• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (EDT/EST).

The Conference will be open from 8:00 AM to 6:30 PM Thursday, August 4th.

  • Welcome / Introductions
  • A New, Modern Way to Protect Data 9:30 am

    Presented by Pure Storage

    The world of data backup and recovery has evolved with ransomware to highlight the need for a resiliency architecture that gives an organization the ability to quickly and reliably get back up and running after a cyber attack. This session will dive into how an attack (such as ransomware) unfolds and key considerations to give before, during and after so that the post-event recovery needs of the business can be achieved.

    Click to Expand

    Speaker:

    Andy Stone
    Andy Stone

    Andy Stone

    CTO - Americas at Pure Storage

    Collapse This Item

  • Demystifying Gen V Attacks: Ransomware, Nation State, and Supply Chain 9:50 am

    Presented by Check Point Software Technologies

    Over the US Independence Day weekend, the attack on IT management software firm Kaseya combined two of 2021’s most notorious cyber attack trends—supply chain attacks and ransomware. At least 1,000 businesses are said to have been affected by the attack, with victims identified in at least 17 countries. In May 2021, a major US fuel company fell victim to a ransomware attack which led to its entire fuel distribution pipeline being shut down while it investigated the problem, causing shortages across the East Coast of the United States and influencing oil prices globally. It wasn’t that long ago that ransomware didn’t even exist. How did we get to this point? And is there any way to stop this most popular trend in cybercrime before it’s too late? This session will address these phenomena and describe how organizations can remain protected against this growing global trend.

    Click to Expand

    Speaker:

    Grant Asplund
    Grant Asplund

    Grant Asplund

    Growth Technologies Evangelist at Check Point Software Technologies

    Collapse This Item

  • Malwarebytes 2022 Threat Review 10:45 am

    Presented by Malwarebytes

    The Malwarebytes 2022 Threat Review is an annual report highlighting internal threat research findings and trends. The report highlights top threats across operating systems, how privacy has shifted, and the ways cybercriminals and crimes are evolving, with the goal of giving readers the tools to make informed cyber protection decisions.

    Click to Expand

    Speaker:

    Joshua Saham

    Joshua Saham

    Solutions Engineer at Malwarebytes

    Collapse This Item

  • Protecting Against Cyber Attacks 11:05 am

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    Click to Expand

    Panel Participants:

    Scott Greaux
    Scott Greaux

    Scott Greaux

    Vice President of Products at Net Abstraction

    Chris Hass
    Chris Hass

    Chris Hass

    Director of Information Security and Research at Automox

    Grant Asplund
    Grant Asplund

    Grant Asplund

    Growth Technologies Evangelist at Check Point Software Technologies

    Jason Miller
    Jason Miller

    Jason Miller

    Founder & CEO at BitLyft

    Collapse This Item

  • Lunch Break
  • Cybersecurity Leadership Lessons, from Hawaii to Afghanistan 12:10 pm

    If it’s not Illegal, immoral, or unethical – it’s on the table. John Felker led some of our nation’s largest and most important groups within consequential missions related to security, defense and protection. Pulling from his experiences at CISA, NCCIC, the US Coast Guard Cyber Command, and more, he will share with the Conference audience his most prescient takeaways from a lifetime of service, with a specific focus on cybersecurity.

    Today, cybersecurity leaders are uniquely positioned to lead their peers and the organizations they serve as we are among the most sought-after, read-in, and connected executives in our respective firms. Patching together a depth of technical knowledge, Mr. Felker will focus on further developing information gathering practices, leadership style, and effective decision making in team-based environments that will embody your character as a leader and at the same time encourage the loyalty and compliance of staff at all levels.

    Look for best practices on delegation, setting metrics, training, accountability, and building effective teams in this unique presentation from a monumental executive leader.

    Click to Expand

    Speaker:

    John Felker
    John Felker

    John Felker

    President at Morse Alpha Associates, Inc.

    Collapse This Item

  • Immutable Storage: Level-Up Your Ransomware Readiness 1:15 pm

    Presented by Arcserve

    Data is expected to grow to 200 ZB by the end of 2025. That means more data to manage, more data to protect. IDC now recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new “1” is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies allows for a resilient recovery plan – and it’s critical that your cyber security plan includes a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us for this do-not-miss discussion as we share best practices to help keep your data protected and secure via multiple layers of defense.

    Click to Expand

    Speaker:

    Shawn Massey
    Shawn Massey

    Shawn Massey

    VP, Principal Consulting at Arcserve

    Collapse This Item

  • 2022 Trends & Directions 1:35 pm

    If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever. 

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion. 

     

    Click to Expand

    Panel Participants:

    Brandon Reid
    Brandon Reid

    Brandon Reid

    Field Chief Technology Officer at Mimecast

    Kelly Comeaux
    Kelly Comeaux

    Kelly Comeaux

    President, Sr. Network Security Architect at Preferred Data Systems

    Michael Stewart
    Michael Stewart

    Michael Stewart

    Director at Array Networks

    Shawn Massey
    Shawn Massey

    Shawn Massey

    VP, Principal Consulting at Arcserve

    Collapse This Item

  • Securing Your Organization is Difficult 2:25 pm

    Presented by Preferred Data Systems

    The world is changing at an incredible pace, and we are in the middle of one of the greatest technological shifts of our lifetimes.
    At PDS, we pay close attention to the research and real-world experiences from our customers, and we’ve identified three primary macro trends responsible for most problems our customers are trying to solve today:

    The first is Digital Transformation

    • At the end of the day, every organization on the planet is undergoing some form of digital transformation. Organizations are being forced to figure out how to stay competitive, increase profitability, improve efficiency, and deliver an impactful experience to their own users or customers in order to stay relevant from either external competition or internal turnover.

    • To make that more difficult, many of the workforces are remote, and data and applications are moving to the cloud at an incredible rate. The days of putting all your valuables and people behind the wall of your castle are over. There is a rapid decentralization taking place – The Perimeter has officially collapsed, and people, data, and applications are more distributed than ever.

    That leads to our second shift of lack of Security Talent and Time

    • This digital transformation taking place is also causing the technology world to become more siloed and fragmented every day, and many organizations are struggling to source enough expertise, resources, or time to enable and effectively secure their organizations digital transformation.

    • Organizations’ resources and IT teams are spread way too thin and Hiring, training and retaining highly skilled security talent has never been harder. Having the talent to effectively deploy and manage solutions secure has never been harder.

    Both of these combined with the never-ending security landscape make for a drastically changing world.

    • And this is one of the most alarming parts, which is the threat landscape is expanding.

    • Organizations are taxing all resources to protect against an infinite number of modernized attacks.

     

    Click to Expand

    Speaker:

    Kelly Comeaux
    Kelly Comeaux

    Kelly Comeaux

    President, Sr. Network Security Architect at Preferred Data Systems

    Collapse This Item

  • Do You Know Who Is on Your Endpoint? 2:45 pm

    Presented by TypingDNA

    In looking at the top attacks of the last few years, attackers take full advantage of users with excessive privileges and those who run without multi-factor authentication. To make matters worse, cyber insurance is beginning to come with waivers for those who work from home or cannot validate a device that is truly authenticated correctly to the correct user. Join to learn about: 

    – Importance of Least Privileges and MFA. 

    – Importance of truly identifying/authenticating users behind a login. 

    – Critical techniques to protect executive, high target, and administrative accounts. 

    – Insurance and compliance standards driving adoption.

    Click to Expand

    Speaker:

    Tim Savage
    Tim Savage

    Tim Savage

    Top of Funnel Optimizer at Conceal

    Collapse This Item

  • Cyber Inter-Agency Cooperation Panel 3:30 pm

    Moderator:

    John Felker
    John Felker

    John Felker

    President at Morse Alpha Associates, Inc.

    Panel Participants:

    Joshua Seney
    Joshua Seney

    Joshua Seney

    Network Intrusion Forensics Analyst at US Secret Service

    Kelley Goldblatt
    Kelley Goldblatt

    Kelley Goldblatt

    Cybersecurity Advisor, Region 5: Michigan at Department of Homeland Security

    Benjamin Simon
    Benjamin Simon

    Benjamin Simon

    Special Agent at FBI, Detroit Field Office

    Collapse This Item

  • Cyber Executive Panel 4:30 pm

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Moderator:

    John Felker
    John Felker

    John Felker

    President at Morse Alpha Associates, Inc.

    Panel Participants:

    Charles Parker
    Charles Parker

    Charles Parker

    CISO at Genesee County

    Todd Langusch
    Todd Langusch

    Todd Langusch

    CISSP, CISM, Chief Information Security Officer at CIGL Consulting, Inc.

    William Mangold
    William Mangold

    William Mangold

    Information Technology and Security Manager at MCCA

    Arun DeSouza
    Arun DeSouza

    Arun DeSouza

    CISO & CPO at Nexteer Automotive Corporation

    Collapse This Item

  • Conference Closing Session 5:15 pm
  • Happy Hour Networking Reception 5:20 pm
Partners Register