Watch Trust 2021 Sessions On-Demand

Founder and CEO,
Agari

The Network Effect In Action

Phishing, BEC, and other advanced email threats continue to be one of the most effective attack vectors into organizations. Email-based attacks are growing in complexity, as organized crime rings benefit from a vast array of actors, methods, and tools... Read More
Phishing, BEC, and other advanced email threats continue to be one of the most effective attack vectors into organizations. Email-based attacks are growing in complexity, as organized crime rings benefit from a vast array of actors, methods, and tools—all working in concert to support one cause. We must do the same. Learn how and why the cybersecurity industry, law enforcement, threat researchers and customers must come together to create a virtual organization that can stop these attacks and raise the cost to the attackers. It takes a network to fight a network! Collapse Text
President and CEO,
Global Cyber Alliance

The State of Email Authentication and DMARC

With phishing and email scams on the rise, it's time to take action and join the millions of domains that have benefited from the power of DMARC. In this session, Global Cyber Alliance President & CEO Philip Reitinger takes a deep dive into why DMARC is... Read More
With phishing and email scams on the rise, it's time to take action and join the millions of domains that have benefited from the power of DMARC. In this session, Global Cyber Alliance President & CEO Philip Reitinger takes a deep dive into why DMARC is table stakes for email security. DMARC is a proven, effective solution to help combat domain spoofing and thwarting email compromise… Learn which resources can help you on your DMARC implementation journey. Collapse Text
Panel
Chris Sestito, Mick Baccio, Dennis Leber, Jim Routh, Munawar Hossain

It's the (Decision) Economy, Stupid: Big Data Science and Security

Criminals try to break into systems. Cybersecurity professionals strike back with more people, new techniques, and added technologies to improve defenses. Criminals try to break in again, and the cycle continues. As we innovate, we make it harder for them Read More
Criminals try to break into systems. Cybersecurity professionals strike back with more people, new techniques, and added technologies to improve defenses. Criminals try to break in again, and the cycle continues. As we innovate, we make it harder for them... and then they innovate and make it harder for us. Listen to this session to hear panel participants discuss how leading organizations are using data science to stay one step ahead of the bad guys.
Featuring:
Chris Sestito Sr. Director of Data Science, Agari, Mick Baccio Global Security Advisor, Splunk, Dennis Leber CISO & CTO, University of TN Health & Science Center, Jim Routh Board Member, Advisor & Investor, Munawar Hossain Director of Product Management, Security Business Group, Cisco Collapse Text
CEO & Founder,
TAG Cyber

The Gathering Storm: Futuristic Look at Threats to the Cybersecurity Network

Very few people in 2011 could’ve predicted how 2021 would look for the world, as COVID-19 impacted people all over the globe. But when we look at the world of cybersecurity, we have a few guesses on how the industry may look in 2031. Watch this session... Read More
Very few people in 2011 could’ve predicted how 2021 would look for the world, as COVID-19 impacted people all over the globe. But when we look at the world of cybersecurity, we have a few guesses on how the industry may look in 2031. Watch this session to learn what Ed Amoroso and TAG Cyber believe will be the next wave of threat actor concern, including why vehicles will be the next massive security category, and how hackers may interfere with our augmented life.Collapse Text
President,
LaSalle Solutions

Speaking From Boardroom Experience: Customer, Partner, Security Advisor

LaSalle Solutions partners with Agari to protect our customers and our own organization. Steven Robb, President at LaSalle Solutions will share the story of implementing Agari protection for LaSalle, how and why email security is critically important for... Read More
LaSalle Solutions partners with Agari to protect our customers and our own organization. Steven Robb, President at LaSalle Solutions will share the story of implementing Agari protection for LaSalle, how and why email security is critically important for the C-Suite to keep top of mind, and how you can bring this discussion into the boardroom with your C-Suite to prioritize security and safeguard your organization. Collapse Text
Director of Product Management, Security Business Group, Cisco

How Data Science is Driving the Evolution of Email Security

The increasingly sophisticated threat landscape, combined with a significant lack of human capital, have mandated the use of data science to secure email. This session explores the many types of data science practices that are driving the evolution of... Read More
The increasingly sophisticated threat landscape, combined with a significant lack of human capital, have mandated the use of data science to secure email. This session explores the many types of data science practices that are driving the evolution of email security, with a look at what works now and what the future of protection will need to look like. During this session, you will discover the ways data science is evolving the level of protection your email security platform provides. Collapse Text
Panel
Kevin DeLange, Mitchell Parker, Joe Uchill

The CISO Workplace in 2025—Exploring the Role Automation Plays and How to Prepare Now

2020 was an interesting year as COVID-19 forced companies into a digital transformation. In this session, our panelists will discuss the impact that the pandemic had on their cybersecurity... Read More
2020 was an interesting year as COVID-19 forced companies into a digital transformation. In this session, our panelists will discuss the impact that the pandemic had on their cybersecurity infrastructure, how automation is solving key challenges as cybercriminals continue to innovate, and the impact of this automation on their teams.
Featuring:
Kevin DeLange VP & CISO, IGT, Mitchell Parker CISO, Indiana University Health, Joe Uchill Sr. Reporter, SC MagazineCollapse Text
VP & Sr. Manager of Information Security, TD Bank Group

A Shot in the Arm: Infusing Email Threat Intelligence Data into Risk Decisioning

With Crane Hassold Sr. Director Threat Research, Agari
Having a complete understanding of cyber threats is integral to being able to defend against them. For identity deception attacks... Read More
With Crane Hassold Sr. Director Threat Research, Agari
Having a complete understanding of cyber threats is integral to being able to defend against them. For identity deception attacks like BEC and credential phishing, we can use innovative active defense tactics to collect in-depth intelligence about how these attacks work. In this presentation, Crane Hassold, Sr. Director of Threat Research at Agari, covers the importance of threat intelligence in defending against email-based threats, discusses the application of active defense tactics, and speaks with TD Bank to detail how they use threat intelligence to protect their employees and customers. Collapse Text
Postmaster at LinkedIn & Email Thought Leader

Beyond Email Authentication: Protecting your Brand by Displaying your Logo on Every Email

With Chris Bailey VP of Strategy and Business Development, Entrust
Join BIMI experts Udeme Ukutt from LinkedIN and Chris Bailey from Entrust... Read More
With Chris Bailey VP of Strategy and Business Development, Entrust
Join BIMI experts Udeme Ukutt from LinkedIN and Chris Bailey from Entrust as they explain what businesses need to know to become BIMI ready. Yes, we said BIMI. It’s the new standard created just to get your trademarked logo displayed on emails. You’ll hear why BIMI is important to every organization that uses email and how to create your own BIMI record.Collapse Text
Principal Program Manager,
Microsoft

It Takes an Ecosystem to Keep Cyber Attackers Out

Email phishing is the initial spear for most cyber attacks these days and recent high profile events have reinforced the need to equip yourself with the ability to quickly pinpoint attacker targets and infrastructure. It takes a network to protect from... Read More
Email phishing is the initial spear for most cyber attacks these days and recent high profile events have reinforced the need to equip yourself with the ability to quickly pinpoint attacker targets and infrastructure. It takes a network to protect from highly motivated attackers—learn how Microsoft and Agari have partnered to allow you to bring all your insights from Agari to Azure Sentinel, where you can leverage those insights to discover attacker activities otherwise undetected. Collapse Text
Staff Security Specialist, Splunk

Layered Email Defenses

Email security is a multi-layered problem that requires multi-layered defenses. Too often, organizations buy one commercial solution and think that they're done—not realizing that they could bring to bear multiple layers of defense that includes process... Read More
Email security is a multi-layered problem that requires multi-layered defenses. Too often, organizations buy one commercial solution and think that they're done—not realizing that they could bring to bear multiple layers of defense that includes process improvements, free and open source tools, and ways to tie them all together. This presentation reviews the often overlooked aspects of email security that every organization can leverage to mount a resilient defense. Collapse Text
Criminal Intelligence Officer, Interpol

How the Email Threat Landscape is Evolving in 2021

With Crane Hassold Sr. Director Threat Research, Agari
Heading into 2021, business email compromise (BEC) remains the primary threat impacting businesses all over the world. In this session, experts from Agair and Interpol discuss how the BEC threat... Read More
With Crane Hassold Sr. Director Threat Research, Agari
Heading into 2021, business email compromise (BEC) remains the primary threat impacting businesses all over the world. In this session, experts from Agair and Interpol discuss how the BEC threat landscape changed in 2020 and look at how the BEC ecosystem will continue to evolve in 2021.Collapse Text
Network & Email Security Architect, Fresenius Medical Care

Top 5 Threats Lurking in your Supply Chain: Tips and Techniques for Getting Them Out and Ensuring they can't Get Back In

With John Wilson Field CTO, Agari
Quick… what’s the number one threat lurking in your supply chain? What about the top five? Your vendor supply chain is one of the most prominent ways your employees’ accounts can become... Read More
With John Wilson Field CTO, Agari
Quick… what’s the number one threat lurking in your supply chain? What about the top five? Your vendor supply chain is one of the most prominent ways your employees’ accounts can become compromised, and one of the key areas to protect in your email ecosystem. Join this session as Marc Luescher, Network and Email Security Architect at Fresenius Medical Care, talks about his experience combating fraudulent PPE providers during the COVID-19 pandemic, as well as other lessons learned throughout his career.Collapse Text
Security Awareness Advocate, KnowBe4

Building an Effective Security Awareness Program

Cybercriminals are successfully gaining access to organization's systems, data, and infrastructure in various industries worldwide. They are doing it the most common way, tricking the humans into clicking on a link and effectively bypassing the firewalls... Read More
Cybercriminals are successfully gaining access to organization's systems, data, and infrastructure in various industries worldwide. They are doing it the most common way, tricking the humans into clicking on a link and effectively bypassing the firewalls and opening the organization's proverbial front door. It is quickly becoming known that Security Awareness Training programs are crucial to reducing the organization's risk of an attack. However, what does it take to operate and maintain these programs successfully? Join this session to find out. Collapse Text
Founder & CEO,
CultureAI

Case Study: How One Organization Got Its Entire Workforce Making Great Security Decisions, with Less Awareness Training

A step-by-step, technology-agnostic case study of how one organization successfully went from focusing on awareness training to achieving a security culture where every member of the workforce makes great security decisions. We’ll examine... Read More
A step-by-step, technology-agnostic case study of how one organization successfully went from focusing on awareness training to achieving a security culture where every member of the workforce makes great security decisions. We’ll examine the approach they took, the things that worked, the lessons learnt and the concepts any organization can take away and apply themselves. The session is delivered by an ex-penetration tester and designed for CISOs, CIOs, Heads of security and anyone involved in managing human risk or security awareness. Collapse Text
Regional VP,
Attivo Networks

Securing Active Directory to Defeat Attacker Lateral Movement

Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. A common tactic among most of these ransomware and advanced threat actors today involves leveraging Active... Read More
Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. A common tactic among most of these ransomware and advanced threat actors today involves leveraging Active Directory, which contains all of the information that an attacker needs to successfully move laterally and accomplish their mission. In this session, Tom Atkins will explore a new method for securing Active Directory that can (for the first time) actually prevent an attacker from progressing laterally through your enterprise network. Collapse Text
VP of Product,
Menlo Security

Trust in the Time of COVID-19

Lovesickness is an illness, both physical and emotional. Or at least that is what literature such as Love In The Time of Cholera tells us. The same can also be said of operating a business in a perpetual environment of low trust. COVID-19 continues to... Read More
Lovesickness is an illness, both physical and emotional. Or at least that is what literature such as Love In The Time of Cholera tells us. The same can also be said of operating a business in a perpetual environment of low trust. COVID-19 continues to extract a toll on both a personal and professional level, with trust being a top casualty. Remote work, coupled with an even greater proliferation of unmanaged devices, compounded by ruthless pandemic based phishing attacks and ransomware have made an already challenging state of affairs in cybersecurity, worse. Tune in to this session to learn how some organizations are rethinking their approach to making the internet safe for work in a post-pandemic world. Collapse Text
Panel
Anne Coulombe, Robert Wood, Don Cardinal, Seth Knox, Chris Bailey

Is Data Privacy in the Way of Data Protection?

Anne Coulombe Head of Data Protection, MassMutual, Robert Wood CISO, Centers for Medicare & Medicaid Services, Don Cardinal Managing Director, Financial Data Exchange, Seth Knox Chief Marketing Officer, Agari, Chris Bailey VP of Strategy and Business... Read More
In the era of cloud computing and remote work, there is a need for data privacy and data protection. These concepts are often used interchangeably; however, in cybersecurity, data privacy can come into conflict with data protection. This panel discussion will provide insight into how leading organizations are satisfying data privacy requirements while enabling data protection.
Featuring:
Anne Coulombe Head of Data Protection, MassMutual, Robert Wood CISO, Centers for Medicare & Medicaid Services, Don Cardinal Managing Director, Financial Data Exchange, Seth Knox Chief Marketing Officer, Agari, Chris Bailey VP of Strategy and Business Development, EntrustCollapse Text

Trust 2021 Sponsors

My experience with Trust and Agari are phenomenal. I’m happy to participate…
Udeme Ukutt
Agari Trust was a great event. Agari consistently puts together great events. I enjoy learning that I take away from your events and the opportunity to interact with my peers.
Mike Machado
Trust was a great chance to get together with my peers and talk about all expects of threat landscape health, inbound, and outbound.
Don Cardinal