{"id":26895,"date":"2023-09-20T15:37:12","date_gmt":"2023-09-20T10:07:12","guid":{"rendered":"https:\/\/www.hexnode.com\/blogs\/?p=26895"},"modified":"2023-12-08T08:21:33","modified_gmt":"2023-12-08T02:51:33","slug":"hexcon23-as-it-happened","status":"publish","type":"post","link":"https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/","title":{"rendered":"HexCon23 &#8211; As it happened"},"content":{"rendered":"<p>Our heartfelt gratitude for your active participation, making these three days truly eventful. Stay safe, remain secure, and we eagerly anticipate reuniting with you at the next HexCon<\/p>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">3:30 pm CST 22\/09\/2023<\/span><\/b> <\/p>\n<p>As we draw the curtains on this third and final day, we trust that you&#8217;ve gained valuable insights into the dynamic realm of cybersecurity. <\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">HexCon23: A Remarkable Journey Comes to a Close! <\/p>\n<p>We extend our deepest gratitude to all the speakers who joined us and the Hexnode community for making HexCon23 a massive success! <\/p>\n<p>Thank you for being a part of HexCon23 &#8211; until we meet again! <br \/> <a href=\"https:\/\/twitter.com\/hashtag\/hexcon23?src=hash&amp;ref_src=twsrc%5Etfw\">#hexcon23<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/closingkeynote?src=hash&amp;ref_src=twsrc%5Etfw\">#closingkeynote<\/a> <a href=\"https:\/\/t.co\/9thRyyAiw2\">pic.twitter.com\/9thRyyAiw2<\/a><\/p>\n<p>&mdash; Hexnode (@thehexnode) <a href=\"https:\/\/twitter.com\/thehexnode\/status\/1705317294258180494?ref_src=twsrc%5Etfw\">September 22, 2023<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">3:25 pm CST 22\/09\/2023 @Keynote<\/span><\/b> <\/p>\n<p><b>Closing Keynote<\/b> <\/p>\n<p>HexCon23 reached its culmination, but the journey doesn&#8217;t conclude here. As long as threats endure, the commitment to addressing them remains. Apu Pavithran, CEO and Founder of Hexnode delivered the closing keyword.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">3:10 pm CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Why Ultra Rugged Mobility Solutions combined with Hexnode are Essential for your Business <\/b> <\/p>\n<p>Bill Veasy, Director of Enterprise Sales at Kyocera International Inc., covered &#8220;Why Ultra Rugged Mobility Solutions combined with Hexnode are Essential for your Business.&#8221; We got to know about the advantages of integrating ultra-rugged mobility solutions with Hexnode in their business environments.<br \/>\n<center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Why-Ultra-Rugged-Mobility-Solutions-combined-with-Hexnode-are-Essential-for-your-Business-Bill-Veasy-e1695390447536.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Why-Ultra-Rugged-Mobility-Solutions-combined-with-Hexnode-are-Essential-for-your-Business-Bill-Veasy-e1695390447536.png\" alt=\"Why Ultra Rugged Mobility Solutions combined with Hexnode are Essential for your Business \u2013 Bill Veasy\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">2:40 pm CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Urovo Solutions Empower Various Industries to Realize Digital and High Efficient Operations <\/b> <\/p>\n<p>In his session, Robert Wang, General Manager of Overseas Business Group at Urovo Technology elaborated on how Urovo Solutions empowered various industries to realize the objectives of digitalization and enhanced operational efficiency. He also discussed how Urovo facilitated organizations across diverse sectors such as logistics, healthcare, retail, and more in their journey towards becoming more intelligent and efficient entities.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">2:35 pm CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Crafting an Endpoint Protection Strategy that Works <\/b> <\/p>\n<p>Bernard Wanyama, President of ISACA Kampala Chapter and Director of SYNTECH ASSOCIATES Limited, shared valuable insights on &#8220;Crafting an Endpoint Protection Strategy that Works.&#8221; Check out the session and increase your knowledge about crafting effective endpoint protection strategies.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">2:30 pm CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Malware Hunting Discovering Techniques in Malicious PDF <\/b> <\/p>\n<p>Filipi Pires, Founder of Black and White Technology, delivered an insightful session on &#8220;Malware Hunting Discovering Techniques in Malicious PDF.&#8221; From this session participants learned how to find malware in PDF files.<br \/>\n<center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Malware-Hunting-Discovering-Techniques-in-Malicious-PDF-Filipi-Pires-e1695390593538.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Malware-Hunting-Discovering-Techniques-in-Malicious-PDF-Filipi-Pires-e1695390593538.png\" alt=\"Hunting Discovering Techniques in Malicious PDF \u2013 Filipi Pires\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">2:05 pm CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>What Hollywood Video Can Teach You About Security <\/b> <\/p>\n<p>Benjamin Schmerler, a Senior Solutions Consultant at ISE, presented &#8220;What Hollywood Video Can Teach You About Security.&#8221; He discussed how this experience helped him understand the significance of determining valuable assets, perceiving threat actors, and selecting the right controls to safeguard the organization&#8217;s genuine interests.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">Live now: 2:00 pm CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Enterprise Readiness &#8211; Role of Privacy in Climate Tech<\/b> <\/p>\n<p>Sawan Joshi, the Founder of TriStep.io, explored &#8220;Enterprise Readiness: The Role of Privacy in Climate Tech.&#8221; From his informative session, attendees discovered the critical roles privacy and security play as business enablers in the context of climate tech.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">1:50 pm CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>How Do We Secure Critical Infrastructure?<\/b> <\/p>\n<p>Michael Holcomb, ICS Cybersecurity Global Lead at FLUOR, delivered an insightful session on &#8220;Securing Critical Infrastructure: Challenges and Strategies. &#8220;Watch the video to learn about the risks, vulnerabilities, and incident responses in the IT industry.<br \/>\n<center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/How-Do-We-Secure-Critical-Infrastructure-Michael-Holcomb-e1695390315533.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/How-Do-We-Secure-Critical-Infrastructure-Michael-Holcomb-e1695390315533.png\" alt=\"How do we secure Critical Infrastructure \u2013 Michael Holcomb\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">1:45 pm CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Equipping your workforce as the last line of defense<\/b> <\/p>\n<p>Priyanka Kedia, Vice President, Security &#038; Privacy Awareness at Itellisecure, led an insightful session on &#8220;Equipping your workforce as the last line of defense.&#8221; In this session she discussed how to enable your workforce to be the strongest line of defense against cyber threats like social engineering, phishing, tailgating and more.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">1:20 pm CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Cloud Security Resilience: Anticipate, Withstand, Recover, and Adapt <\/b> <\/p>\n<p>Art Ocain, Strategic Alliances and Incident Response Product Management at Airiam, talked about &#8220;Cloud Security Resilience: Anticipate, Withstand, Recover, and Adapt.&#8221; Attendees learned about the four cornerstone phases of the MITRE CREF in the context of cloud security.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">1:10 pm CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Securing the Extended Ecosystem: Navigating the Challenges of 4th Party Security <\/b> <\/p>\n<p>Magdy El-Faramawy, a seasoned Security Architect at CBA Australia, explored the intricate challenges associated with securing the extended ecosystem. He also shared valuable strategies for successfully maneuvering through these complexities.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">1:05 pm CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Cybersecurity: Hackers, Scams, Breaches, Cyberwar and Our future in a Digital World <\/b> <\/p>\n<p>Christian Hyatt, CEO of Risk3Sixty, and Cory Wolff, Director of Offensive Security at Risk3Sixty, delivered an enlightening Cybersecurity Awareness session on &#8216;Cybersecurity: Hackers, Scams, Breaches, Cyberwar, and Our Future in a Digital World.&#8217; Check out the session to gain insights into the evolving landscape of cybersecurity.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">12:55 pm CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Unstructured Data: Thinking About a Data Governance Strategy <\/b> <\/p>\n<p>Thomas Yohannan, Vice President, Partnerships &#038; Product at Aon, explored &#8220;Generative AI &#038; Data Privacy: Risk &#038; Concerns.&#8221; Viewers gained a deeper understanding of the risks and concerns associated with Generative AI and Data Privacy.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">12:50 pm CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Curiosity Killed the Hack <\/b> <\/p>\n<p>TJ Preyear, a Security Analyst at ISE, shared insights on the topic &#8220;Curiosity Killed the Hack&#8221; on Track 1. Attendees had the opportunity to hear from a hacker&#8217;s perspective and explore the journey of exploration through various toolsets. <\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Get ready to dive into an action-packed afternoon of Day 3 at HexCon23! Our lineup of sessions promises to be both insightful and engaging. <\/p>\n<p>Here&#39;s a glimpse of what&#39;s in store:<\/p>\n<p>&mdash; Hexnode (@thehexnode) <a href=\"https:\/\/twitter.com\/thehexnode\/status\/1705273910030369186?ref_src=twsrc%5Etfw\">September 22, 2023<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">12:35 pm CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Four Dimensions of Building a Security Program <\/b> <\/p>\n<p>Andy Ellis, Advisory CISO at Orca Security, delved into the &#8220;Four Dimensions of Building a Security Program.&#8221; Attendees uncovered insights into how accomplished CISOs strategize security investments. <\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Get ready to dive into an action-packed afternoon of Day 3 at HexCon23! Our lineup of sessions promises to be both insightful and engaging. <\/p>\n<p>Here&#39;s a glimpse of what&#39;s in store:<\/p>\n<p>&mdash; Hexnode (@thehexnode) <a href=\"https:\/\/twitter.com\/thehexnode\/status\/1705273910030369186?ref_src=twsrc%5Etfw\">September 22, 2023<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">12:20 pm CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>The Psychology of Social Engineering <\/b> <\/p>\n<p>Rachael Tubbs, Marketing &#038; Events Manager at Independent Security Evaluators, delved into &#8220;The Psychology of Social Engineering.&#8221; People who joined, gained invaluable insights into the psychological aspects of social engineering.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">12:15 pm CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Redefining Leadership: The Modern CISO in a Business First, AI and Cloud-Centric World <\/b> <\/p>\n<p>Alistair Ross, CEO of Revolution InfoSec, discussed &#8220;Redefining Leadership: The Modern CISO in a Business First, AI and Cloud Centric World.&#8221; Watch the session and explore the evolving role of the CISO and the strategic vision needed in an AI and Cloud-centric world.<br \/>\n<center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Redefining-Leadership-Alistair-Ross-e1695389924425.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Redefining-Leadership-Alistair-Ross-e1695389924425.png\" alt=\"Redefining Leadership \u2013 Alistair Ross\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">12:05 pm CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>How to stand out in the crowded Cyber hiring market <\/b> <\/p>\n<p>Gerry Gadoury discussed &#8216;How to Shine in a Crowded Cyber Hiring Landscape&#8217; on the HexCon stage. We gained valuable insights on excelling in the competitive cybersecurity job market.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">11:45 am CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>From DevOps to DevSecOps <\/b> <\/p>\n<p>Karan Sharma, Founder, Wise Fox Security, delved into the topic of &#8220;From DevOps to DevSecOps.&#8221; Attendees had the opportunity to learn practical tips and best practices for integrating security into their DevOps pipeline.<br \/>\n<center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/From-DevOps-to-DevSecOps-Karan-Sharma-e1695389779542.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/From-DevOps-to-DevSecOps-Karan-Sharma-e1695389779542.png\" alt=\"From DevOps to DevSecOps \u2013 Karan Sharma\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">11:40 am CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Unlocking 5G&#8217;s Potential: Safeguarding Against Cyber Threats<\/b> <\/p>\n<p>Sunil David, a digital technology consultant and former regional IOT director at AT&#038;T India, presented &#8220;Unlocking 5G&#8217;s Potential: Safeguarding Against Cyber Threats&#8221; at HexCon23. Attendees learned about the potential of 5G technology and how to protect against cyber threats in this context.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">Live now: 11:30 am CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>The key role of Security Champion in SDLC Security <\/b> <\/p>\n<p>Antonio Piovesan, Digital Security Specialist at Aspiag Services and Columnist at RedHotCyber.com, discussed &#8220;The Key Role of Security Champions in SDLC Security.&#8221; Viewers discovered the significance of Security Champions in the context of Software Development Life Cycle (SDLC) security.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">11:25 am CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>The Cyber Road Trip\u2026 whose coming?<\/b> <\/p>\n<p>Deepa Bradley, a Global Leader in Cyber Security Strategy, presented on &#8220;The Cyber Road Trip: Who&#8217;s Coming?&#8221; Attendees had the opportunity to expand their knowledge on cybersecurity during this engaging session.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">11:05 am CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Truths &#8211; Myths &#8211; Maybes <\/b> <\/p>\n<p>Merlin Namuth, a Chief Information Security Officer, delved into &#8220;Truths, Myths, and Maybes in Cybersecurity.&#8221; Attendees had the opportunity to gain a comprehensive understanding of various notions in cybersecurity that people accept as fact.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">11:00 am CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Mobile security in AI landscape <\/b> <\/p>\n<p>Alex Humado discussed &#8220;Mobile Security in the AI Landscape,&#8221; emphasizing the need to secure digital assets in a world where AI creates convincing synthetic content. Attendees learned about the current state of mobile security and how AI is reshaping dynamics for defenders and threat actors in this evolving landscape.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">10:50 am CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Converged Security in Industries \u2013 Cyber Security and Physical Security working together in dynamic environments<\/b> <\/p>\n<p>Vladimir Bunic, a Cyber and Digital Security Expert at the Nestl\u00e9 Global IT Hub in Barcelona, talked about &#8220;Converged Security in Industries.&#8221; Attendees got to learn how organizations can enhance their protection in dynamic environments by integrating cyber security and physical security in the face of intricate threats.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">10:40 am CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>The future of IAM in the modern workplace <\/b> <\/p>\n<p>Andrew Wilder presented &#8220;The Future of IAM in the Modern Workplace.&#8221; Attendees gained insights into the history of Identity and Access Management (IAM) and its anticipated future developments.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">10:25 am CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>API Security in 2023 <\/b> <\/p>\n<p>Alex Olsen, a Security Content Creator at TCM Security, presented on &#8220;API Security in 2023&#8221; at HexCon. Attendees learned about the significance of API Security in the year 2023.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">10:10 am CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Behind the Login: The Crucial Role of IAM in Cybersecurity<\/b> <\/p>\n<p>Pratyusha Vemuri, Founder &#038; CEO of Panoplia.io, presented on &#8220;Behind the Login: The Vital Role of IAM in Cybersecurity.&#8221; Her session helped the viewers gain a comprehensive understanding of IAM, including its core concepts and the significance of IAM in cybersecurity.<br \/>\n<center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Behind-the-Login-Pratyusha-Vemuri-e1695388147167.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Behind-the-Login-Pratyusha-Vemuri-e1695388147167.png\" alt=\"Behind the Login \u2013 Pratyusha Vemuri\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">10:05 am CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>BYOD and the Agile Workforce: Enhancing flexibility without compromising Security<\/b> <\/p>\n<p>Ilias Mavropoulos, a Security Operations Center Analyst, conducted a session on &#8220;BYOD: Transforming Modern Organizations.&#8221; Attendees got to know about the strategies, best practices, and the transformative potential of BYOD for modern organizations.<br \/>\n<center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/BYOD-and-the-Agile-Workforce-Ilias-Mavropoulos-e1695388648403.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/BYOD-and-the-Agile-Workforce-Ilias-Mavropoulos-e1695388648403.png\" alt=\"BYOD and the Agile Workforce \u2013 Ilias Mavropoulos\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">10:00 am CST 22\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>The Hackable method<\/b> <\/p>\n<p>Ted Harrington, Executive Partner of Independent Security Evaluators, delivered an informative presentation on the final day of HexCon23. We gained insights into how hackers discover exploitable vulnerabilities, common misconceptions about securing systems, and actions to enhance security. <\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">HexCon23 Day 3 has commenced with an exciting start! Get ready and tune in now for a day packed with knowledge-rich sessions and networking opportunities!<\/p>\n<p>Here&#39;s a sneak peek at the sessions happening soon:<\/p>\n<p>&mdash; Hexnode (@thehexnode) <a href=\"https:\/\/twitter.com\/thehexnode\/status\/1705235539027533926?ref_src=twsrc%5Etfw\">September 22, 2023<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">3:45 am CST 22\/09\/2023<\/span><\/b> <\/p>\n<p>Check out the agenda for day 3 of HexCon23:<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">As we journey through this three-day event, we&#39;re gearing up for the last day, packed with various captivating sessions in cybersecurity, such as IAM, 5G security, cloud security, and many more!<\/p>\n<p>Check out our Day 3 agenda and tune into the sessions! <a href=\"https:\/\/t.co\/prjYSoOa1z\">https:\/\/t.co\/prjYSoOa1z<\/a>. <a href=\"https:\/\/t.co\/LP0Xh5YDPA\">pic.twitter.com\/LP0Xh5YDPA<\/a><\/p>\n<p>&mdash; Hexnode (@thehexnode) <a href=\"https:\/\/twitter.com\/thehexnode\/status\/1705135142929305718?ref_src=twsrc%5Etfw\">September 22, 2023<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">4:00 pm CST 21\/09\/2023<\/span><\/b> <\/p>\n<p>And with that, our Day 2 comes to an end. Join us tomorrow for more exciting sessions.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">HexCon23 started off with a set of brilliant speakers spanning various industries who have shared important insights into the industry of cybersecurity, endpoint management, AI, etc.<\/p>\n<p>Check out these blogs for a brief recap! ?<\/p>\n<p>&mdash; Hexnode (@thehexnode) <a href=\"https:\/\/twitter.com\/thehexnode\/status\/1704963516653011100?ref_src=twsrc%5Etfw\">September 21, 2023<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">3:30 pm CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Papercuts: Stop the Bleed. Reducing information leakage from client-bound documentation<\/b> <\/p>\n<p>Kristine Sihto, Documentation Specialist at TinkerInk Pty Ltd, presented on &#8220;Stop the Bleed: Minimizing Information Leakage from Client-Bound Documentation.&#8221; In her session, she addressed the common places in documentation that may leak information about staff, internal processes, and other clients, and discussed the methods to reduce the incidence of information leakage.<br \/>\n<center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Papercuts.-Stop-the-bleed-Kristine-Sihto-e1695387545599.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Papercuts.-Stop-the-bleed-Kristine-Sihto-e1695387545599.png\" alt=\"Papercuts. Stop the bleed - Kristine Sihto\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">3:20 pm CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Phishing attack failed on Passwordless <\/b> <\/p>\n<p>Hieu Minh Ngo, a Threat Hunter at CyPeace, explored &#8220;Phishing Attack Failures with Passwordless.&#8221; Check out the session video and deepen your understanding of phishing and the vulnerabilities of traditional passwords, even in the presence of 2FA.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">3:00 pm CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>The Digital Identity Wallet &#8211; A user perspective<\/b> <\/p>\n<p>John Erik Setsaas, the Director of Innovation in Financial Crime Prevention at Tietoevry Banking, discussed &#8220;The Digital Identity Wallet: Insights from a User&#8217;s Perspective.&#8221; He explored the realm of Digital Identity Wallets and helped us gain valuable insights from a user&#8217;s perspective.<br \/>\n<center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/The-digital-identity-wallet-John-Erik-Setsaas-1-e1695387528923.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/The-digital-identity-wallet-John-Erik-Setsaas-1-e1695387528923.png\" alt=\"The digital identity wallet - John Erik Setsaas\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">2:30 pm CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Do Not Forget that Privacy is Fundamentally a Human Right and What that means for Compliance <\/b> <\/p>\n<p>Harvey Nusz and Ted Murphee, both Senior Risk and Compliance Engineers, engaged in a thought-provoking discussion on &#8220;Do Not Forget that Privacy is Fundamentally a Human Right and What that means for Compliance.&#8221; In this session, they also discussed how compliance with GDPR and other relevant legislation can set your company apart from your competitors.<br \/>\n<center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Do-not-forget-that-privacy-is-fundamentally-a-human-right-Harvey-Nusz-Ted-Murphree-e1695387512323.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Do-not-forget-that-privacy-is-fundamentally-a-human-right-Harvey-Nusz-Ted-Murphree-e1695387512323.png\" alt=\"Do not forget that privacy is fundamentally a human right - Harvey Nusz, Ted Murphree\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">2:25 pm CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>The Future of Cyber Security and the Rise of Intelligent Defense <\/b> <\/p>\n<p>Ben Kereopa-Yorke, a Senior Security Specialist at Telstra, explored &#8220;The Future of Cybersecurity and the Emergence of Intelligent Defense.&#8221; He gave an in-depth explanation on the transformative potential of AI in cybersecurity, gaining insights into its opportunities and challenges. This session revealed the intricacies of AI-driven protections and offer a glimpse into the future of a safer, smarter digital world.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">2:10 pm CST 21\/09\/2023 @Product training<\/span><\/b> <\/p>\n<p><b>Windows device management<\/b> <\/p>\n<p>Naveen, from the Product Consultant team at Hexnode explained all the details about Windows device management with Hexnode UEM.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">2:00 pm CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Don&#8217;t Let the Cloud Blindside You: How to Mitigate the Risks of Cloud Security in your organization<\/b> <\/p>\n<p>Ruchira Pokhriyal, a specialist in Cloud Security and Incident Response at Amazon Web Services, delivered a session on &#8220;Don\u2019t Let the Cloud Blindside You: How to Mitigate the Risks of Cloud Security in your organization.&#8221; In this session she explored the less talked about aspects of cloud security and also discussed the risks of data breaches, insider threats, and cloud misconfigurations.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">Live now: 1:50 pm CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>7 ways to frustrate attackers <\/b> <\/p>\n<p>Sean D. Goodwin, Senior Manager at DenSecure by Wolf &#038; Company, shared insights on &#8220;7 Ways to Frustrate Attackers.&#8221; Check out the video and learn about seven distinct approaches to frustrate attackers and bolster their security measures.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">1:25 pm CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Demystifying Zero Trust. Why it is a business imperative <\/b> <\/p>\n<p>Umar Carter, a Cyber Security Advisor at Optiv, presented on &#8220;Demystifying Zero Trust: Why it is a Business Imperative&#8221; at HexCon23. Attendees gained insights into the Zero Trust foundation, its core principles, and their significance in modern cybersecurity. <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">1:20 pm CST 21\/09\/2023 @Product training<\/span><\/b> <\/p>\n<p><b>Modern Mac management<\/b> <\/p>\n<p>Vladymir, Technical Implementation Engineer at Hexnode explained how to optimize modern Mac management by using the power of Hexnode UEM.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">1:20 pm CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Where security meets patient safety &#8211; Securing medical devices in healthcare <\/b> <\/p>\n<p>Jian Gong, Head of Cybersecurity and Technology Infrastructure at Better Therapeutics, shared insights on &#8220;Securing Medical Devices in Healthcare.&#8221; Attendees learned about the essential steps companies should take to ensure the security of medical devices used by patients across the United States.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">12:55 pm CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Software Supply Chain Security<\/b> <\/p>\n<p>Hanim Eken, a Cybersecurity Consultant, Penetration Tester, and Instructor, presented on &#8220;Software Supply Chain Security.&#8221; Attendees got to learn about the intricacies of securing the software supply chain, addressing concerns related to data loss, data breaches, and operational disruptions.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">12:50 pm CST 21\/09\/2023 @Hexnode expert<\/span><\/b> <\/p>\n<p><b>Essential Network Security Practices in the workplace <\/b> <\/p>\n<p>Devahuti Gogoi, our expert, conducted a session on &#8220;Essential Network Security Practices in the workplace.&#8221; Watch the session to gain insights into the importance of network security and the ever-evolving threat landscape. <\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">You shouldn\u2019t miss rest of today\u2019s HexCon23 sessions if you&#39;d like to learn about any of the following topics:<\/p>\n<p>\u2705 Supply chain security<br \/>\u2705 Healthcare security<br \/>\u2705 Infosec<br \/>\u2705 PAM (Privileged Access Management)<br \/>\u2705 Zero trust<br \/>\u2705 Cloud security<br \/>\u2705 Compliance<\/p>\n<p>Here are the speakers\u2026<\/p>\n<p>&mdash; Hexnode (@thehexnode) <a href=\"https:\/\/twitter.com\/thehexnode\/status\/1704911406032883800?ref_src=twsrc%5Etfw\">September 21, 2023<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">12:50 pm CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>PAM &#8211; More than Meets the Eye! <\/b> <\/p>\n<p>Marcus Wells, the CEO of WellSecured IT, presented on &#8220;Privileged Access Management (PAM): A Multifaceted Realm.&#8221; He gave his insights into the intricate dynamics between privileged and non-privileged access and the critical role that PAM plays within contemporary cybersecurity architecture.<br \/>\n<center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/PAM-More-than-meets-the-eye-Marcus-Wells-e1695387587359.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/PAM-More-than-meets-the-eye-Marcus-Wells-e1695387587359.png\" alt=\"PAM - More than meets the eye - Marcus Wells\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">12:20 pm CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Trending Cybersecurity Challenges in Logistics and Supply Chain Management <\/b> <\/p>\n<p>David Wallace, Managing Director at Precision Management Consultancy, WLL, presented on &#8220;Emerging Cybersecurity Challenges in Logistics and Supply Chain Management&#8221; at HexCon23. His in-depth understanding and experience in supply chain distributions, third-party risks, and other critical aspects in the field hugely benefited the attendees.<br \/>\n<center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Trending-cyber-security-challenges-David-Wallace-e1695387602306.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Trending-cyber-security-challenges-David-Wallace-e1695387602306.png\" alt=\"Trending cyber security challenges - David Wallace\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">12:15 pm CST 21\/09\/2023 @Hexnode expert<\/span><\/b> <\/p>\n<p><b>Email security<\/b> <\/p>\n<p>Aditya Sarma, our Hexnode expert, conducted a session on &#8216;Email Security,&#8217; focusing on best practices for safeguarding digital communications and protecting sensitive organizational information.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">12:15 pm CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Identity is the new perimeter<\/b> <\/p>\n<p>Andrew Chanthaphone, CEO of ALL THINGS IDENTITY, discussed &#8216;Identity is the New Perimeter.&#8217; We learned how the proliferation of cloud services, mobile devices, and IoT devices has transformed the security landscape, making identity a critical component in safeguarding sensitive data and assets.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">11:50 am CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Fortifying Financial Futures: Cybersecurity in the financial industry<\/b> <\/p>\n<p>G.M. Faruk Ahmed, Senior Principal Officer at Rupali Bank Limited, presented on &#8220;Strengthening Financial Futures: Cybersecurity in the Financial Industry&#8221; at HexCon23. Attendees gained a comprehensive understanding of the changing challenges, industry best practices, and innovative solutions in the cybersecurity landscape within the financial sector.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">11:45 am CST 21\/09\/2023 @Hexnode expert<\/span><\/b> <\/p>\n<p><b>Generative AI for enterprises: Do&#8217;s and don&#8217;ts <\/b> <\/p>\n<p>Edwin Jerald led a session on &#8220;Generative AI for Enterprises: Do&#8217;s and Don&#8217;ts.&#8221; Attendees learned about the efficient integration of generative AI into organizations.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">11:45 am CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>The Rise of Vulnerabilities, Exploitation and Intelligence <\/b> <\/p>\n<p>Patrick Garrity, Security Research and VP at Nucleus, delivered an enlightening session on &#8220;Vulnerabilities, Exploitation, and Intelligence.&#8221; Attendees gained valuable insights into the rising challenges related to software vulnerabilities, exploitation, and vulnerability intelligence. Patrick shared vulnerability research and data visualizations to help enterprise organizations tackle the complex landscape of vulnerability management.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">11:25 am CST 21\/09\/2023 @Hexnode expert<\/span><\/b> <\/p>\n<p><b>The new digital normal: Cybersecurity <\/b> <\/p>\n<p>Anju, our Hexnode expert, spoke on &#8220;The New Digital Normal: Cybersecurity.&#8221; Viewers learnt adapting and strengthening digital defenses in the rapidly changing cybersecurity landscape.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">11:15 am CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Cybersecurity in Digital Healthcare Sector <\/b> <\/p>\n<p>Dr. Thomas Matheus, Chief Operating Officer at Cystel, conducted a session on &#8220;Cybersecurity in Digital Healthcare Sector.&#8221; Attendees delved into the complexities of cybersecurity within the healthcare sector, gaining valuable insights.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">11:10 am CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Zero Trust as the foundation of Cybersecurity and Privacy<\/b> <\/p>\n<p>Alex Sharpe, Managing Director at Sharpe42, conducted a session on &#8220;Demystifying Standards, Revisions, Laws, and Regulations.&#8221; We gained insights into the consistent themes that cut across various standards, revisions, laws, and regulations, helping them navigate this ever-evolving landscape.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">11:00 am CST 21\/09\/2023 @Hexnode expert<\/span><\/b> <\/p>\n<p><b>Agentless device management<\/b> <\/p>\n<p>Shyam Prasad, our Hexnode expert, conducted a session on &#8220;Agentless Device Management.&#8221; Attendees learned about an efficient approach to overseeing and controlling networked assets without the need for agents.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">10:40 am CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Zero Trust \u2013 The Art of Trusting No One<\/b> <\/p>\n<p>Gerald J. Caron, CIO for the International Trade Administration, conducted a session on &#8220;Zero Trust \u2013 The Art of Trusting No One.&#8221; Attendees delved into how the principles of Zero Trust can provide a foundational approach, freeing them to focus on the specific details.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">10:35 am CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Security Threats \u2013 Cyber Crime &#038; Protecting Your Business. <\/b> <\/p>\n<p>Charlie McMurdie, the former head of the police national crime unit, delivered a session on &#8220;Security Threats: Cyber Crime and Safeguarding Your Business.&#8221; Attendees received insights on the latest criminal trends and engaged in discussions about physical security threats related to People, Premises, and Products (the 3 P\u2019s).<br \/>\n<center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Security-Threats-Charlie-McMurdie-e1695387562812.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Security-Threats-Charlie-McMurdie-e1695387562812.png\" alt=\"Security Threats - Charlie McMurdie\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">10:10 am CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>The Dynamic Duo: When Russian and Western Cybercriminals Combine <\/b> <\/p>\n<p>Will Thomas, a Cyber Threat Intelligence (CTI) Researcher at the Equinix Threat Analysis Center (ETAC), presented on &#8220;The Dynamic Duo: When Russian and Western Cybercriminals Combine.&#8221; Attendees gained insights into the consequences of collaboration between Russian and Western cybercriminals in the world of cybercrime.<br \/>\n<center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/The-dynamic-duo-Will-Thomas-e1695387574334.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/The-dynamic-duo-Will-Thomas-e1695387574334.png\" alt=\"The dynamic duo - Will Thomas\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">10:00 am CST 21\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Inside an Elite Hacking Organization: LAPSUS$<\/b> <\/p>\n<p>Bryan Seeley, a Cybersecurity Expert and Ethical Hacker, presented an informative session on &#8220;LAPSUS$: An Elite Hacking Organization.&#8221; Attendees gained insights into the hacking techniques used by LAPSUS$, one of the most notorious hacking groups in the world and learned about the preventive measures against similar groups. <\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">HexCon23 Day 2 sessions have started with Bryan Seely (<a href=\"https:\/\/twitter.com\/bryanthemapsguy?ref_src=twsrc%5Etfw\">@bryanthemapsguy<\/a>) on Track 1 and Will Thomas (<a href=\"https:\/\/twitter.com\/BushidoToken?ref_src=twsrc%5Etfw\">@BushidoToken<\/a>) on Track 2! <\/p>\n<p>We have some interesting sessions lined up for today ?<\/p>\n<p>&mdash; Hexnode (@thehexnode) <a href=\"https:\/\/twitter.com\/thehexnode\/status\/1704873381559173270?ref_src=twsrc%5Etfw\">September 21, 2023<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">3:45 am CST 21\/09\/2023<\/span><\/b> <\/p>\n<p>Here\u2019s what&#8217;s cooking for day 2!  <\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">We had a fantastic start to HexCon23 with some knowledge-packed sessions from industry experts. And we have much more for you to experience today and tomorrow.<\/p>\n<p>Take a sneak peek at what&#39;s in store for HexCon23 Day 2!<\/p>\n<p>Register now and become a part of the biggest\u2026 <a href=\"https:\/\/t.co\/Vfhjd5MFfj\">pic.twitter.com\/Vfhjd5MFfj<\/a><\/p>\n<p>&mdash; Hexnode (@thehexnode) <a href=\"https:\/\/twitter.com\/thehexnode\/status\/1704779750110044309?ref_src=twsrc%5Etfw\">September 21, 2023<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">4:00 pm CST 20\/09\/2023<\/span><\/b> <\/p>\n<p>We hope that you had a informative and exciting day 1. Stay tuned for more on day 2!\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">3:15 pm CST 20\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Navigating EDRs: Unveiling Common Pitfalls in Configuration and Management<\/b> <\/p>\n<p>Partha Alwar and Ann Romer, Directors at Stroz Friedberg, an Aon company, discussed common missteps encountered during the implementation of Endpoint Detection and Response (EDR) software in their session, &#8220;Navigating EDRs: Unveiling Common Pitfalls in Configuration and Management.&#8221; Attendees gained insights into the nuances of misconfigurations and management challenges that can compromise robust defense mechanisms.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">3:00 pm CST 20\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Unleashing the power of Artificial Intelligence for OSINT<\/b> <\/p>\n<p>David Pereira, CEO of SecPro Security Professionals, delved into the potential of AI to streamline processes like web scraping, repetitive tasks, image enhancement, and more in his session, &#8220;Unleashing the Power of Artificial Intelligence for Open-Source Intelligence (OSINT).&#8221; Attendees got to know about the different capabilities of AI in the realm of open-source intelligence.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">2:50 pm CST 20\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>You are the weakest link!<\/b> <\/p>\n<p>Danni Brooke, Co-Director at Fortalice Solutions LLC, addressed the critical issue of human errors in cybersecurity at HexCon23. Attendees learned about the significant role human factors play in cyberattacks and their potential consequences for organizations.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">2:25 pm CST 20\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Building a Secure Future with AI: The Role of Privacy-Enhancing Technology<\/b> <\/p>\n<p>Nikhil Agarwal, Senior Architect at Fortanix, presented &#8220;Building a Secure Future with AI: The Role of Privacy-Enhancing Technology.&#8221; Attendees learned about the symbiotic relationship between AI and privacy-enhancing technology, with a focus on their role in shaping a secure future.<br \/>\n<center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Building-a-secure-future-with-AI-Nikhil-Agarwal.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Building-a-secure-future-with-AI-Nikhil-Agarwal.png\" alt=\"Building a secure future with AI-Nikhil Agarwal\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">2:05 pm CST 20\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Dude, Where&#8217;s My Domain Admins? <\/b> <\/p>\n<p>Joel M Leo, InfoSec Architect at GAP, delivered an engaging talk titled &#8220;Dude, Where\u2019s My Domain Admins?&#8221; Attendees delved into strategies for preventing active directory exploitation.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">1:40 pm CST 20\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>AI \/ ML use cases in Cybersecurity<\/b> <\/p>\n<p>Samuel Mbonu, President at ISC2 Nigeria Chapter, led a captivating session on &#8220;AI\/ML Use Cases in Cybersecurity.&#8221; He also talked about the relevance of AI and ML in addressing recent challenges in the cybersecurity space.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">1:35 pm CST 20\/09\/2023 @Product training<\/span><\/b> <\/p>\n<p><b>iOS device management<\/b> <\/p>\n<p>Christy, Lead Product Consultant at Hexnode explained all there is to iOS device management with Hexnode UEM.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">1:25 pm CST 20\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Sneaky Defense Evasion. Windows 11 security bypassed<\/b> <\/p>\n<p>Sergey Chubarov, a security and cloud expert and Microsoft instructor, delivered a talk on &#8220;Sneaky Defense Evasion &#8211; Windows 11 Security Bypassed.&#8221; He explained why mastering evasion techniques is crucial for defenders to keep up with threat actors in the ever-evolving cybersecurity landscape.<br \/>\n<center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Sneaky-defense-evasion-Sergey-Chubarov-e1695387396881.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Sneaky-defense-evasion-Sergey-Chubarov-e1695387396881.png\" alt=\"Sneaky Defense Evasion \u2013 Sergey Chubarov\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">1:10 pm CST 20\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Privacy and Generative AI: Navigating Risks, Building the Future<\/b> <\/p>\n<p>Kara Larson, Assistant General Counsel &#8211; Privacy &#038; Compliance at 6sense, and Mae Beth, Senior Manager, Global Privacy and Information Management\/Deputy Chief Privacy Officer at Northrop Grumman, presented on &#8220;Navigating Risks and Pioneering the Future of Privacy in Generative AI.&#8221; The discussion covered privacy risks, strategies to mitigate privacy threats in AI training and deployment, and the future of privacy in generative AI, including regulation and ethical considerations.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">An amazing lineup of speaker sessions will be streaming soon! <\/p>\n<p>These insightful sessions will cover topics in cybersecurity, endpoint detection &amp; response, and more in AI and security.<\/p>\n<p>Register now and join these sessions! &gt;&gt;&gt; <a href=\"https:\/\/t.co\/qywtDQ540U\">https:\/\/t.co\/qywtDQ540U<\/a><\/p>\n<p>&mdash; Hexnode (@thehexnode) <a href=\"https:\/\/twitter.com\/thehexnode\/status\/1704553961913729409?ref_src=twsrc%5Etfw\">September 20, 2023<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">12:55 pm CST 20\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Securing the Remote Workforce: Safeguarding Endpoints in the New Normal <\/b> <\/p>\n<p>Korede Ola, a distinguished cybersecurity engineer and speaker, delved into the thrilling world of safeguarding endpoints in our new normal. The audience discovered cutting-edge strategies, innovative technologies, and actionable insights to fortify their organizations against cyber threats in the age of remote work.<br \/>\n<center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Securing-the-remote-workforce-Korede-Ola-e1695387382808.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Securing-the-remote-workforce-Korede-Ola-e1695387382808.png\" alt=\"Securing the remote workforce - Korede Ola\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">12:45 pm CST 20\/09\/2023 @Product training<\/span><\/b> <\/p>\n<p><b>Android device management<\/b> <\/p>\n<p>Sandra from Hexnode&#8217;s Product Consultant team provided valuable insights on optimizing Hexnode for efficient enterprise Android device management.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">12:40 pm CST 20\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>How to Optimize Security Operations by using Automation<\/b> <\/p>\n<p>Michael Gregg&#8217;s session addressed leveraging automation for advanced security. Attendees learned how to optimize security operations through automation in a time of decreasing budgets. Michael Gregg shared his experience in growing his state&#8217;s cyber coverage from 25,000 to 250,000 endpoints, optimizing SOC operations, and embracing AI to increase efficiencies and improve response times while reducing costs.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">12:30 pm CST 20\/09\/2023 @Hexnode expert<\/span><\/b> <\/p>\n<p><b>SaaSops\/SaaS management: What the enterprises overlook<\/b> <\/p>\n<p>In an expert session led by Jiby Joseph, attendees delved into the often underestimated realm of SaaS operations and management. He uncovered critical aspects that enterprises frequently overlook, gaining invaluable insights into optimizing the SaaS ecosystem for enhanced efficiency and cost-effectiveness.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">12:20 pm CST 20\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Cybersecurity Unplugged: A Fireside Chat with Rinki Sethi on Cybersecurity&#8217;s Evolution and Future<\/b> <\/p>\n<p>In an inspiring session, Rinki Sethi unveiled her extraordinary path as a CISO and her steadfast commitment to advancing diversity and inclusion in the tech and cybersecurity domains.<br \/>\n<center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Cyber-security-unplugged-Rinki-sethi-e1695387345717.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Cyber-security-unplugged-Rinki-sethi-e1695387345717.png\" alt=\"Cyber security unplugged - Rinki sethi\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">12:05 pm CST 20\/09\/2023 @Hexnode expert<\/span><\/b> <\/p>\n<p><b>The evolution of workplace: From digital security to employee experience<\/b> <\/p>\n<p>In a recent session, Hexnode expert Aiswarya Baby discussed the evolution of the workplace. The emphasis is moving from strict security to improving the employee experience. Attendees learned how to create a safe and enjoyable digital-era workplace, contributing to shaping the future of work.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">12:05 pm CST 20\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Is Artificial Intelligence the Next Threat or Savior (or both) for Ransomware Victims?<\/b> <\/p>\n<p>Mark A. Houpt, Chief Information Security Officer at DataBank, discussed AI&#8217;s impact on ransomware in his session. AI tools aid in detecting and defending against ransomware, but they are also used by malicious actors to enhance attacks. Mark explored the question &#8220;Is Artificial Intelligence the Next Threat or Savior (or both) for Ransomware Victims?&#8221; and provided insights into using AI for defense against present and future threats.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">11:50 am CST 20\/09\/2023 @Hexnode expert<\/span><\/b> <\/p>\n<p><b>The world of Android in the workplace <\/b> <\/p>\n<p>Our Hexnode expert, Noel, delved into the influence of Android on the modern workspace. He highlighted the opportunities it brings for productivity, innovation, and collaboration. This session provided insights into the transformative potential of the Android ecosystem in the corporate realm, keeping you ahead in the mobile-focused workplaces of tomorrow.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">11:45 am CST 20\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Secure Active Directory Operations in Untrusted Regions<\/b> <\/p>\n<p>James Potter, CEO of DSE, discussed the security risks faced by Fortune 1000 companies operating in China due to insecure Active Directory designs in his session, &#8220;Secure Active Directory Operations in Untrusted Regions.&#8221; Attendees learned about the CCP&#8217;s potential exploitation of existing architectural models and the creation of a new, secure architecture. The discussion also covered implications for security and operability, including administrative centralization and bastion forest implementations.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">11:30 am CST 20\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Evolving with AI: Adapting Today&#8217;s Cybersecurity Teams for the Future<\/b> <\/p>\n<p>George Kamide, a Technology Strategist and Co-host of Bare Knuckles and Brass Tacks, discussed the transformation of cybersecurity teams in the age of AI. His talk, &#8220;Evolving with AI: Adapting Today&#8217;s Cybersecurity Teams for the Future,&#8221; was aimed to equip security teams with insights into the current AI security landscape and strategies to influence and lead their organizations as we transition into an era of AI-driven cybersecurity risks and defenses.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">11:20 am CST 20\/09\/2023 @Hexnode expert<\/span><\/b> <\/p>\n<p><b>How Apple revolutionised the workplace<\/b> <\/p>\n<p>Hexnode expert Aneetha Thompson shared insights about how Apple is reshaping the workplace. She provided a detailed look into Apple Device Management and demonstrated how Apple is improving the workplace, making it more creative and efficient.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">11:15 am CST 20\/09\/2023 @Industry speaker<\/span><\/b><\/p>\n<p><b>Why Apple will be the number 1 enterprise endpoint by 2030 and how your team can prepare<\/b> <\/p>\n<p>In a recent session at HexCon23, Bradley Chambers, a freelance writer at 9-5 Mac, explored the trend of multinational corporations (MNCs) leaning towards Apple. He discussed the factors behind Apple&#8217;s potential to become the leading choice for enterprise endpoints by 2030 and provided guidance on how teams can prepare for this shift.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">11:00 am CST 20\/09\/2023 @Hexnode expert<\/span><\/b> <\/p>\n<p><b>Modern Windows management<\/b> <\/p>\n<p>Anand Krishnan, Hexnode\u2019s expert shared valuable insights about Modern Windows Management in his presentation. He made it easy to grasp how the old-fashioned and modern approaches to handling Windows systems differ.\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">11:00 am CST 20\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>The Foundation of Digital Trust: Public Key Infrastructure <\/b> <\/p>\n<p>Mike Nelson, Global VP of Digital Trust at Digicert, in his session at HexCon23 explained the fundamentals of securing all your digital services. He also highlighted how PKI and digital certificates and signatures can be used to secure the digital world.<br \/>\n<center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/The-foundation-of-digital-trust-Mike-Nelson-e1695387327517.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/The-foundation-of-digital-trust-Mike-Nelson-e1695387327517.png\" alt=\" The foundation of digital trust - Mike Nelson\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">10:45 am CST 20\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>The Endpoint Security Market: A complete picture<\/b> <\/p>\n<p>In a recent session, Richard Stiennon, the Chief Research Analyst at IT-Harvest, shared his knowledge about the &#8220;Endpoint Security Market.&#8221; He explained how people protect their computers, using information about over 3,500 cybersecurity companies. Even though many companies have come together in recent years, there are still 257 companies in 35 countries making security products for computers. Stiennon didn&#8217;t just talk about the market; he also looked at what makes it grow. With new computer threats, new ways to attack, new people causing trouble, and more and more devices being used, there is always a need for ways to keep our computers safe. This session gave us a good look at the latest trends in computer security!<br \/>\n<center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/The-endpoint-security-market-Richard-Steinnon-e1695387308509.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/The-endpoint-security-market-Richard-Steinnon-e1695387308509.png\" alt=\"The Endpoint Security Market \u2013 Richard Steinnon\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">10:20 am CST 20\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Securing the Future: The Intersection of Security and AI <\/b> <\/p>\n<p>In a captivating session at HexCon23, we explored the synergy between AI and cybersecurity. A panel of experts unveiled the latest breakthroughs in AI-driven threat detection, privacy preservation, and data protection. Attendees gained invaluable insights into combatting cyber threats and preserving data integrity. <\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">At HexCon23, we have an exciting lineup of sessions ready for you! <\/p>\n<p>Head over to Track 1 for sessions on endpoint security and cybersecurity. <\/p>\n<p>And, Track 2 is packed with sessions related to AI in cybersecurity. <\/p>\n<p>Here are the session details that are happening soon:<\/p>\n<p>&mdash; Hexnode (@thehexnode) <a href=\"https:\/\/twitter.com\/thehexnode\/status\/1704515649241010373?ref_src=twsrc%5Etfw\">September 20, 2023<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">10:15 am CST 20\/09\/2023 @Industry speaker<\/span><\/b> <\/p>\n<p><b>Align Your Endpoint Security And Device Management To Reduce Internal IT Friction<\/b> <\/p>\n<p>Christopher Sherman, Principal Analyst at Coherent Strategies, discussed the significance of integrating security and management for team success and improving the endpoint user experience at HexCon23.<\/p>\n<p><center><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Align-your-endpoint-security-Christoper-Sherman-e1695387292283.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/Align-your-endpoint-security-Christoper-Sherman-e1695387292283.png\" alt=\"Align your endpoint security \u2013 Christopher Sherman\" width=\"682\" height=\"425\" \/><\/a><\/center>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b><span data-contrast=\"auto\">10:00 am CST 20\/09\/2023 @Opening Keynote <\/span><\/b> <\/p>\n<p><b>Championing growth<\/b> <\/p>\n<p>HexCon23 kicked off on a high note as our directors discussed Hexnode&#8217;s exciting roadmap for the future and shared the latest product updates and some exciting annoucements.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Welcome to HexCon23, the eagerly awaited Hexnode\u2019s 4th annual user conference &#8211; It&#39;s happening now! ?<\/p>\n<p>Register now and join us on track 1 for the opening keynote delivered by the Hexnode leadership &gt;&gt;&gt; <a href=\"https:\/\/t.co\/qywtDQ540U\">https:\/\/t.co\/qywtDQ540U<\/a> <a href=\"https:\/\/t.co\/zh9rVza4ko\">pic.twitter.com\/zh9rVza4ko<\/a><\/p>\n<p>&mdash; Hexnode (@thehexnode) <a href=\"https:\/\/twitter.com\/thehexnode\/status\/1704510729771241582?ref_src=twsrc%5Etfw\">September 20, 2023<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The fourth edition of Hexnode\u2019s annual user conference is underway! Tune in for three whole days of informative and exciting sessions taken by experts in the industry. Missed out on any of the sessions? Fret not, we&#8217;re here to keep you in the loop. Skim away! <\/p>\n","protected":false},"author":40,"featured_media":26988,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4783],"tags":[5041,4478],"class_list":["post-26895","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events","tag-hexnode-partner-summit","tag-hexcon","tab_group-inside-hexnode"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>HexCon23 - As it happened<\/title>\n<meta name=\"description\" content=\"HexCon23 is live now! Don&#039;t miss the chance to catch a glimpse of everything unfolding at the 4th annual user conference hosted by Hexnode.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HexCon23 - As it happened\" \/>\n<meta property=\"og:description\" content=\"HexCon23 is live now! Don&#039;t miss the chance to catch a glimpse of everything unfolding at the 4th annual user conference hosted by Hexnode.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/\" \/>\n<meta property=\"og:site_name\" content=\"Hexnode Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-20T10:07:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-08T02:51:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/21023217\/HexCon23-As-it-happened.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"688\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Brendon Baxter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brendon Baxter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"26 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/\",\"name\":\"HexCon23 - As it happened\",\"isPartOf\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/HexCon23-As-it-happened.png?format=webp\",\"datePublished\":\"2023-09-20T10:07:12+00:00\",\"dateModified\":\"2023-12-08T02:51:33+00:00\",\"author\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/5cfa4a4b041843bf9889a5654b8e4a0f\"},\"description\":\"HexCon23 is live now! Don't miss the chance to catch a glimpse of everything unfolding at the 4th annual user conference hosted by Hexnode.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/#primaryimage\",\"url\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/HexCon23-As-it-happened.png?format=webp\",\"contentUrl\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/HexCon23-As-it-happened.png?format=webp\",\"width\":1280,\"height\":688,\"caption\":\"HexCon23 - As it happened\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hexnode.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HexCon23 &#8211; As it happened\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#website\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/\",\"name\":\"Hexnode Blogs\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hexnode.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/5cfa4a4b041843bf9889a5654b8e4a0f\",\"name\":\"Brendon Baxter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/246098ab8d22d47d44ab666c27cdd00e422a46c73dcdd199086bba99602277ff?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/246098ab8d22d47d44ab666c27cdd00e422a46c73dcdd199086bba99602277ff?s=96&d=mm&r=g\",\"caption\":\"Brendon Baxter\"},\"description\":\"Product Evangelist@Hexnode. Read. Write. Sleep. Repeat.\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/author\/brendon-baxter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HexCon23 - As it happened","description":"HexCon23 is live now! Don't miss the chance to catch a glimpse of everything unfolding at the 4th annual user conference hosted by Hexnode.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/","og_locale":"en_US","og_type":"article","og_title":"HexCon23 - As it happened","og_description":"HexCon23 is live now! Don't miss the chance to catch a glimpse of everything unfolding at the 4th annual user conference hosted by Hexnode.","og_url":"https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/","og_site_name":"Hexnode Blogs","article_published_time":"2023-09-20T10:07:12+00:00","article_modified_time":"2023-12-08T02:51:33+00:00","og_image":[{"width":1280,"height":688,"url":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/21023217\/HexCon23-As-it-happened.png","type":"image\/png"}],"author":"Brendon Baxter","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Brendon Baxter","Est. reading time":"26 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/","url":"https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/","name":"HexCon23 - As it happened","isPartOf":{"@id":"https:\/\/www.hexnode.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/#primaryimage"},"image":{"@id":"https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/HexCon23-As-it-happened.png?format=webp","datePublished":"2023-09-20T10:07:12+00:00","dateModified":"2023-12-08T02:51:33+00:00","author":{"@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/5cfa4a4b041843bf9889a5654b8e4a0f"},"description":"HexCon23 is live now! Don't miss the chance to catch a glimpse of everything unfolding at the 4th annual user conference hosted by Hexnode.","breadcrumb":{"@id":"https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/#primaryimage","url":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/HexCon23-As-it-happened.png?format=webp","contentUrl":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2023\/09\/HexCon23-As-it-happened.png?format=webp","width":1280,"height":688,"caption":"HexCon23 - As it happened"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hexnode.com\/blogs\/hexcon23-as-it-happened\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hexnode.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"HexCon23 &#8211; As it happened"}]},{"@type":"WebSite","@id":"https:\/\/www.hexnode.com\/blogs\/#website","url":"https:\/\/www.hexnode.com\/blogs\/","name":"Hexnode Blogs","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hexnode.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/5cfa4a4b041843bf9889a5654b8e4a0f","name":"Brendon Baxter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/246098ab8d22d47d44ab666c27cdd00e422a46c73dcdd199086bba99602277ff?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/246098ab8d22d47d44ab666c27cdd00e422a46c73dcdd199086bba99602277ff?s=96&d=mm&r=g","caption":"Brendon Baxter"},"description":"Product Evangelist@Hexnode. Read. Write. Sleep. Repeat.","url":"https:\/\/www.hexnode.com\/blogs\/author\/brendon-baxter\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/26895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/comments?post=26895"}],"version-history":[{"count":108,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/26895\/revisions"}],"predecessor-version":[{"id":27156,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/26895\/revisions\/27156"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/media\/26988"}],"wp:attachment":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/media?parent=26895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/categories?post=26895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/tags?post=26895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}