
Virtual Summit
Great Lakes
Virtual Cybersecurity Summit
Join the Great Lakes Virtual Cybersecurity Summit to hear from some of the industry’s leading experts from across the country, with a particular focus on the Great Lakes region. In this immersive, virtual environment, you will hear from industry experts on topics vital to keeping up with the ever-changing landscape of cybersecurity.
The live, interactive environment of the Great Lakes Virtual Cybersecurity Summit will allow you to interact with representatives from some of the world’s top cybersecurity solutions providers, as well as network with fellow cybersecurity professionals.
Take a look at all Data Connectors has to offer here!
Date
Thu. Aug 18
-
Featured Speakers
Neil Clauson
Protecting Against Cyber Attacks
Tim SavageProtecting Against Cyber Attacks
Grant AsplundProtecting Against Cyber Attacks
Richard MarcusProtecting Against Cyber Attacks
John FelkerCyber Inter-Agency Collaboration Panel
Kelley GoldblattCyber Inter-Agency Collaboration Panel
Joshua SeneyCyber Inter-Agency Collaboration Panel
Benjamin SimonCyber Inter-Agency Collaboration Panel
John FelkerCybersecurity Leadership Lessons, from Hawaii to Afghanistan
John FelkerCyber Executive Panel
Charles ParkerCyber Executive Panel
Todd LanguschCyber Executive Panel
William MangoldCyber Executive Panel
Arun DeSouzaCyber Executive Panel
Event Schedule
Times for this Event are in Eastern Time (EDT/EST).
The Summit will be open from 9:00 AM to 3:30 PM Thursday, August 18th.
- Welcome / Introductions
- Protecting Against Cyber Attacks 10:05 am
-
Do You Know Who Is on Your Endpoint? 10:50 am
In looking at the top attacks of the last few years, attackers take full advantage of users with excessive privileges and those who run without multi-factor authentication. To make matters worse, cyber insurance is beginning to come with waivers for those who work from home or cannot validate a device that is truly authenticated correctly to the correct user. Join to learn about:
– Importance of Least Privileges and MFA.
– Importance of truly identifying/authenticating users behind a login.
– Critical techniques to protect executive, high target, and administrative accounts.
– Insurance and compliance standards driving adoption.
Speaker:
-
Windows 11: Adapt Early or Follow Cautiously? 11:10 am
6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency.
Axel Peters from baramundi software will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? How does Microsoft’s latest OS affect endpoint management? And how will it affect endpoint security?
Speaker:
-
Cyber Inter-Agency Collaboration Panel 11:30 am
Moderator:
Panel Participants:
- Lunch Break
-
Cybersecurity Leadership Lessons, from Hawaii to Afghanistan 12:30 pm
If it’s not Illegal, immoral, or unethical – it’s on the table. John Felker led some of our nation’s largest and most important groups within consequential missions related to security, defense and protection. Pulling from his experiences at CISA, NCCIC, the US Coast Guard Cyber Command, and more, he will share with the Conference audience his most prescient takeaways from a lifetime of service, with a specific focus on cybersecurity.
Today, cybersecurity leaders are uniquely positioned to lead their peers and the organizations they serve as we are among the most sought-after, read-in, and connected executives in our respective firms. Patching together a depth of technical knowledge, Mr. Felker will focus on further developing information gathering practices, leadership style, and effective decision making in team-based environments that will embody your character as a leader and at the same time encourage the loyalty and compliance of staff at all levels.
Look for best practices on delegation, setting metrics, training, accountability, and building effective teams in this unique presentation from a monumental executive leader.
Speaker:
-
Demystifying Gen V Attacks: Ransomware, Nation State, and Supply Chain 1:30 pm
Over the US Independence Day weekend, the attack on IT management software firm Kaseya combined two of 2021’s most notorious cyber attack trends—supply chain attacks and ransomware. At least 1,000 businesses are said to have been affected by the attack, with victims identified in at least 17 countries. In May 2021, a major US fuel company fell victim to a ransomware attack which led to its entire fuel distribution pipeline being shut down while it investigated the problem, causing shortages across the East Coast of the United States and influencing oil prices globally. It wasn’t that long ago that ransomware didn’t even exist. How did we get to this point? And is there any way to stop this most popular trend in cybercrime before it’s too late? This session will address these phenomena and describe how organizations can remain protected against this growing global trend.
Speaker:
-
Evolving Your Organization’s Security Maturity 2:00 pm
Data protection, security maturity and regulatory compliance go hand in hand. A variety of initiatives can help teams align to best practices while building on their security maturity. Knowing what types of data you have, who has access to it and how it’s used provides data-driven evidence that better supports decision making and demonstrates to stakeholders and auditors that you’re taking appropriate steps to protect your business’s sensitive data – and the privacy of your customers.
This session will review:
- The NIST Cybersecurity Maturity Model and how it supports broader security strategy
- Sensitive data types and how they vary based on the nature of your business or the industry that you operate in
- Core security initiatives to achieve greater security maturity, whether you’re establishing your baseline or scaling your strategy
Speaker:
-
Cyber Executive Panel 2:35 pm
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Moderator:
Panel Participants:
- Summit Closing Session