
Conference
Raleigh – RTP
Cybersecurity Conference
Join your fellow cybersecurity professionals at the Raleigh – RTP Cybersecurity Conference to better help you navigate whatever cyber threats that 2022 may bring. Connect with your peers and industry experts for live, in-person sessions on topics ranging from cloud security, the future of ransomware, and protecting your organization from advanced threat actors.
At the Raleigh – RTP Cybersecurity Conference you will hear from industry experts and luminaries, law enforcement and government agencies, and representatives from some of the world’s top cybersecurity solutions providers. During this two-day conference, attendees will gain an extensive education on vital security topics, hear from insightful keynotes, and learn the skills needed to stay ahead of cyber threats, while earning CPE credits.
Take a look at all Data Connectors has to offer here!
Date
Wed. Feb 16 — Thu. Feb 17
Location
Sheraton Imperial Hotel Raleigh-Durham Airport at Research Triangle Park
4700 Emperor Blvd, I-40 at Exit 282
Durham, NC 27703
(919) 941-5050
Registration
Wed. Feb 16 — Thu. Feb 17
Registration for qualified senior cybersecurity professionals. Subject to approval.
-
Featured Speakers
Bobby Wells
Special Welcome from FBI SAC Bobby Wells
John FelkerKeynote - Cybersecurity Leadership Lessons, from Hawaii to Afghanistan
Scott DickinsonCyber Executive RoundTable
Devon AckermanCyber Executive RoundTable
Robert ReynoldsCyber Executive RoundTable
Carlota SageCyber Executive RoundTable
Anthony FoustCyber Executive RoundTable
Kip MonroeSpecial Welcome from the USSS
Jeff DantKeynote - Cyber Enabled Fraud: Understanding & Managing the Growing Threat
Greg MansonEmpowering Users To Be the Best Human Firewall in Your Organization
Scott DickinsonEmpowering Users To Be the Best Human Firewall in Your Organization
Carlota SageEmpowering Users To Be the Best Human Firewall in Your Organization
McClellan “Mac” PlihcikEmpowering Users To Be the Best Human Firewall in Your Organization
Devon AckermanKeynote - Incident Response & The Trickle Down Effect
Jessica NyeCyber Inter-Agency Cooperation Panel
Seth BarunCyber Inter-Agency Cooperation Panel
Carly SherrodCyber Inter-Agency Cooperation Panel
Sean McCloskeyCyber Inter-Agency Cooperation Panel
Thomas McGrathCyber Inter-Agency Cooperation Panel
McClellan “Mac” PlihcikCyber Inter-Agency Cooperation Panel
Scott ClarkCyber Inter-Agency Cooperation Panel
Event Schedule
Times for the Raleigh - RTP Cybersecurity Conference are in Eastern Time (EDT/EST).
The Conference will be open from 12:00 PM to 6:00 PM, February 16th and 8:00 AM to 6:00 PM, February 17th.
- DAY ONE
- Welcome to the Raleigh - RTP Cybersecurity Conference
- Special Welcome from FBI SAC Bobby Wells 12:10 pm
-
Getting It Just Right: Achieving Least Privilege in Cloud and Hybrid Environments 12:25 pm
Achieving Least Privilege has emerged as a critical goal for the modern enterprise. Getting Least Privilege right has always been a difficult task, and moving to the cloud has not made it any easier. Lock down too much and you can’t get business done. Lock down too little and see your corporate data up for sale to the highest bidder. This gets even more complicated in multi-cloud and hybrid environments, where access controls are fragmented and enforcing unified policies becomes extremely difficult.
Speaker:
-
Security Through Maturity: Assess and Improve your Cloud Infrastructure Security 12:50 pm
When securing your AWS, Azure or GCP environment, the stakes are high — and so may be your blood pressure! With so many different variables to consider when designing and implementing a security strategy, you need a clear framework for setting priorities and building a plan of action.
Best practices and compliance standards are a good first step. But they don’t give you a tool for assessing the maturity of your current cloud security practices and a roadmap for continuous improvement.
We created a modern framework that defines the key guidelines for a comprehensive cloud security strategy. It is lightweight and easy to understand and serves as a guide for prioritizing and implementing security controls and procedures in a way that will make stakeholders open to collaborating with you.
In this session you will learn how to:
-Gain a clear picture of where your organization currently stands on its path to a secure cloud environment
-Design a cloud security strategy for your enterprise with clear and practical milestones
-Create a common language between various stakeholders in your organization
-Leverage an automated solution to improve your securitySpeaker:
-
Defense in Depth: New Strategies for 2022 1:15 pm
The Internet of Things (IoT) poses entirely new challenges. With 35 billion IoT devices expected to be in operation over the next year – weak passwords, insecure network services and a lack of secure update mechanisms concern every organization.Â
In this panel discussion at the Raleigh – RTP Cybersecurity Conference, industry experts will dive into why is IoT Security so often overlooked, how the pandemic changed the way we look at IoT security, how additional security can add issues in terms of connectivity or updates and how to overcome and so much more.
Panel Participants:
-
Why SOCs Fail - The Maturity Model Required for Cyber Resilience 2:15 pm
Billions of dollars are spent annually to set up Security programs and operation centers across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are Security programs failing? Learn how the current operating model contributes to that failure and how a simple maturity model based on outcomes and use cases can make your organization more cyber resilient.
Key Learnings:
- Why an outcome-based approach is the only way to offer effective coverage and protection for your organization
- How the most successful Security programs use a comprehensive, strategic and end-to-end focused approach to address 95% of all operational issues at scale
- Why it is critical that Security programs become more use case-driven and full lifecycle workflow orientated
Speaker:
-
Artificial Intelligence: Friend or Foe in the Context of Ransomware 2:40 pm
The industrial revolution was powered by coal and steam. They were the power that enabled innovation and propelled the world down the road that has brought us to where we are today.
The next revolution is on the horizon, and it’s an information revolution. Smartphones, smart homes, and smart assistants are proliferating our lives. Artificial intelligence is becoming an integral contributor to how this technology adds value to our lives. The capabilities of the cyber security ecosystem must keep pace with this evolution.
During this session we will cover how artificial intelligence is being used to fuel the next generation of cyber security ecosystems. We will see how it can be used to improve accuracy, speed and efficiency of enforcement technologies while enhancing the information used to make business and security decisions.
On the other hand, how could AI & Machine Learning be used against us? If we have the technology, so do our adversaries.
Speaker:
-
Keynote - Cybersecurity Leadership Lessons, from Hawaii to Afghanistan 3:05 pm
If it’s not Illegal, immoral, or unethical – it’s on the table. John Felker led some of our nation’s largest and most important groups within consequential missions related to security, defense and protection. Pulling from his experiences at CISA, NCCIC, the US Coast Guard Cyber Command, and more, he will share with the Raleigh – RTP Cybersecurity Conference audience his most prescient takeaways from a lifetime of service, with a specific focus on cybersecurity.
Today, cybersecurity leaders are uniquely positioned to lead their peers and the organizations they serve as we are among the most sought-after, read-in, and connected executives in our respective firms. Patching together a depth of technical knowledge, Mr. Felker will focus on further developing information gathering practices, leadership style, and effective decision making in team-based environments that will embody your character as a leader and at the same time encourage the loyalty and compliance of staff at all levels.
Look for best practices on delegation, setting metrics, training, accountability, and building effective teams in this unique presentation from a monumental executive leader.
Speaker:
-
NC National Guard Cyber Security Response Force: Capabilities Brief 4:10 pm
In this short presentation, Seth Barun, Cyber/Mission Command Branch Chief will overview the capabilities and accomplishments of the Cyber Security Response Force (CSRF) over the past year, and highlight its goals for 2022 and beyond.
Speaker:
-
Cyber Executive RoundTable 4:25 pm
Submit your bio for consideration to participate on our Cyber Executive RoundTable
at the Raleigh – RTP Cybersecurity Conference to
[email protected] or fill out our Call for Speakers form here.
Panel Participants:
- Day One Closing Session 5:15 pm
- Happy Hour Reception 5:25 pm
- DAY TWO
- Welcome to the Raleigh - RTP Cybersecurity Conference
- Special Welcome from the USSS 9:15 am
-
Keynote - Cyber Enabled Fraud: Understanding & Managing the Growing Threat 9:35 am
As criminal tactics adapt in the financial crime space, the security industry must also align and adapt. Criminal actors continue to enhance their capabilities by utilizing cyber-enabled tactics to commit fraud and financial crimes at scale. With this convergence of criminal intentions and technical aptitude, businesses must be prepared to detect and prevent.
Based on his work with the Financial Services Information Sharing and Analysis Center (FS-ISAC) Threat Intelligence Committee Fraud Working Group, Mr. Dant will share some of the details of the Threat Viewpoint Fraud Mitigation Framework he authored. Over his career with the US Secret Service, and continuing into his work in private sector banking, Jeff worked with colleagues across the industry to better integrate information security and fraud investigation. The framework outlines common taxonomies, definitions, and areas of focus common to Information Security and Fraud Groups that can help facilitate better collaboration across, and especially between organizations in the sector.
In this session, we will explore some of the areas where cyber fraud convergence has had an impact on industry groups, such as financial institutions, as well as ways that we can address the threat through collaborative approaches that leverage intelligence, data, technology, and process.
Attendees will understand how internal groups, as well as Managed Security Services Providers (MSSPs) play a role in the “kill chain,” based on the familiar Lockheed concept. They will also see some practical examples of how threat actors employ artificial intelligence and machine learning to gain access, which lies at the intersection of credential stuffing, account takeover, identity verification and fraud mitigation practices.
Speaker:
-
Knowing What Not to Do 10:15 am
The proliferation of Zero-Day vulnerabilities has amplified the stress level for already burdened IT and Security staff. One needs to look no farther than ProxyLogon, PrintNightmare and Log4j vulnerabilities as sublime examples of disruptive vulnerabilities.
Tasked with finding the vulnerabilities and then planning and executing mitigation strategies, many IT teams had to jump into vulnerability resolution while neglecting important, but less urgent IT initiatives. Exacerbating matters, those steps were often executed in a void of proper risk assessment and change management. The problems will only get worse in the future.
This presentation will provide a brief case study into the aforementioned vulnerabilities and identify new techniques, technologies and best practices to evaluate how, when and even if IT should take action to mitigate.
Speaker:
-
Empowering Users To Be the Best Human Firewall in Your Organization 10:40 am
Your business users, those oft-confused carbon-based life forms normally roaming the halls of your office building, are now at home on their (probably very secure) private networks. Maybe with corporate devices, maybe not. This makes it more important than ever to arm them with tools, training and the sense to look for suspicious activity. Â
Our panelists at the Raleigh – RTP Cybersecurity Conference will talk more about this issue, and what you can do to make your users the best last line of defense.Â
Panel Participants:
-
It’s Cloudy Up Here: Defend Against the TOP 3 Identity Attack Vectors in Microsoft 365 11:40 am
In today’s complex digital landscape, corporations increasingly rely on cloud platforms to connect with their staff, partners and customers. For cybersecurity experts, however, this move to the cloud presents many new challenges and possible threats. To protect your company from harm, you first need to understand the specific risks and vulnerabilities of these services.
Join us to learn how Microsoft 365 contributes to the risk of data breaches, what the three main identity attack vectors are and how you can keep your business safe in the cloud.
Speaker:
-
Windows 11: Adapt Early or Follow Cautiously? 12:05 pm
6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency.Â
Axel Peters from baramundi software will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? How does Microsoft’s latest OS affect endpoint management? And how will it affect endpoint security?
Panel Participants:
- Lunch Break
-
Demo - Take Control of Your Endpoints With baramundi 12:35 pm
Keeping track and actively managing your endpoints can be a challenging task. Flexible work hours and locations often cause headaches when it comes to IT security and management. Using tools like the baramundi management suite can reduce the workload and increase your overall IT security significantly. In our live demo we’ll showcase some best practices in patch management, inventory and automation.Â
Speaker:
-
Keynote - Incident Response & The Trickle Down Effect 1:00 pm
CISOs stand prepared to guide their organizations through Cyber Intrusion and Ransomware Events and Devon Ackerman’s Incident Response teams across North America handle thousands of such events each year. They are on the front lines working in lockstep with victim organizations and their CISOs, augmenting Client IT and Incident Response teams, performing forensic analysis, working to contain and eject threat actors from networks and investigate incidents to identify risk to sensitive data.
From that body of experience, interactions and investigative results, Mr. Ackerman will walk the Raleigh – RTP Cybersecurity Conference audience through observed patterns that Kroll has termed “The Trickle Down Effect” as it relates to Nation State Actors and their Tactics, Techniques and Procedures being observed and absorbed by Organized Crime Groups and mass produced against victim organizations, like your own. Mr. Ackerman will also walk the audience through two concepts (Castle Wall Doctrine & Kroll’s Intrusion Lifecycle) that he hopes will be helpful for CISOs as they convey concepts and analogies to members of their Boards, their Executive Teams, and employees of their organizations.
Speaker:
-
Stopping Ransomware with Autonomous Response 2:05 pm
New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.Â
Join Mitch Bowman, Cyber Security Director, as he unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.Â
This presentation will discuss:Â
-Recent ransomware threat trends, including double extortion and RDP attacksÂ
-How Autonomous Response takes action to contain an emerging attack, even when security teams are out of officeÂ
-Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day
Speaker:
-
Analytics Powered Security Control Looking Beyond Vendor Provided Prescriptive Controls 2:30 pm
The unpreparedness of the cybersecurity industry to Log4j illustrates the continuing need for a new approach to security analytics. Architecting your cybersecurity tooling to meet vendor-prescribed security controls has become table stakes; additionally to react and prepare, CISOs need built-in analytics that grow along with the needs and risks of the business. In this session, Uptycs CEO and co-founder Ganesh Pai will lay out a process for collecting and analyzing security telemetry from the attack surfaces that matter in modern hybrid environments.Â
Speaker:
-
Preview: State Agencies Discuss Their Respective Missions 2:55 pm
A supply chain encompasses the entire network of all the individuals, organizations, resources, activities and technology involved in the creation and sale of a product. The ultimate goal of an effective supply chain is lower costs of doing business thus resulting in higher profits and improved customer satisfaction. The process of bringing in a third party involves identifying, assessing and controlling all the various risks that can develop over the entire lifecycle of such relationships.Â
Join this session to drive into how sophisticated attackers can live quietly inside even organizations with significant expertise and mature security processes.Â
-
Cyber Inter-Agency Cooperation Panel 3:10 pm
This week’s Raleigh – RTP Cybersecurity Conference brings together numerous agencies who collaborate to thwart cybercrime. In this panel, representatives from federal and state agencies will join together and take audience questions. Panelists will talk about what their organizations are doing to support the advancement of cybersecurity preparedness in the region. They will share best practices, and learnings from the real interactions they have day-to-day with organizations across the region.
This Raleigh – RTP Cybersecurity Conference exclusive panel brings together multiple agencies who are all working to support the common good of the citizens and businesses that operate across the region.
Panel Participants:
-
Managing the Insider Threat 4:00 pm
An adversary who attacks an organization from within can prove fatal to the business and is generally impervious to conventional defenses. Social science research has been used to explain why traditional methods fail against these trusted betrayers. Every company must identify and utilize new management techniques, increase security, and revise workplace strategies for categorizing and defeating insider threats.
There are key players in positions to either effectively support or undermine the insider threats. Leadership style can make a difference in the way an institution recognizes and identifies these threats from rethinking background investigations to recognizing deception and using lawful disruption. Join this session to learn about how organizations must circumvent these predators before they jeopardize the workplace and sabotage business operations.
-
The Evolution of the Threat: Hunting, Detection, & Response 4:35 pm
Nation-State attacks are not always focused on political or military adversaries. Recently, below-military-grade action can create havoc or destabilize adversaries, or manipulate markets. Hard to trace and even harder to convict, they may affect stock price or even influence the outcome of elections.Â
Attend to talk about the problem, and see what US enterprises are doing to prepare themselves for these situations
-
The Cybersecurity Skills Shortage 5:00 pm
There are currently 310,000 unfilled cybersecurity jobs in the United States, and millions around the world. However, there is no shortage of cybersecurity hopefuls – millions of students, career changers, and people from all walks of life hoping to break into cybersecurity.
This session will explore the issues around cybersecurity jobs. Breaking into the field, the relative need for certifications, formal education, on-the-job training and more. The discussion will explore the supply and demand disconnect that has been created – resulting in both a ton of great candidates looking for roles, and a cybersecurity skills shortage.
- Conference Closing Session 5:20 pm
- Conference Closing Happy Hour 5:30 pm
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners