party brings together our honorees for drinks, conversation and networking. Special thanks to Stellar Cyber for their sponsorship and support. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Wednesday, October 16, 2024 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7:00 AM - 4:00 PM | 7:00 AM - 4:00 PM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7:30 AM - 8:30 AM | 7:30 AM - 8:30 AM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
7:30 AM - 1:30 PM | 7:30 AM - 1:30 PM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
8:30 AM - 9:00 AM | 8:30 AM - 9:00 AM Timothy Guim , President & CEO , PCH Technologies John Roberts , General Manager of Security , Coalition Dustin Bolander , CEO/Founder , Beltex Insurance Jessica C. Davis , Editorial Director, Channel Brands , CyberRisk Alliance Are your customers happy with their cybersecurity insurance rates? Does it make sense for them to go with a cyber warranty instead or in addition to their cybersecurity insurance?
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:00 AM - 9:30 AM | 9:00 AM - 9:30 AM The three scariest words an MSSP can hear from a customer are “we’ve been hacked.” Is the MSSP liable? If so, what might it cost? Does insurance cover it? We all know that it’s not “if” but “when,” so how can we protect ourselves when it happens? The answer is that we must start the process at the inception of the customer relationship.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
9:35 AM - 10:20 AM | 9:35 AM - 10:20 AM The SIEM market is facing unprecedented change, creating both challenges and opportunities for MSSPs. Mergers, acquisitions, increasing data volumes, and a complex tool landscape complicate security operations. Coupled with an ongoing skills shortage, it's no surprise that many MSSPs struggle to deliver optimal SOC performance for their customers. In this evolving landscape, MSSPs need a clear, data-driven approach to selecting and managing the right SIEM solutions for their diverse clientele. This session provides a strategic framework to help MSSPs navigate these changes and optimize their operations. | 9:35 AM - 10:20 AM The landscape of Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) has been undergoing rapid consolidation through mergers and acquisitions (M&A) for well over a decade, significantly reshaping the players in the channel and in the TSP industry. In this session we’ll explore various actual concepts that buyers use to determine what price to pay, how deals are structured and why, and what you can do now to become an excellent candidate (while also learning how to be an appealing buyer too). Based on our 14+ years focusing exclusively on IT M&A, we’ll share behind-the-scenes experience from both the buyer and seller perspectives.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:20 AM - 10:45 AM | 10:20 AM - 10:45 AM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
10:45 AM - 11:30 AM | 10:45 AM - 11:30 AM Hear insurance myth busting from someone who went from MSP to owning their own policy. Don't miss this opportunity to explore why carriers act the way they do, who the real customers of carriers are (insurance agents!), and what underwriting controls actually matter.
| 10:45 AM - 11:30 AM Details coming soon! | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
11:35 AM - 12:20 PM | 11:35 AM - 12:20 PM In the world of small service businesses, every team member's decisions and actions directly affect your company's performance. However, most employees do not fully grasp the weight of their impact. Join us to explore key strategies that will show how fostering a culture of accountability can transform not just team performance but also your bottom line.
| 11:35 AM - 12:20 PM Details coming soon! | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
12:20 PM - 1:30 PM | 12:20 PM - 1:30 PM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1:30 PM - 2:15 PM | 1:30 PM - 2:15 PM In an era where cyber threats are increasingly sophisticated and pervasive, establishing a world-class Managed Detection and Response (MDR) service is crucial for service providers. This presentation will delve into the core components necessary to build an exceptional MDR service, focusing on advanced technologies, response strategies, and operational excellence. By the end of the session, you will be equipped with actionable knowledge to enhance your own MDR capabilities and achieve superior security outcomes.
| 1:30 PM - 2:15 PM Details coming soon! | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2:20 PM - 3:05 PM | 2:20 PM - 3:05 PM The final CMMC rule is slated to go into effect the first quarter of 2025. Is the work to gain CMMC certification worth the squeeze for your MSSP business? Over 75,000 government contractors need a CMMC certification and approximately 85% of these firms rely heavily on MSSPs. This session will give you the facts you need to decide how you'll approach CMMC.
| 2:20 PM - 3:05 PM MSPs, once IT's savior, was invented over twenty years ago. In computer years, it’s an antique. Cybersecurity has emerged, exposing flaws and decimating the model. But the problem isn't technology, it's your business model. Time to adapt or become obsolete.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3:10 PM - 3:55 PM | 3:10 PM - 3:55 PM Join industry veteran CISO/vCISO Jesse Miller as he shows you how to enhance client engagement and maximize the value of your services in the client's vision. Jesse will unveil the four vCISO report sections that will equip you to deliver more impactful reports, build stronger client relationships, and ultimately, sell more services.
| 3:10 PM - 3:55 PM This session offers a unique perspective on the FedRAMP authorization process, tailored specifically for Managed Security Service Providers (MSSPs) and Managed Detection and Response (MDR) providers. Attendees will gain valuable insights into the steps and strategies that differentiate successful providers in the federal, SLED (State, Local, and Education), and Defense Industrial Base (DIB) sectors. The discussion will cover the critical role of Third-Party Assessment Organizations (3PAOs) in the FedRAMP process and explore how these processes impact Cybersecurity Maturity Model Certification (CMMC) compliance. Additionally, the session will highlight the strategic importance of FedRAMP authorization for Quzara’s MDR service, Cybertorch, and its role in securing government and defense contracts.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
4:00 PM | 4:00 PM |
Join our mailing list below to receive the latest event news.