Conference
Charlotte Cybersecurity Conference 2020
The Charlotte Cybersecurity Conference is the best way to connect with industry executives, innovative solutions providers, experts and luminaries. With a shared interest in security innovation in the region, attendees have the ability to connect and network with their peers.
Date
Thu. Feb 06
Event Schedule
-
Why Does Asset Management Matter for Cybersecurity? 9:00 am
Presented by Axonius
Today, security professionals encounter many cybersecurity asset management challenges, from aggregating disparate data sets to establishing real-time visibility in a fluid environment. Trends in emerging technologies, such as IoT deployments, and in workplace modernization, like BYOD, continue to complicate the situation. Enterprises have a wide range of security solutions at their disposal to help tackle security challenges, but few resources to manage them. In this session, you’ll discover 3 modern asset trends, learn from 5 real-life asset management challenges, and gain a 6-step checklist on how to successfully manage your company’s assets.
Speaker:
- Lightweight Deception, Heavyweight Results 9:30 am
- Break
-
Real Talk on Ransomware 10:30 am
Presented by Arcserve
We all know what ransomware is – we know the stats, we’ve seen the headlines, we’re all in the mindset of “if, not when.” With all the fear, uncertainty and doubt constantly bombarding IT professionals, we’ll dive into the realities of ransomware attacks and the real impacts on organizations. We offer participants an opportunity to “sound off” on ransomware and share experiences and challenges with your peers to better understand how prepared organizations are to defend against ransomware attacks.
Speaker:
-
How Hackers Bypass Office 365 Security: An Guide for the Uninitiated 11:00 am
Presented by Avanan
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
Speaker:
- Lunch Break
-
Cyber Security Advisor program 12:00 pm
Presented by United States Department of Homeland Security
Speaker:
- Dessert and Coffee Break
-
The Fear Factor: Reducing Risk in Your Environment 1:15 pm
Presented by Carolinas IT
Security is a top priority for organizations today. In this session, attendees will learn how to improve their organization’s security posture in the following ways:
- A clear understanding of the scare tactics organizations are facing from cyber criminals
- Threats and vulnerabilities that exist in their environment
- Steps organizations can take to minimize the risks of their organization’s employees
This session will help attendees to understand that fear should not be a factor in their approach to security.
Speaker:
-
Protection From Today’s Biggest Threats 1:45 pm
Presented by Sophos
In this session, we will cover some of today’s biggest threats, including Emotet and CryptoJacking. You’ll also learn how they attack, and what you can do to protect yourself. Many organizations already have the means to protect themselves, but are they using them properly? Are you doing the right things across your company?
Speaker:
- Break
-
Cyber Resilience 2:30 pm
Presented by Zerto
Rethinking your data protection strategy in the age of ransomware
Speaker:
-
How to Fight Modern Advanced Threats and Improve Your Cybersecurity Posture 3:00 pm
Presented by Arctic Wolf Networks, Cohesity
In this presentation, learn how to fight modern advanced threats and improve your cybersecurity posture. Topics to be covered include current challenges facing IT departments, types of advanced threats, and how to detect and respond to those threats. When it comes to security, you must take a proactive approach to minimize the damage that can be done.
Speakers:
- Networking / Happy Hour