
Conference
Columbus 2022
Cybersecurity Conference
In cybersecurity, information sharing is critical. One vulnerability can bring down government agencies, businesses, and critical infrastructure.
The Columbus Cybersecurity Conference is connecting the region’s top security professionals, with topics ranging from leadership best practices on delegation, setting metrics, training, and building effective teams to protect your organization from advanced threat actors. Other topics include effective incident response and strategies in cybersecurity resilience.
Key speakers include Mark Sangster, a frequent cybersecurity expert on multiple national news outlets and author of “No Safe Harbor,” and Lisa Plaggemier, Executive Director at National Cyber Security Alliance, who will share the NCA’s latest findings on the potential drivers and barriers in adoption of secure data security habits within organizations.
Learn more about Data Connectors here!
Date
Thu. Jul 28
-
Featured Speakers
Lisa Plaggemier
A Whole Lotta BS Presentation
Randy PaszekProtecting Against Cyber Attacks
Jay RoxeProtecting Against Cyber Attacks
Phil LabasProtecting Against Cyber Attacks
Justin RootThree Types of Cybercrime: How Digital Evidence Is Leveraged in Criminal Investigations
Mark SangsterWar Games Aren’t Just for Warriors Anymore
No Safe HarborComplimentary Signed Books From Keynote Speaker Mark Sangster
Steve Nestler2022 Trends & Directions
Toni Buhrke2022 Trends & Directions
Jason Miller2022 Trends & Directions
Craig MoringielloCyber Inter-Agency Collaboration Panel
Michael FieldsCyber Inter-Agency Collaboration Panel
Terin WilliamsCyber Inter-Agency Collaboration Panel
Timothy O’MalleyCyber Inter-Agency Collaboration Panel
Steven H. RoesingCyber Executive Panel
Brian SheaCyber Executive Panel
John W GrahamCyber Executive Panel
Riad AmroCyber Executive Panel
Tony R. BrumleyCyber Executive Panel
Event Schedule
Times for this Event are in Eastern Time (EDT/EST).
The Conference will be open from 8:00 AM to 6:30 PM Thursday, July 28th.
- Welcome to the Columbus Cybersecurity Conference
-
Authentication Advances In Banking 9:00 am
When acclaimed bank robber Willie Sutton was captured, a reporter inquired as to why he robbed banks. His simple answer was “because that’s where the money is”. With advances in technology, it is plausible to “virtually” rob banks without involving weapons, but rather by a simple computer keystroke.
This session will present primary research as to the current state of authentication when it comes to financial institutions. We will present options and guidance for banking institutions on how to increase the security of logins and banking transactions that are more efficient and effective than traditional multi-factor authentication (MFA). We’ll discuss specific guidance on best practices and methodologies that disrupt the untenable legacy compromise of having to choose between high security or seamless customer experience.
Finally, we’ll address how these new approaches can help banking organizations comply with current compliance regulations and eliminate unacceptable risk.
Speaker:
-
A Whole Lotta BS Presentation 9:20 am
Why do we do the things we know we shouldn’t, and not do the things we know we should? Take password managers: most of us know they’re an easy, useful tool that enhances our security, but not enough of us actually use them. What’s the reason behind this? New research from the National Cyber Security Alliance reveals the public’s attitudes and beliefs about security, and potential drivers and barriers towards secure habits.
Speaker:
-
Leveraging a Single Identity Tool as a Foundation for a Unified Identity Security Framework 10:15 am
Identity sprawl is on the rise. Humans, devices, bots, and other forms of identities have more than doubled in 85% of organizations surveyed. Most of these identities have elevated access and are a target breach point for one of the most common forms of attack today, ransomware. Stand-alone Identity tools are unable to address this current threat surface, and must be integrated with other identity security tools to attain 360-visibility across all identities and address this growing problem in a holistic manner. Learn how to leverage any identity tool as a foundational component of a complete, identity-based ecosystem to ultimately improve your overall cybersecurity posture.
Speaker:
-
Protecting Against Cyber Attacks 10:35 am
We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.
Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.
Panel Participants:
-
Securing Your Microsoft 365 Journey 11:25 am
Presented by Barracuda Networks
Please join Barracuda Networks to learn about their Email Security and Office 365 protection solutions. As a 2021 Forrester Leader in Enterprise Email Security, Barracuda provides gateway and inbox security using AI based Phishing and Impersonation Protection, Account Takeover protection, and Automated Remediation. This, along with C2C Backup, Email Archiving and Security Awareness Training provide a unique, single-vendor solution to secure email and protect O365 environments.
Speaker:
-
Three Types of Cybercrime: How Digital Evidence Is Leveraged in Criminal Investigations 11:45 am
Join SAS Justin Root from the Ohio Bureau of Criminal Investigation’s Cyber Crime Unit as he discusses how law enforcement leverages digital evidence in criminal investigations and explores how businesses can anticipate and prevent cybercriminal activity.
Speaker:
- Lunch Break
-
War Games Aren’t Just for Warriors Anymore 12:50 pm
Recently NATO’s Cooperative Cyber Defense Center of Excellence hosted cyber war exercises that come weeks into the Russian invasion of Ukraine that has demonstrated the strategic advantages of waging a hybrid cyber-kinetic warfare. In this hybrid era, civilian targets across all industries are in the crosshairs. Join Adlumin Chief of Strategy and cybersecurity author, Mark Sangster, as he explores why companies need to run cyber war games to prepare their business for an inevitable attack. As Winston Churchill famously said, “Never let a good crisis go to waste.”
Speaker:
- Complimentary Signed Books From Keynote Speaker Mark Sangster 1:30 pm
-
Beyond Vulnerability Scanning 1:50 pm
Presented by Hoplite Consulting
Business and other organizations are implementing additional cybersecurity tools to protect against the ever-evolving nature of attacks. A popular tool is vulnerability scanners, which enables organizations to monitor their networks, systems, and applications for security vulnerabilities. Should companies just rely on vulnerability scanning alone for protection? This session will discuss the current threat environment from nation states and cyber criminals and limitations of vulnerability scanning. Learn how an effective penetration test can identify risk to your organization’s network and application security, prioritize and resolve the most critical vulnerabilities, and provide confidence in your overall cybersecurity strategy.
Speakers:
-
2022 Trends & Directions 2:10 pm
If 2022 has taught us anything so far, it’s that cybercriminals are still coming up with new ways to cash in. But with nearly half the year behind us, what can we anticipate for the rest of the year? Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever.
Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2022 with a security strategy that will set you up for success during this insightful discussion.
Panel Participants:
-
Cyber Inter-Agency Collaboration Panel 3:00 pm
Panel Participants:
-
Deliver IGA, Cloud IAM, PAM and Identity Protection in a Hybrid Environment 3:50 pm
“Identity is the new parameter” in the Zero-Trust Security Framework. This Presentation discusses practical approaches to design and deliver identity and access centric solutions in the agile framework. It discusses on-prem, hybrid and cloud native.
Speaker:
-
Cyber Executive Panel 4:10 pm
Submit your bio for consideration to participate on our Columbus Cybersecurity Conference
Cyber Executive Panel to [email protected]
or fill out our Call for Speakers form here.
Panel Participants:
- Conference Closing Session 4:45 pm
- Happy Hour Networking Reception 4:50 pm