May 17th - 18th, 2023
NinjaOne presents
ITX Security Summit 2023
Join us for a special two-day virtual event, packed with actionable tactics and takeaways geared toward IT DOERs.
Save Your Spot
IT Pros are raving about NinjaOne Webinars
Agenda: Day 1 — Tactical Ops
Initiative
Our Director of Community Jonathan Crowe roleplays as an IT admin. Let's see if he can handle the heat.
JONATHAN CROWE
Director of Community at NinjaOne
-
DAN MYERS
Product Manager at NinjaOne
Recording
10am - 10:30am EDT | 4pm - 4:30pm CEST
Welcome: The Critical Role of IT Admins
Too often, admins are left on the sidelines of security discussions, even though they're central to deploying crucial system updates, reducing attack surface, and know the network and its users better than anyone. It's time to celebrate these unsung heroes and equip them with better resources that enable and empower them to do more.
Join us as we kick things off by highlighting our themes and goals for the summit, along with some of the amazing submissions to our "Create your IT hero character" contest.
JONATHAN CROWE
Director of Community at NinjaOne
-
BRITTANY BROWN
Technical Content & Community Manager at NinjaOne
-
ROBYN JORDAN
Community Engagement Manager at NinjaOne
10:30am - 11:15am EDT | 4:30pm - 5:15pm CEST
Threat Bestiary: Actionable Findings from Red Canary’s 2023 Threat Detection Report
Delve into the latest techniques and trends dominating the threat landscape, including new twists that are keeping defenders on their toes. Not only will you come away with a better understanding of how attackers are evolving their tradecraft, you'll also pick up practical tips for improving your readiness, detection, and response to the critical threats you're most likely to face.
EVAN BREDAHL
Customer Solutions Engineer at Red Canary
11:30am - Noon EDT | 5:30pm - 6pm CEST
Defense Workshop 1: Initial Access
Let's breakdown the most common, current techniques and tactics attackers are using to gain initial access, along with some actionable, easy-to-deploy hardening recommendations IT teams can use to counter them.
HARLAN CARVEY
Senior Incident Responder, R&D at Huntress
Noon - 12:30pm EDT | 6pm - 6:30pm CEST
Defense Workshop 2: Credential Abuse
Let's breakdown some of the most common techniques attackers are using to hijack credentials and bypass access controls, along with practical steps IT teams can take to better secure their organizations and mitigate their risk.
JOSH SCHOFIELD
Principle Product Manager at NinjaOne
Recording
Resources
- Slides
- Microsoft Incident Response Playbooks for phishing, password spray, app consent grants, and more
12:30pm - 1pm EDT | 6:30pm - 7pm CEST
Defense Workshop 3: Lateral Movement & Persistence
Learn how the team at Axiom is using Sysmon and NinjaOne to monitor and alert on suspicious signs that attackers may have gained access and are attempting to achieve discovery, lateral movement, persistence, and more.
BOBBY GUERRA
CEO at Axiom
1pm - 1:45pm EDT | 7pm - 7:45pm CEST
Defense Workshop 4: Endpoint Hardening with Ninja
We'll wrap up our workshop series by sharing even more practical endpoint hardening tactics you can deploy using the tools you're already using, including Ninja.
PETER BRETTON
Sr. Director of Product & Customer Marketing, NinjaOne
-
JEFF HUNTER
Sales Engineer Manager, NinjaOne
-
STEPHEN MURPHY
Product Manager, NinjaOne
Recording
NOTE: Due to technical issues, we're providing a recording of a previous webinar that covered this material.
Resources
- Endpoint Defense Playbook (PDF)
- Endpoint Hardening Checklist (themed-version PDF)
2pm - 3pm EDT | 8pm - 9pm CEST
Join us for an interactive play-through of the hit incident response game from Black Hills Information Security.
RECORDING
NOTE: Due to technical issues, we unfortunately don't have a good recording of the Backdoors & Breaches session we played during the summit. The next-best thing we can offer here is this terrific instructional video from the team at Black Hills that shares a sample session and walks through how to play.
3pm - 4pm EDT | 9pm - 10pm CEST
Now let's recover from the incident we discovered during Backdoors & Breaches in an interactive tabletop roleplaying session you don't want to miss.
Agenda: Day 2 — Building Buy-In and Resiliency
10am - 11am EDT | 4pm - 5pm CEST
Scenario 2: Join us in another interactive tabletop roleplaying session, this time focused on testing your ability to recover from backup. You won't need to have played the Day 1 session to have fun with this one.
11am - 11:45am EDT | 5pm - 5:45pm CEST
Talking About Security with the Board When You’re Not a Security Expert
Speakers
Wes Spencer
VP of Cybersecurity Strategy at CyberFox
Noon - 12:45pm EDT | 6pm - 6:45pm CEST
Successfully Navigating a Cyber Insurance Claim
Avoid getting caught off guard by insurance surprises by learning what they're looking for up front.
Speakers
Dustin Bolander
VP of Ops & Tech at FifthWall Solutions
12:45pm - 1:30pm EDT | 6:45pm - 7:30pm CEST
Compliance Check: Getting Control of Cyber Governance
How up-to-date and widely implemented are your security policies, really? In this session, you'll learn how to streamline compliance by improving your visibility, eliminating manual processes, and reducing your risk.
Speakers
Tim Golden
CEO at ComplianceRisk.io
1:30pm - 2:15pm EDT | 7:30pm - 8:15pm CEST
Selling Security Services
We all know there's opportunity to drive revenue with security services, but how are the best actually taking advantage and setting themselves apart from the pack? In this session, you'll get a crash course in proven cybersecurity sales tactics from Juan Fernandez, author of The MSP Owner's Handbook.
Speakers
Juan Fernandez
Global Channel Chief at HacWare
2:15pm - 2:30pm EDT | 8:15pm - 8:30pm CEST
Closing
Create your character and enter to win these prizes!
It's dangerous to go alone. That's why we're calling on bold IT adventurers like yourself. Join us on the ITX Security Summit quest by creating your own hero using Midjourney, BlueWillow, Hero Forge, or the image/character creator tool of your choice.
How to enter
01
Share a pic of your character with us by joining our Discord!
Be sure to include:
- Your character's name
- Screenshot / image
- A special IT-related ability or buff your character has (ex: +1 PowerShell; or "can make end-user issues magically disappear simply by appearing")
02
We'll pick 10 finalists who will each win a custom Dungeon Master's tankard.
03
Attend the ITX Security Summit on May 17th & 18th and cast your vote to determine which of the finalists win the three grand prizes — a LEGO Lord of the Rings Rivendell set, a Zelda edition Nintendo Switch, and a 512GB Steam Deck!
Actionable tactics for securing your environment
No fluff. No sales pitches. Just practical, real-world training and insights from experts and practitioners you can put to use right away.