
Conference
Detroit
Cybersecurity Conference
Join the Detroit Cybersecurity Conference to connect with your fellow cybersecurity professionals and industry experts for live, in-person sessions. Topic will range from cloud security to protecting your organization from advanced threat actors. You’ll hear from industry experts and luminaries, as well as representatives from some of the world’s top cybersecurity solutions providers.
Attendees will hear from insightful keynotes on vital security topics and learn the skills needed to stay ahead of cyber threats, all while networking with peers at the Detroit Cybersecurity Conference!
Take a look at all Data Connectors has to offer here!
-
Featured Speakers
John Felker
Cybersecurity Leadership Lessons, from Hawaii to Afghanistan
John FelkerCyber Inter-Agency Cooperation Panel
Joshua SeneyCyber Inter-Agency Cooperation Panel
Kelley GoldblattCyber Inter-Agency Cooperation Panel
Benjamin SimonCyber Inter-Agency Cooperation Panel
John FelkerCyber Executive Panel
Charles ParkerCyber Executive Panel
Todd LanguschCyber Executive Panel
William MangoldCyber Executive Panel
Arun DeSouzaCyber Executive Panel
Event Schedule
Times for this Event are in Eastern Time (EDT/EST).
The Conference will be open from 8:00 AM to 6:30 PM Thursday, August 4th.
- Welcome / Introductions
-
A New, Modern Way to Protect Data 9:30 am
The world of data backup and recovery has evolved with ransomware to highlight the need for a resiliency architecture that gives an organization the ability to quickly and reliably get back up and running after a cyber attack. This session will dive into how an attack (such as ransomware) unfolds and key considerations to give before, during and after so that the post-event recovery needs of the business can be achieved.
Speaker:
-
Demystifying Gen V Attacks: Ransomware, Nation State, and Supply Chain 9:50 am
Presented by Check Point Software Technologies
Over the US Independence Day weekend, the attack on IT management software firm Kaseya combined two of 2021’s most notorious cyber attack trends—supply chain attacks and ransomware. At least 1,000 businesses are said to have been affected by the attack, with victims identified in at least 17 countries. In May 2021, a major US fuel company fell victim to a ransomware attack which led to its entire fuel distribution pipeline being shut down while it investigated the problem, causing shortages across the East Coast of the United States and influencing oil prices globally. It wasn’t that long ago that ransomware didn’t even exist. How did we get to this point? And is there any way to stop this most popular trend in cybercrime before it’s too late? This session will address these phenomena and describe how organizations can remain protected against this growing global trend.
Speaker:
-
Malwarebytes 2022 Threat Review 10:45 am
The Malwarebytes 2022 Threat Review is an annual report highlighting internal threat research findings and trends. The report highlights top threats across operating systems, how privacy has shifted, and the ways cybercriminals and crimes are evolving, with the goal of giving readers the tools to make informed cyber protection decisions.
Speaker:
-
Protecting Against Cyber Attacks 11:05 am
We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.
Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.
Panel Participants:
- Lunch Break
-
Cybersecurity Leadership Lessons, from Hawaii to Afghanistan 12:10 pm
If it’s not Illegal, immoral, or unethical – it’s on the table. John Felker led some of our nation’s largest and most important groups within consequential missions related to security, defense and protection. Pulling from his experiences at CISA, NCCIC, the US Coast Guard Cyber Command, and more, he will share with the Conference audience his most prescient takeaways from a lifetime of service, with a specific focus on cybersecurity.
Today, cybersecurity leaders are uniquely positioned to lead their peers and the organizations they serve as we are among the most sought-after, read-in, and connected executives in our respective firms. Patching together a depth of technical knowledge, Mr. Felker will focus on further developing information gathering practices, leadership style, and effective decision making in team-based environments that will embody your character as a leader and at the same time encourage the loyalty and compliance of staff at all levels.
Look for best practices on delegation, setting metrics, training, accountability, and building effective teams in this unique presentation from a monumental executive leader.
Speaker:
-
Immutable Storage: Level-Up Your Ransomware Readiness 1:15 pm
Data is expected to grow to 200 ZB by the end of 2025. That means more data to manage, more data to protect. IDC now recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new “1” is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies allows for a resilient recovery plan – and it’s critical that your cyber security plan includes a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us for this do-not-miss discussion as we share best practices to help keep your data protected and secure via multiple layers of defense.
Speaker:
-
2022 Trends & Directions 1:35 pm
If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever.
Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion.
Panel Participants:
-
Securing Your Organization is Difficult 2:25 pm
Presented by Preferred Data Systems
The world is changing at an incredible pace, and we are in the middle of one of the greatest technological shifts of our lifetimes.
At PDS, we pay close attention to the research and real-world experiences from our customers, and we’ve identified three primary macro trends responsible for most problems our customers are trying to solve today:The first is Digital Transformation
• At the end of the day, every organization on the planet is undergoing some form of digital transformation. Organizations are being forced to figure out how to stay competitive, increase profitability, improve efficiency, and deliver an impactful experience to their own users or customers in order to stay relevant from either external competition or internal turnover.
• To make that more difficult, many of the workforces are remote, and data and applications are moving to the cloud at an incredible rate. The days of putting all your valuables and people behind the wall of your castle are over. There is a rapid decentralization taking place – The Perimeter has officially collapsed, and people, data, and applications are more distributed than ever.
That leads to our second shift of lack of Security Talent and Time
• This digital transformation taking place is also causing the technology world to become more siloed and fragmented every day, and many organizations are struggling to source enough expertise, resources, or time to enable and effectively secure their organizations digital transformation.
• Organizations’ resources and IT teams are spread way too thin and Hiring, training and retaining highly skilled security talent has never been harder. Having the talent to effectively deploy and manage solutions secure has never been harder.
Both of these combined with the never-ending security landscape make for a drastically changing world.
• And this is one of the most alarming parts, which is the threat landscape is expanding.
• Organizations are taxing all resources to protect against an infinite number of modernized attacks.
Speaker:
-
Do You Know Who Is on Your Endpoint? 2:45 pm
In looking at the top attacks of the last few years, attackers take full advantage of users with excessive privileges and those who run without multi-factor authentication. To make matters worse, cyber insurance is beginning to come with waivers for those who work from home or cannot validate a device that is truly authenticated correctly to the correct user. Join to learn about:
– Importance of Least Privileges and MFA.
– Importance of truly identifying/authenticating users behind a login.
– Critical techniques to protect executive, high target, and administrative accounts.
– Insurance and compliance standards driving adoption.
Speaker:
-
Cyber Inter-Agency Cooperation Panel 3:30 pm
Moderator:
Panel Participants:
-
Cyber Executive Panel 4:30 pm
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Moderator:
Panel Participants:
- Conference Closing Session 5:15 pm
- Happy Hour Networking Reception 5:20 pm
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners