Registration

Thu. Jul 28

Registration for qualified senior cybersecurity professionals. Subject to approval.

I agree to Data Connectors Terms and Conditions *

Price: $200.00

ENTER VIP CODE HERE


  • Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (EDT/EST).

The Conference will be open from 8:00 AM to 6:30 PM Thursday, July 28th.

  • Welcome to the Columbus Cybersecurity Conference
  • Authentication Advances In Banking 9:00 am

    Presented by Hypr

    When acclaimed bank robber Willie Sutton was captured, a reporter inquired as to why he robbed banks. His simple answer was “because that’s where the money is”. With advances in technology, it is plausible to “virtually” rob banks without involving weapons, but rather by a simple computer keystroke. 

    This session will present primary research as to the current state of authentication when it comes to financial institutions. We will present options and guidance for banking institutions on how to increase the security of logins and banking transactions that are more efficient and effective than traditional multi-factor authentication (MFA). We’ll discuss specific guidance on best practices and methodologies that disrupt the untenable legacy compromise of having to choose between high security or seamless customer experience.

    Finally, we’ll address how these new approaches can help banking organizations comply with current compliance regulations and eliminate unacceptable risk.  

     

     

    Click to Expand

    Speaker:

    Jay Roxe
    Jay Roxe

    Jay Roxe

    Chief Strategy Officer at HYPR

    Collapse This Item

  • A Whole Lotta BS Presentation 9:20 am

    Why do we do the things we know we shouldn’t, and not do the things we know we should? Take password managers: most of us know they’re an easy, useful tool that enhances our security, but not enough of us actually use them. What’s the reason behind this? New research from the National Cyber Security Alliance reveals the public’s attitudes and beliefs about security, and potential drivers and barriers towards secure habits.

    Click to Expand

    Speaker:

    Lisa Plaggemier
    Lisa Plaggemier

    Lisa Plaggemier

    Executive Director at National Cyber Security Alliance (NCA)

    Collapse This Item

  • Leveraging a Single Identity Tool as a Foundation for a Unified Identity Security Framework 10:15 am

    Presented by One Identity

    Identity sprawl is on the rise. Humans, devices, bots, and other forms of identities have more than doubled in 85% of organizations surveyed. Most of these identities have elevated access and are a target breach point for one of the most common forms of attack today, ransomware. Stand-alone Identity tools are unable to address this current threat surface, and must be integrated with other identity security tools to attain 360-visibility across all identities and address this growing problem in a holistic manner. Learn how to leverage any identity tool as a foundational component of a complete, identity-based ecosystem to ultimately improve your overall cybersecurity posture.

    Click to Expand

    Speaker:

    Larry Chinski
    Larry Chinski

    Larry Chinski

    Vice President Global IAM Strategy and Customer Advocacy at One Identity

    Collapse This Item

  • Protecting Against Cyber Attacks 10:35 am

    We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.

    Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.

    Click to Expand

    Panel Participants:

    Randy Paszek
    Randy Paszek

    Randy Paszek

    Senior Researcher at Source Defense

    Jay Roxe
    Jay Roxe

    Jay Roxe

    Chief Strategy Officer at HYPR

    Phil Labas
    Phil Labas

    Phil Labas

    Sr. Director, Channel & Partnerships at Conceal

    Collapse This Item

  • Securing Your Microsoft 365 Journey 11:25 am

    Presented by Barracuda Networks

    Please join Barracuda Networks to learn about their Email Security and Office 365 protection solutions. As a 2021 Forrester Leader in Enterprise Email Security, Barracuda provides gateway and inbox security using AI based Phishing and Impersonation Protection, Account Takeover protection, and Automated Remediation. This, along with C2C Backup, Email Archiving and Security Awareness Training provide a unique, single-vendor solution to secure email and protect O365 environments.

    Click to Expand

    Speaker:

    Michael McClendon
    Michael McClendon

    Michael McClendon

    Sr. Solutions Architect at Barracuda Networks

    Collapse This Item

  • Three Types of Cybercrime: How Digital Evidence Is Leveraged in Criminal Investigations 11:45 am

    Join SAS Justin Root from the Ohio Bureau of Criminal Investigation’s Cyber Crime Unit as he discusses how law enforcement leverages digital evidence in criminal investigations and explores how businesses can anticipate and prevent cybercriminal activity.

    Click to Expand

    Speaker:

    Justin Root
    Justin Root

    Justin Root

    Special Agent Supervisor at Ohio Bureau of Criminal Investigation

    Collapse This Item

  • Lunch Break
  • War Games Aren’t Just for Warriors Anymore 12:50 pm

    Recently NATO’s Cooperative Cyber Defense Center of Excellence hosted cyber war exercises that come weeks into the Russian invasion of Ukraine that has demonstrated the strategic advantages of waging a hybrid cyber-kinetic warfare. In this hybrid era, civilian targets across all industries are in the crosshairs. Join Adlumin Chief of Strategy and cybersecurity author, Mark Sangster, as he explores why companies need to run cyber war games to prepare their business for an inevitable attack. As Winston Churchill famously said, “Never let a good crisis go to waste.”

    Click to Expand

    Speaker:

    Mark Sangster
    Mark Sangster

    Mark Sangster

    Cybersecurity Expert & Author “No Safe Harbor”

    Collapse This Item

  • Complementary Signed Books From Keynote Speaker Mark Sangster 1:30 am

    About the book:

    No Safe Harbor
    No Safe Harbor

    No Safe Harbor

    By Mark Sangster

    Collapse This Item

  • Beyond Vulnerability Scanning 1:50 pm

    Presented by Hoplite Consulting

    Business and other organizations are implementing additional cybersecurity tools to protect against the ever-evolving nature of attacks. A popular tool is vulnerability scanners, which enables organizations to monitor their networks, systems, and applications for security vulnerabilities. Should companies just rely on vulnerability scanning alone for protection? This session will discuss the current threat environment from nation states and cyber criminals and limitations of vulnerability scanning.  Learn how an effective penetration test can identify risk to your organization’s network and application security, prioritize and resolve the most critical vulnerabilities, and provide confidence in your overall cybersecurity strategy.

    Click to Expand

    Speakers:

    Craig Moringiello
    Craig Moringiello

    Craig Moringiello

    Retired Assistant Special Agent in Charge at FBI

    Michael Weimer
    Michael Weimer

    Michael Weimer

    CTO at Hoplite Consulting

    Collapse This Item

  • 2022 Trends & Directions 2:10 pm

    If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever. 

    Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion. 

     

    Click to Expand

    Panel Participants:

    Steve Nestler
    Steve Nestler

    Steve Nestler

    Customer Engineer at QOMPLX

    Toni Buhrke
    Toni Buhrke

    Toni Buhrke

    Director of Sales Engineering at Mimecast

    Jason Miller
    Jason Miller

    Jason Miller

    Founder & CEO at BitLyft

    Collapse This Item

  • Cyber Inter-Agency Collaboration Panel 3:00 pm

    Panel Participants:

    Craig Moringiello
    Craig Moringiello

    Craig Moringiello

    Retired Assistant Special Agent in Charge at FBI

    Michael Fields
    Michael Fields

    Michael Fields

    Senior Special Agent at Department of Homeland Security

    Terin Williams
    Terin Williams

    Terin Williams

    Cybersecurity Advisor, Region 5 (OH) at Department of Homeland Security

    Timothy O’Malley
    Timothy O’Malley

    Timothy O’Malley

    ASAC at FBI - Cincinnati Division

    Collapse This Item

  • Deliver IGA, Cloud IAM, PAM and Identity Protection in a Hybrid Environment 3:50 pm

    Presented by AOH

    “Identity is the new parameter” in the Zero-Trust Security Framework. This Presentation discusses practical approaches to design and deliver identity and access centric solutions in the agile framework. It discusses on-prem, hybrid and cloud native.

    Click to Expand

    Speaker:

    Laura Hees
    Laura Hees

    Laura Hees

    Partner at AOH

    Collapse This Item

  • Cyber Executive Panel 4:10 pm

    Submit your bio for consideration to participate on our Columbus Cybersecurity Conference

    Cyber Executive Panel to [email protected]

    or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Steven H. Roesing
    Steven H. Roesing

    Steven H. Roesing

    President and CEO at ASMGI

    Brian Shea
    Brian Shea

    Brian Shea

    CIO at MedOne Hospital Physicians

    John W Graham
    John W Graham

    John W Graham

    Chief Information Security Officer - NetJets

    Riad Amro
    Riad Amro

    Riad Amro

    CISO, VP Information Security at FlightSafety International

    Tony R. Brumley
    Tony R. Brumley

    Tony R. Brumley

    CTO/ISM at Liberty Wealth Advisors

    Collapse This Item

  • Conference Closing Session 4:45 pm
  • Happy Hour Networking Reception 4:50 pm
Partners Register