Eugene Raynor

HexCon21 day 2 highlights: The show so far

Eugene Raynor

Sep 23, 2021

25 min read

The past two days of Hexnode’s annual user conference, HexCon21 have been a whirl wind of excitement. As the Day 2 of HexCon21 comes to a close, here we’re outlining the key takeaways from Day 2 for any of you to catch up on the sessions you’ve missed.

Keynote: Why trust in digital technology is the key to future innovation and adoption

Day 2 officially kicked off with the opening keynote from Matthew Rosenquist, the CISO and cybersecurity evangelist at Possessing experience of over 30 years in the industry, he talked about the interdependence between digital technology and security. He drove home the fact that every new technology comes with associated risks and that trust is crucial for the continued innovation of technology.

Here are the critical points of interest that Matthew Rosenquist discussed in his talk. 

  • Global transformation has changed economics and livelihood, brought about communication and collaboration, and drastically improved people’s lives. 
  • However, as the value of technology rises, the more it gets targeted by attackers. 
  • New technology will keep coming, and we need to get ahead of them in terms of security. We need to make sure that their benefits far outweigh their risks. 

Here are some significant cybersecurity best practices that Matthew Rosenquist proposed during his talk, for distinct divisions of individuals. 

Security practitioners
  • Drive leadership and trust
  • Communicate and collaborate risks and vulnerabilities
  • Engage in innovation early on (embed security as part of the design)


  • Accept that innovations come with risk 
  • Design products for security 
  • Understand that cybersecurity is the new cost of doing business

  • Be informed, don’t become a victim
  • Make sure that trust is a crucial purchase criterion
  • Communicate your expectations to the manufacturers

Speaker sessions

Zero Trust and the role of UEM

Abbas Kudrati, APAC Chief Cybersecurity Advisor at Microsoft, discusses how Unified Endpoint Management solutions can play a role in your Zero Trust network architecture.  

The 3 key principles he talks about as being part of zero-trust are, 

  • Verify explicitly  – Trust no one, verify everyone. Always authenticated based on all available data points. 
  • Use least privilege access – Limit user access based on a need-to-know and need-to-do basis (just-in-time/Just-enough-access). 
  • Assume breaches – Design architecture in a way that minimizes the attack surface of an organization. 

Moving on, Abbas Kudrati talks about how Unified Endpoint Management solutions can reinforce that Zero Trust network architecture.  

  • Modernize identity and endpoint management 
  • Reduce on-prem infrastructure 
  • Manage identities and endpoints in the cloud 
  • Secure the hybrid workforce 
  • Ensure device compliance 
  • Turn on MFA 
  • Enforce conditional access policies 
  • Transform employee experiences 
  • Secure all apps with an integrated identity and endpoint management solution 

He also specified five unique use cases or scenarios where a Unified Endpoint Management solution can play an important role in Zero Trust network architecture. 

  • Hacker uses stolen credentials to try login to company resources – Due to an unmanaged device and risky IP address, the login attempt is challenged with 2FA 
  • An employee needs access to an on-premise business app while away from the desk – Access privilege is limited to read-only 
  • User tries to download corporate SaaS apps on their personal device – User is prompted to register the device with corporate IT 
  • User tries to share documents with an external partner – Document viewing is limited to authorized users and identities 
  • Employee requests access to corporate resources outside of their business group – Access policies automatically denies access due to conflict of interest 

Privacy in the cloud at financial institutions

Ulf Mattsson, the chief security strategist at Protegrity, spoke at HexCon21 about the security and privacy trends in the cloud at financial institutions. He elaborated how, as more people started to work from home due to the pandemic, data became much wider and less controlled, ultimately resulting in a distributed corporate environment. 

He talked about the different data regulation policies including EU GDPR, US CCPA/CPRA, PCI DSS, US HIPAA, and the kind of data that are considered sensitive. 

Moving on, he talked about the factors impacting security information in coming years, including, 

  • The introduction of IoT and cyber-physical systems 
  • Increasing regulations 
  • Evolving threat landscape 
  • Business leaders seeking information security as a competitive edge 
  • DevOps driven IaaS adoption 

Ulf Mattsson also talked about the different data protection techniques used in financial institutions, including 1 and 2-way transformations, hashing, data masking, differential privacy, k-anonymity, and more.  

He talked about the different use cases and data privacy techniques, and their requirements in the financial sector. He also discussed risk management, including the pyramid of risk, and how to utilize IT for competitive advantage. 

Ulf Mattsson predicts that CASB and encryption will be the top trends where end-users will make future security investments, and shows how CASB can protect sensitive data both in the cloud and on-premise. 

2021 DBIR and the VERIS A4 Threat Model

John Grim explains how the VERIS Framework underpins the Data Breach Investigations Report (DBIR). VERIS employs the A4 Threat Model to describe key aspects of incidents and breaches that affect victim organizations.  

He then talks about the key highlights from the 2021 Data Breach Investigation Report (DBIR), and how it was developed using the VERIS A4 threat model. 

DBIR 2021 offers an in-depth look into data breaches and cybersecurity incidents. It takes data from 88 countries and 83 contributors. It has taken into account 79,635 total incidents, and have considered 5258 data breaches. 

John Grim then moves on to explain the VERIS framework (Vocabulary for event recording and incident sharing), which consists of four fundamental elements. 

  • Actors 
  • Actions 
  • Assets 
  • Attributes 

He then goes on to explain each of these fundamental elements in detail. 

  • External – criminal groups, lone hackers, former employees, govt entities
  • Internal – full time employees, independent contractors, interns, other staff

  • Misuse 
  • Social – Phishing and pretexting were top (33%)
  • Error – Misconfiguration and misdelivery were top error actions
  • Malware –Ransomware was top malware action
  • Hacking – use of stolen credit cards and brute force were top (40%)
  • Physical  Environment

  • Server 
  • People 
  • User device 
  • Terminal 
  • Network 
  • Embedded 
  • Media 

  • Confidentiality 
  • Integrity 
  • Availability 

John Grim ends the session by talking about the many different use cases for the VERIS framework and provides relevant information for the same. 

Cyber crime in industries and how not to be the next victims

Scott Augenbaum, retired FBI special agent talks about tackling cybercrime in the industry. The global damages of cybercrime keep on increasing – says Scott. 

There are around 294 million smartphone users, 32 million businesses, and 56.6 million students attending elementary and secondary school in the US. The FBI’s Intercrime compliant center states that cybercrime has increased 400% since the pandemic. The global cost of cybercrime increased 100% in the past 5 years, and currently sits between 1 trillion to 6 trillion dollars, and the worldwide spending on information security is forecasted to reach 170.4 billion by 2022. 

Scott has spoken to over a thousand victims whose attacks could easily have been prevented in his time. 

He talks about the four truths behind cybersecurity 

  • None of my victims ever expected to be a victim 
  • Once cybercriminals do their damage, the chances of law enforcement getting your money or data returned is just plain hard 
  • The chances of law enforcement bringing cybercriminals to justice are extremely challenging 
  • Most cybercrime victimizations could have been prevented 

He then goes on to share the common mistakes that happened in each of their victimizations 

  • Did not understand the scope of the cybercrime problem 
  • Did not think they fit the victim profile 
  • Felt hopeless because the cybercriminals are sophisticated and people lack the skill to stay safe 
  • They were using the same password for multiple platforms 
  • Did not know which accounts are mission critical 
  • They were not aware email, SMS and telephone calls are the weapons of cybercriminals 
  • Didi not use 2FA to secure mission critical accounts 
  • Did not know the simple strategies to mitigate email compromise and ransomware 
  • They were not aware of the latest scams impacting the people 

Scott ends the session by talking about a few steps and strategies you could adopt to stay safe online. 

  • What accounts do you have that if cybercriminals stole your password would ruin your life? 
  • Have you implemented 2FA/MFA? 
  • How strong are your passords?Are they 15 characters long, with upper/lowercase letters, special symbols, number? 
  • Do you have separate passwords for each account? 

Rugged solutions and the 5G evolution

Curtis Wick from Kyocera International talks about the benefits of Rugged devices for the 5G evolution.   

Businesses face a lot of challenges when mobile communication is concerned. With Kyocera OEMConfig, EMM solutions can include specific Kyocera APIs for configuration and implementation. Curtis discusses the rugged capabilities of Kyocera devices, which includes, 

  • The ability to withstand temperature extremes 
  • The ability to withstand drops and impacts 
  • Ingress protection against solids and liquids to withstand sand and dirt. 
  • Complete water immersion of 6.5 feet for 30 mins 
  • Heat dissipative structure – High thermal conductivity 
  • Rigid lightweight construction 
  • Glove-friendly buttons and keys for easy operation 
  • Hazardous location certified devices 
  • Scratchproof (proprietary sapphire shield glass) 

He goes on to talk about the benefits that 5G evolution promises, including, 

  • 50 times faster and more capable than 4G (with speeds of over 1 gigabyte per second) 
  • Low latency of around 15ms 
  • Designed to support 100 times increased traffic capacity and improved network capability 

Curtis also talks about the market focus for rugged 5G devices, which has expanded to, 

Market focus for rugged 5G devices
  • Construction
  • Transportation and distribution
  • Oil, gas and mining
  • Manufacturing
  • Public safety
  • State and local government
  • Healthcare
  • Hospitality

Interview: Busting the cyber security myths – A talk with Chris Roberts

Chris Roberts, one of the world’s foremost experts on Counter Threat Intelligence and vulnerability research within the Information Security industry, joins us on an interview with Sarika Abraham, Marketing lead at Hexnode, to discuss some of the most common vendor questions on cybersecurity in the enterprise, and how we can keep ourselves secure in the age of online business. He talked about his background in the security industry. As one of the well-known hackers and researchers, Chris has been deeply involved with security R&D, consulting, and VCISO services, in his quest to protect and defend organizations against various types of attacks. He answers questions about, 

  • What should employees look out for to prevent potential ransomware attacks 
  • How the network perimeter is no more, and how employees are now the guardians of the company information 
  • What companies can do once ransomware has hit them 
  • How long it takes for companies and individuals to recover, once an attack has compromised them 
  • How good Anti-virus is in the office environment 
  • How to prevent and deal with threats that come from the inside 

Chris also shares his views on modern technology including, 

  • Are we going in the right way with Zero-Trust? 
  • How Unified Endpoint Management can help businesses 
  • Has the future of passwordless security arrived, and are we ready to embrace it? 
  • How vendors can build future technology with the customers and their security in mind 

And just so much more answers to all our burning questions. 

Operational cyber security

Albert E. Whale, founder and CEO of IT Cybersecurity solutions, talks about the possibility of vulnerabilities affecting the system due to the omission of user behavior and their factors from corporate security strategies. 

Albert says that most security strategies are always focused on the network, in a static state. As a result, assessment and testing are completed on devices, without considering the human factors. Hence, these tests become inaccurate.

He says the 3 pillars of cybersecurity are, 

  • Protection – Firewalls, VPN and other mechanisms 
  • Detection – What do you see when a threat is inside 
  • Response – What is the typical response time to resolve a threat 

Albert also shares his experiences from his company on how users can affect the security network. He says that vulnerabilities from user behavior can be classified into three. 

  • Malicious – Wilful intent to steal information or sabotage systems 
  • Negligent – Intentionally circumvents security controls, but not maliciously 
  • Inadvertent – Unwittingly causes a breach or leak through unawareness 

Back to Basics – Combining Advanced Tools and Fundamentals to Improve Outcomes Against Advanced Threats

Michael Manrod, Chief Information Security Officer (CISO), and Christian Taillon, Threat Response engineer at Grand Canyon Education, discuss revisiting the security fundamentals required to mount an effective defense against ransomware and other common threats of this era. 

They talk about the emerging trends and happenings in the cybersecurity industry including, 

  • Supply chain risks 
  • Ransomware awareness 
  • RaaS and affiliate confusion 
  • How XaaS market brings more capacity to leverage new vulnerabilities 

They also talk about a few threats to expect these days, most notably Malware-as-a-Service loaders such as Night Spider’s Zloader, or Wizard Spider’s Bazar loader. 

Moving on, they talk about some of the few common problems they have identified when reviewing security strategies, including 

  • Firewall misconfiguration 
  • Protections in detection mode 
  • Shelfware 
  • Key features not enabled 
  • Ignoring UEM, kiosk and mobile security 

Lastly, they finish by talking about the current trends and solutions being used by businesses to protect hosts and enforce security. These include, 

  • Unified Endpoint Management solutions – Most organizations now have a range of decent endpoint solutions and settings 
  • Next-Generation Anti-Virus/Endpoint Detection and Response/Managed Detection and Response – Modern endpoint protection has become critical 
  • Host hardening – Know what is running, updating all software in a timely manner 

Cyber hygiene with emphasis on password management and two-factor authentication

Donald Allen, the #1 bestselling author at, talks about the role of passwords in cybersecurity and about different methods to protect against threats.  

Donald Allen begins his talk by mentioning the human element in cybersecurity. He quotes that, 85% of all successful cyberattacks involve the human element. He further quotes from Verizon’s 2021 DBIR, stating that, 

  • 61% of data breaches involved stolen passwords 
  • 64% of people use weak passwords 
  • 60% of SMBs go out of business after one successful cyber attack 

Next, Donald moves on to talk about the different ways how cybercriminals can steal your password. 

  • Keylogging 
  • Service provider 
  • Internet browser 
  • Frequently used passwords 
  • Re-used passwords 
  • Wireless keyboards, public Wi-Fi 
  • Surveillance 
  • Phishing 

He further goes on to share some of his experiences and stories in the cybersecurity and threats domain. Donald then talks about the steps that you, as an individual, can take to prevent potential threats and attacks.  

  • Enforce strong passwords 
  • Use a unique password for every website/service you use 
  • Use a reliable password management system 
  • Change your password every 90 days 
  • Regularly check if your password has been leaked 
  • Adopt 2FA/MFA 

Lastly, Donald concluded his discussion by summarizing the key points from his talk as follows. 

HexCon21 Donald Allen summary 

Moving from Reactive to Proactive Security in Windows

When it comes to cybersecurity, Sami Laiho (Microsoft MVP), Senior Technical Fellow at Adminize, talks about how it is always better to be proactive than reactive. He talks about the different tactics you can implement to convert to a proactive strategy. 

Sami begins with Directory Tiering – The process of splitting your environment into 3 layers, and never allowing higher admin layers to access lower admin layers. He demonstrates how to do this in a standard windows domain environment, with the help of a domain controller and a client system. 

Next, Sami talks about MFA – A very effective protection against phishing attacks. He goes on to explain that using biometrics as a second factor can be very powerful, and then demonstrates how to implement 2FA in a domain environment with a third-party app (DUO). 

Next on the list, he talks about the principle of least privilege – He says, in Windows, if you let users log on as an admin, then there is no security. Windows did not build the security subsystem to withstand the use of admin rights. However, with a no-admin approach, we get 

  • Better performance 
  • Fewer tickets 
  • Less reinstallation 
  • More productive users 
  • Less malware 
  • To be lazy as admins 

Sami goes on to show relevant news and reports on attacks and vulnerabilities that occurred when users were given admin rights, 

HexCon21 Sami Laiho attacks caused due to providing admin privileges 
Sami then demonstrates the process of the Principle of Least Privilege in a Windows system, by setting up and using a limited user work environment. 

Next, he talks about Allow Listing – Sami says that by allowing listing/whitelisting applications, we can easily block most malware from entering our Windows environment. He then goes on to show a demo by setting up an allow list on his personal machine. 

Sami also talks about why we need encryption 

  • Data wise – Over 80000 devices get lost or stolen on the biggest airports in the US and Europe yearly 
  • Security wise – All Windows devices can be cracked with a single command 
  • Decommissioning – The format utility securely deletes volume metadata and any Bitlocker keys, making the volume instantly unreadable 

Last on the list is the need for Monitoring – Someone needs to keep monitoring what’s happening in the environment. Be it using CM solution, Microsoft Azure Sentinel, Splunk or other monitoring solutions and software. 

Building a strong security culture

Madhu Maganti, a prominent Cybersecurity Leader and Trusted Advisor (ABIP CPAs & advisors), talks about building a strong security culture in the workplace. 

Madhu begins by talking about the difference between positive and negative work cultures

HexCon21 Madhu Maganti difference between positive and negative work cultures 
He then goes on to talk about the impact of poor security culture on your business. He says that a poor cybersecurity culture can make it easier for your organization to fall victim to a malicious party. In addition, without a robust cybersecurity culture, employees are far more likely to become the weakest chain in your security strategy. This, in turn, makes your business an easier target for a data breach, resulting in significant costs to your organization. 

Madhu then talks about how to improve your cybersecurity culture, by following certain steps 

  • Provide training and reminders to all employees 
  • Management should lead by example and communicate effectively 
  • Encourage employees with positive reinforcement 

He also provides us with good tips and instructions on setting up an effective security culture in the workplace. 

  • The first step is to recognize that an effective security strategy is critical to business success 
  • Establish an appreciation of positive security practices among employees 
  • Align security to core business goals 
  • Articulate security as a core value rather than an obligation 

Creating opportunity in a world of limitations

Dr. Lanre Philips, a proven expert in the FMCG, banking, telecommunications, and information technology industry, delivered his thoughts on businesses creating opportunities in a world of limitations. He shared stories of being a resident of Nigeria and how change is constant in everyone’s life. He opened our eyes to the fact that we wake up each day with expectations and spend the day trying to bring it as close to reality as possible.  

Dr. Lanre highlighted the seven steps involved with change: immobilization, denial, anger, bagging, depression, experiencing, and acceptance. The rate at which people move through these steps is different for each individual. The faster you get from immobilization to acceptance, the quicker you can adapt to changes.  

Dr. Lanre Phillips left us with a series of thought-provoking examples to show why your environment, your business, and your knowledge of your customers will help make you a better entrepreneur. 

“Change is constant, the best we can do is try and repackage ourselves” 

How To Build a Great Work Culture Remotely

Some of the most challenging areas of growing a company can be connected to the lack of leadership and cultural management. Josh Allan Dykstra, CEO of Helios, delivered an engaging talk on how businesses can remotely build a great work culture. He used the metaphor of the importance of an operating system to a device to signify the role of work culture in a company. 

Work culture, just like the device OS, dictates what can and cannot happen at your business. Unfortunately, when founders build a business, they unknowingly create an OS that is codified later into what is commonly regarded as the work culture. Josh delivered ideas on how these issues can be circumvented by employing a 3-step process.  

Step 1 – Making the OS visible

Making the work culture an opt-in program considering that the entire workforce cannot adapt to rules, but they can look forward to aims and aspirations. 

Step 2 – Make it tangible

Focus on the principle the company needs; borrowing ideas from a company that made their public is a good place to start.  

Step 3 – Practice the OS

Your company OS should be used patched and tweaked to accommodate for nuances of your business. 

Mental Wellness and welcoming employees back to the office

Julie Alleyn, Founder of Pegaus Evolution, helps organizations create a great working culture and stimulate employee engagement. She talks about how managers can help employees return to work successfully as she looks at the last 18 months. She goes on to address the apprehension from employees in preparation for returning to work. 

Julie talks about how the work atmosphere changed during the pandemic. She addresses how organizations were skeptical about allowing employees to work from home and how it was proved wrong. Longer work hours during the pandemic proved challenging to the employees, especially since they failed to find a balance between work and personal life. The overdose of bad news on the media also contributed significantly to the apprehension. 

She then talks about what employees can do to ease the transition – how employees can recognize the signs of stress and how they can find ways to cope. She talks about the different activities that employees can do to feel more relaxed. 

She also talks about how managers can further help employees in returning to the office as she lists out different activities that they can do for employee well-being. Julie finally talks about how all of these can be implemented in the current scenario and what should be avoided while doing so. 

Security issues in the WFH scenario

Randy Marchany, Chief Information Security Officer (CISO) at Virginia Tech, addresses the difficulties of implementing work from home scenarios in the enterprise. There are five steps to a successful work from home environment, says Randy. 

  • You – Protect yourself from social engineering attacks 
  • Home network – Make your passwords strong, and allow only people that you trust 
  • Passwords – Create strong passwords, set up different passwords for different services, use a password manager 
  • Updates – To stay ahead of vulnerabilities, make sure all your software and devices are updated to the latest versions 
  • Kids and guests – Make sure family and friends cannot use your work devices 

If you use your home computer for work purposes, you must follow your office’s security requirements, and create a separate user ID for work-related necessities. 

As an enterprise IT admin who must secure a work-from-home environment, there exist some questions you must find answers to before allowing employees to work from home. 

  • Can your IT scan computers at your house 
  • Can you disconnect a host from your network 
  • What network traffic visibility exists from computers at your house 
  • What type of logs will you need to collect in a work-from-home environment? 
  • Will your company tools work outside of your work network? 
    • Active Directory 
    • 2FA 
    • Software licensing 
    • VPN

Randy ends his session by laying out specific steps you must follow to protect your computer in a work from home scenario 

  • Protect your system with a strong password 
  • Update your OS and software 
  • Have a firewall ready 
  • Adjust browser security, privacy settings 
  • Encrypt sensitive data 

COVID – 19 Cybersecurity Impacts

It’s been 2 years and the COVID-19 still continues to wreak havoc across the globe and it seems like it’s here for the long haul. And among all of its dreadful impacts, the alarming rate of cyberattacks is often the most overlooked one. It’s only after when Dr. Dave Schippers shared his thoughts on this that many of us realized why businesses of all sizes are equally vulnerable to cyber attacks amidst the global pandemic. 

Dr. Dave Schippers, Chair of Information Technology Decision Sciences at Walsh College, being a cyber security professional gave some valuable insights on the impacts of COVID-19 on cyber security through his session along with some good tips to tie over the challenges. He started the session by explaining some of the important cyber security industrial terms like cyber kill chain, zero-trust security model, response plans, etc. Following this came the most awaited part: the lessons learned from the cyber security incidents in 2020.  

Dr. Dave says that the attackers exploited the public’s interest in staying alert of the pandemic status to carry out targeted phishing and this led to a substantial increase in the number of incidents the world over. He talked about all the attack vectors the criminals are using and the ways by which the pandemic turned out to be the right time for them to implement them. Most of the statements were backed by statistical data and this made the presentation further interesting for the cyber security enthusiasts. 

What you see, is not always what you get – Subverting Bedrock of Browsers

Rafay Baloch, Lead Security Researcher at Cyber Citadel, talks about his research on browser security and walks us through the different ways how one can bypass anti-phishing detection mechanisms. 

Rafay begins his talk by specifying the need for mobile browsers. As of 2020, 63.4% of the global mobile population is accessing the internet through their smartphones. However, a study by IBM revealed that users are three times more likely to fall prey to phishing attacks on a mobile phone as opposed to a desktop computer. 

Next, Rafay talks about how browsers work, explaining the roles of the user interface, browser engine, and rendering engine. He then talks about the same-origin policy and how it blocks potential attacks to retrieve data from your websites.  Rafay then moves on to talk about spoofing attacks and their different categories and classifications 

  • Address bar spoofing – refers to spoofing the URL of a web browser 
  • Content based spoofing – refers to spoofing the content of a webpage 
  • Extension spoofing attack – refers to exploiting the vulnerabilities in the browser to manipulate the extension 

He then talks about each of these attacks in detail, along with how to recognize and counter them. Rafay also talks about anti-phishing filters and how attackers bypass anti-phishing filters to fool the recognition systems. 

Ransomware attacks: incident response and mitigation

Mario Demarillas, the Board of Director, Chief Information Security Officer (CISO), and IT Counseling and Software Engineering head at, talks about some of the prominent ransomware attacks in 2021.  

  • JBS, a US-based food processing company, suffered a ransomware attack on May 30th, which became fully operational by June 3rd. They confirmed payment of 11 million dollars as ransom. 
  • AXA, a French multinational insurance firm, was hit by a ransomware attack on May 18th, in Philippines, Thailand, Malaysia and Hong Kong. Apparently, attackers had accessed certain data in Thailand. 
  • Ireland Health Service Executive, a government service facility, was attacked on May 14th. Their systems were shut down, and snapshots of patient and employee data were leaked on the dark web. 
  • CNA Financial, an insurance company based in Chicago, US, was hit by a network disruption on March 21st. They recovered on May 12th. However, Bloomberg reported they paid a ransom of 40 million dollars. 
  • Acer, a Taiwanese multinational hardware and electronics corporation, was asked a ransom of 50 million dollars. 
  • An attack on Colonial Pipelines resulted in a five days downtime. They had to pay a ransom of 4.4 million in Bitcoins. 

Mario says the top three ransomware attack vectors were due to  

  • RDP compromise 
  • Email phishing 
  • Software Vulnerabilities 

He then talks about the cyber security tactic and techniques that can be used by security heads to protect companies from potential ransomware attacks. 

  • Governance 
  • Risks 
  • Critical systems 
  • Computing environment

  • Access control
  • Awareness and training
  • Data security
  • Protective technology

  • Anomalies and events
  • Continuous monitoring
  • Detection controls

  • Emergency response
  • Business continuity
  • Crisis management

  • Crisis mode to business as usual mode
  • Analyze lessons learned
  • Update plans

In addition to the breakout sessions, there were product training sessions on Apple user enrollment, ROM enrollment, IoT management, Hexnode Okta integration, Scripting, Windows Defender, Mac security management and the whole new UEM migration tool. 

Selfie contest

Short bursts of gamification added a bit of fun to the day. The Selfie contest required the attendees to take a snap and share their HexCon moment on the wall as well as on social media along with the hashtags #Hexnode and #HexCon21. 

HexCon21 Selfie contest

Wrapping it up, all the insightful sessions, fun-filled games and interactions with the great minds in the industry made day 2 of HexCon21 pretty exciting just as day 1. 

Stay tuned for the Day 3 recap and more blogs on HexCon21! 

Eugene Raynor

Seeking what's there lurking over the horizon.

Share your thoughts