Registration

Wed. Jun 16

Data Connectors events are for IT professionals only. Required fields are marked with an asterisk (*).

Event Schedule

Times for this Event are in Eastern Time (EDT/EST)

  • Breakfast Briefing: 8:35 am
  • Welcome/Introductions
  • Securing Active Directory to Defeat Attacker Lateral Movement 8:50 am

    Presented by Attivo Networks

    Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. A common tactic among most of these Ransomware and Advanced Threat Actors today involves leveraging Active Directory.  AD contains all of the information that an attacker needs to successfully move laterally and accomplish their mission.

    In this session Tom Atkins will explore a new method for securing Active Directory that can (for the first time) actually prevent an attacker from progressing laterally through your enterprise network.

    Some key highlights include:

    • How Threat Actors use AD to accomplish their goals
    • Why Monitoring Active Directory is not enough
    • What simple tools you can deploy to dramatically improve your security posture by better securing AD
    Click to Expand

    Panel Participants:

    Tom Atkins
    Tom Atkins

    Tom Atkins

    Regional Vice President

    Collapse This Item

  • How do you start a ML project? Finding the Breach with Infinity SOC 9:10 am

    Presented by Checkpoint

    What is Machine Learning? Can you decipher buzzwords such as Artificial Intelligence, machine or deep learning, and differentiate between hype and fake news? Cyber-attacks are more prevalent than ever in our world today, with exponential, every-increasing variance, velocity, and volume of threat campaigns. This presentation aims to hopefully enable you to understand what lies beneath the words “AI-powered cloud” or more precisely “data driven security”. 

    The Security Operations Center (SOC) is often all that stands between an organization and a potentially financially devastating data breach. However, 98% of SOC teams face significant challenges in their mission to detect and shut down attacks. For many SOC teams, finding malicious activity inside their network is like finding a needle in a haystack. They are often forced to translate information from across a multitude of monitoring solutions and navigate through tens of thousands of daily alerts. This is a crossroad where machine learning and security align to equip security analysts with relevant and actionable information to prevent and respond to threats in real time.

    Click to Expand

    Panel Participants:

    Elie Klein
    Elie Klein

    Elie Klein

    Security Engineer

    Collapse This Item

  • The Dark Web: Exposing the Business of Cybercrime 9:50 am

    Presented by Armor Defense

    The Dark Web is growing at an exponential rate, with hackers doubling down on cybercrime-as-a-service—allowing non-traditional and unskilled hackers to wreak havoc in ways previously unheard of. Criminals don’t have to be skilled to get your data;they just need to know where and who to go to for help. 

    This session aims to expose the inner workings and business of the cyber underground, focusing on the following: 

    • Cryptocurrency – The impact digital currency has had on the rate of growth of cybercrime
    • Cybercrime-as-a-service – The expansion of services offered by skilled hackers and for low cost
    • Money laundering and money mules – Ways criminals are skirting around laws and regulations to get paid
    • Mitigating risk – How businesses can protect themselves from all levels of cybercriminals with an emphasis on the importance of investing in proactive threat-hunting
    Click to Expand

    Panel Participants:

    Joone Nijjar
    Joone Nijjar

    Joone Nijjar

    Product Manager

    Collapse This Item

  • Moving Beyond Password to Delight & Secure Users 10:10 am

    Presented by Okta

    Passwords have been a constant throughout the internet era. As we’ve moved from desktops to smartphones, from on-premises infrastructure to cloud services, we’ve all relied on passwords to access and safeguard our data and resources across the applications we use on a daily basis.

    But in this new digital age where data breaches are rampant, passwords are no longer good enough. Not only are they insecure, they are expensive and offer a poor user experience. Fortunately, there’s a better way to protect your applications and stop account takeover incidents.

    In this session, we’ll discuss the benefits of passwordless authentication and explain how eliminating the password can help improve user experience, admin visibility and control, and scalability. We’ll also walk through key considerations and first steps as you embark on your passwordless journey.

    Click to Expand

    Panel Participants:

    Michael Patterson
    Michael Patterson

    Michael Patterson

    Solutions Engineer

    Collapse This Item

  • Expert Panel Discussion: User-Centric Security 10:30 am

    User-Centric Security

    Users, those carbon-based life forms usually roaming the halls of your buildings, are the last line of defense.  Data suggests that CEOs are ready to spend more money to contravene against attacks aimed at users. Training, tools, and education help – but what are we doing to make sure they are not the weakest link?

    Our Subject Matter Experts will look at the problem from multiple angles… Business Email Compromises (BEC)/Phishing and Account Takeover…  as well as Endpoint Security, Identity and Access Management, and Password (-less) solutions.  Attendees will understand the myriad of challenges from multiple perspectives, and different concepts on how to address.

    Click to Expand

    Panel Participants:

    Mandy Mckenzie
    Mandy Mckenzie

    Mandy Mckenzie

    Director of Product Management for Awareness Training

    Collapse This Item

  • Rethinking data protection in the age of ransomware 11:20 am

    Presented by Zerto

    With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Cyberattacks can cost a company $1.4 Million on average in recovery when you add in the cost of lost productivity, reputation damage, and service disruption. Are you at risk? Can your backup keep pace with the speed of recovery that’s needed today? Attend this session to find out why traditional backup won’t save you from ransomware attack and how continuous data protection helps you to prepare, respond and recover from an attack.

    Click to Expand

    Panel Participants:

    Andy Fernandez
    Andy Fernandez

    Andy Fernandez

    Senior Technology Evangelist

    Collapse This Item

  • Microsoft Teams Vulnerabilities 11:40 pm

    Presented by Avanan

    Microsoft Teams has quickly become the go-to application for remote work, accelerating dramatically in usage over the last year. Millions of users turned to Microsoft Teams to help keep businesses going in 2020—and hackers have noticed. As Teams is still relatively new, much is unknown about how it operates and how hackers will approach it. 

    While the increased usage has been well-documented, what’s not been documented is whether the app is vulnerable to hacking. We will talk about discoveries that have already been made, potential risks that we see in the future, and how to best secure this relatively new communication vector. 

    This session will walk attendees through: 

    • The many inherent vulnerabilities in the platform 
    • The popular attack types 
    • How hackers act differently within Teams than they do on email
    Click to Expand

    Panel Participants:

    Jeff Raymond
    Jeff Raymond

    Jeff Raymond

    Senior Solutions Engineer

    Collapse This Item

  • Lunch Break
  • Keynote: James Grant 12:25 pm

    Session Details Coming Soon

    Click to Expand

    Panel Participants:

    James J.W. Grant
    James J.W. Grant

    James J.W. Grant

    Chief Information Officer, State of Florida

    Collapse This Item

  • Establishing a Risk Culture in the Enterprise 1:05 pm

    Presented by Code42

    With data exposure events on the rise in 2021, CISOs everywhere are faced with the increasing challenges of instituting a successful insider risk strategy. Security needs to be moving at the speed of business where time to market and speed of innovation are critical outcomes. By attending this session, executive teams will learn how establishing a risk aware culture in the Enterprise can reduce the complexities of data security while promoting healthy collaboration

    Click to Expand

    Panel Participants:

    Tommy Todd
    Tommy Todd

    Tommy Todd

    Vice President of Security

    Collapse This Item

  • Why do Small Businesses Need Big Protection? 1:25 pm

    Presented by Duo Security

    As a Small and Medium Business (SMB), it’s easy to feel like some of the biggest cybersecurity challenges are aimed at large organizations.  The opposite is true. Small businesses face many of the same cybersecurity challenges as larger businesses: 66% experienced a cyberattack in 2019, and 63% experienced a data breach.

    Yet, 75% of SMBs know they need more security – and 41% say they worry about breaches from SaaS Apps, which they rely heavily on.  At the base of many of these challenges lies DNS Security.  DNS protection is easier to add, and more impactful on reducing overall threats than any other single upgrade that can be made to an average system.

    Rohit will discuss a simple, cloud-delivered security service that is cost-effective for a team of any size to deploy, use, and manage.

    Click to Expand

    Panel Participants:

    Rohit Sawhney
    Rohit Sawhney

    Rohit Sawhney

    Product Leader, Cloud Security

    Collapse This Item

  • Expert Panel Discussion: 2:00 pm

    Special Panel/TBD

    Session Details Coming Soon

    Click to Expand

    Collapse This Item

  • Why Office 365 Backup is ESSENTIAL 2:25 pm

    Presented by Veeam Software

    The role IT professionals play in a landscape where data loss, security breaches, and invasion of privacy are the new normal has never been more critical. With that spotlight comes great pressure to deliver on the organization’s expectations that data is safe, privacy is not compromised, productivity is unencumbered, and brand reputation is intact.

    Businesses are depending more and more on Microsoft Office 365 following their dynamic Digital Transformation. There’s something though they fail to realize and that is how important data backup is to guarantee business durability.

    Join Office 365 expert, Karinne Bessette, and Microsoft MVP, Rick Vanover, as they discuss WHY Office 365 Backup is Essential.  They will review the data security challenges organizations face in today’s computing landscape, by uncovering the gaps in the out-of-the-box security features found in Office 365, that require action to achieve an effective backup and recovery strategy.

    Click to Expand

    Panel Participants:

    Rick Vanover
    Rick Vanover

    Rick Vanover

    Senior Director, Product Strategy

    Karinne Bessette
    Karinne Bessette

    Karinne Bessette

    Global Technologist, Product Strategy

    Collapse This Item

  • The Rise of Secure Access Service Edge (SASE) 2:45 pm

    Presented by Bitglass

    Secure access service edge (SASE) offerings are cloud-delivered platforms that give consistent security across different applications, devices, web destinations, on-premises resources, and infrastructure. To achieve this, these platforms deliver a variety of functionality from complementary security solutions. As organizations operate in our frenetic business world, SASE becomes imperative. In this session, you will learn:

    • Why organizations need SASE
    • The key components of SASE offerings
    • How SASE architectures impact performance
    Click to Expand

    Panel Participants:

    Jacob Serpa
    Jacob Serpa

    Jacob Serpa

    Senior Product Manager

    Collapse This Item

  • Expert Panel Discussion: Defense in Depth 3:25 pm

    Defense in Depth: New Strategies for 2021

    Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations defending against inventive hackers penetrating their systems in 2020?  

    Click to Expand

    Collapse This Item

  • The exodus of endpoints: A journey of endpoints through hostile conditions 3:50 pm

    Presented by Manage Engine

    Learn how the recent pandemic drove the endpoint to scattered remoteness and brought about the convergence of management and security. Are we trading productivity for security? Join our session to know more.

    Click to Expand

    Panel Participants:

    Santhosh Narasimhamoorthy
    Santhosh Narasimhamoorthy

    Santhosh Narasimhamoorthy

    Technical Evangelist

    Collapse This Item

  • Subject Matter Expert Session - More Details To Come 4:10 pm
  • CISO Panel 4:25 pm

     

    Submit your bio for consideration to participate on our CISO Panel

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Jim Routh
    Jim Routh

    Jim Routh

    Former CISO - Virsec

    Collapse This Item

  • Summit Final closing Session
Register