Registration

Tue. Mar 15

Registration for qualified senior cybersecurity professionals. Subject to approval.

I agree to Data Connectors Terms and Conditions *

Price: $125.00

ENTER VIP CODE HERE


  • Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (EDT/EST).

The Conference will be open from 8:30 AM to 5 PM, March 15th.

  • Welcome to the Tampa Cybersecurity Conference
  • Special Welcome from Jane Castor, Mayor of Tampa 9:15 am

    Speaker:

    Jane Castor
    Jane Castor

    Jane Castor

    Mayor at Tampa, Florida

    Collapse This Item

  • Special Welcome from USSS SAC Richard Dean 9:30 am

    Speaker:

    Richard Dean
    Richard Dean

    Richard Dean

    Assistant to the Special Agent in Charge, Tampa Field Office

    Collapse This Item

  • Special Welcome from FBI Acting SAC Sanjay Virmani 9:45 am

    Speaker:

    Sanjay Virmani
    Sanjay Virmani

    Sanjay Virmani

    Acting Special Agent in Charge at FBI

    Collapse This Item

  • Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust 10:00 am

    Presented by ThreatLocker

    Join ThreatLocker’s Director of Technical Engagement, Ben Jenkins, as we discuss endpoint evasion techniques that are undetectable by most EDR/MDR and antivirus solutions. Understand how businesses are enhancing their cyber resilience and significantly limiting the damage ransomware can inflict with a Zero Trust architecture. 

    Click to Expand

    Speaker:

    Ben Jenkins
    Ben Jenkins

    Ben Jenkins

    Director of Technical Engagement at ThreatLocker

    Collapse This Item

  • Empower the Human “Cyber-Warrior”: A Public-Private Partnership 10:25 am

    Despite the addition of more and more technologies (MFA, DLP, email security, etc.), and education (user awareness, phishing simulation, etc.) more than 90% of eventual monetary losses due to a data breach result from users. Whether malicious or unintentional, the oft-confused carbon-based life forms (users) are worthy of a focus from this panel of experts.

    This discussion will include members of our law enforcement, federal cyber support, and other agencies alongside leaders from private industry. They will present some of the facts from their experiences, and share best practices and practical advice for the cyber leaders in the audience to finally close the gaps related to user “error.” They’ll discuss processes and ideas on how cyber leaders can be less susceptible to these gaps, and thoughtful paradigms to effectuate a shift in strategy to better cope.

    Click to Expand

    Panel Participants:

    Richard Dean
    Richard Dean

    Richard Dean

    Assistant to the Special Agent in Charge, Tampa Field Office

    Jeffrey Harrington
    Jeffrey Harrington

    Jeffrey Harrington

    Colonel, Pasco Sheriff’s Office, Pasco County, FL

    Todd Ryan
    Todd Ryan

    Todd Ryan

    Chief Information Officer at Hillsborough County Sheriff's Office

    Robert Price
    Robert Price

    Robert Price

    Supervisory Special Agent at Infragard MO (FBI partner)

    Richard Kelley
    Richard Kelley

    Richard Kelley

    General Manager, Q:CYBER and Platform at QOMPLX, Inc.

    Philip Kapusta
    Philip Kapusta

    Philip Kapusta

    Future Operations Bureau Commander at Pasco Sheriff's Office

    Collapse This Item

  • Analytics Powered Security Control Looking Beyond Vendor Provided Prescriptive Controls 11:15 am

    Presented by Uptycs

    The unpreparedness of the cybersecurity industry to Log4j illustrates the continuing need for a new approach to security analytics. Architecting your cybersecurity tooling to meet vendor-prescribed security controls has become table stakes; additionally to react and prepare, CISOs need built-in analytics that grow along with the needs and risks of the business. In this session, Uptycs CEO and co-founder Ganesh Pai will lay out a process for collecting and analyzing security telemetry from the attack surfaces that matter in modern hybrid environments. 

    Click to Expand

    Speaker:

    Ganesh Pai
    Ganesh Pai

    Ganesh Pai

    Founder and CEO at Uptycs

    Collapse This Item

  • Improving Cyber Threat Detection with Machine Learning, Visualizations and Graph Analytics 11:40 am

    Presented by TigerGraph

    The sophistication of cyber criminals is increasing relentlessly. Accenture found that 68% of business leaders feel their cybersecurity risks are increasing. More and better technologies are required to detect attacks and prevent them, we’ll discuss: 

    • How graph analytics, machine learning, and visualizations, can directly assist in the identification of threats in your environment. 
    • Using the same approach as many other security tools, we examine how TigerGraph can help you identify threats earlier along the kill chain of the MITRE Attack Framework.
    Click to Expand

    Speaker:

    David Braun
    David Braun

    David Braun

    Director of Solutions Engineering at TigerGraph

    Collapse This Item

  • Lunch Break
  • Demo Session: Protecting Yourself Against Ransomware 12:10 pm

    Presented by Check Point Software Technologies

    We all know that email is the #1 threat facing organizations today – 91% of breaches start with email and it’s the number one vector used in ransomware attacks. With the migration to cloud email, the email security market is undergoing a massive disruption.

     Join Check Point Software Technologies to see a live demo on how you can protect your enterprise against the most sophisticated attacks. After the demo, you’ll gain take-away strategies for combatting email threats and attack scenarios leading up to it.

    Click to Expand

    Panel Participants:

    Jeremiah Marshall
    Jeremiah Marshall

    Jeremiah Marshall

    Public Sector East Security Engineer at Check Point Software Technologies

    Collapse This Item

  • Demo Session: How to Gain Actionable Insight Across Your Entire Technology Portfolio 12:20 pm

    Presented by Oomnitza

    Speaker:

    Stephen Turner
    Stephen Turner

    Stephen Turner

    Executive Vice President at Oomnitza

    Collapse This Item

  • Demo Session: SentinelOne Singularity™ Platform- Autonomous, AI-driven Prevention and XDR at Machine Speed 12:30 pm

    Presented by SentinelOne

    At SentinelOne, we are redefining cybersecurity by pushing the boundaries of autonomous technology. Our Singularity™️ XDR Platform encompasses AI-powered prevention, detection, response, and threat hunting across user endpoints, containers, cloud workloads, and IoT devices. Empowering modern enterprises to defend faster, at greater scale, and with higher accuracy across their entire attack surface.

    Click to Expand

    Speaker:

    Joshua Barker
    Joshua Barker

    Joshua Barker

    Solutions Architect at SentinelOne

    Dom Iannacone
    Dom Iannacone

    Dom Iannacone

    Enterprise Account Executive at SentinelOne

    Collapse This Item

  • Keynote - Creating Florida’s First Cybersecurity Program: Lessons Learned So Far 12:45 pm

    Serving as Florida’s Chief Information Officer, Jamie Grant leads the Florida Digital Service and is responsible for the state’s CDO, CISO, Chief of Service Experience, and the State Data Center.  Tasked with developing the state’s first ever enterprise approach to technology, he will share the progress this far in building Florida’s technology office and why partnership is foundational to its success.

    Appointed personally by the Governor, Mr. Grant leveraged the work done by Florida Cyber Task Force, which has become an advisory board with a public and private partnership, to take a brand new approach for a state-wide digital service. Cybersecurity is core to its mission, as the “battlefield” for warfare moves to the modern age.  Protecting citizens, assets, information and infrastructure is the building block for stable government services.

    Grant will share experiences that will benefit cybersecurity leaders–be they in the public or private sectors.  He’ll talk about cutting bureaucracy, budgeting, staffing, working with solution providers, and motivating teams to strive for a meaningful mission.

    Click to Expand

    Speaker:

    James J.W. Grant
    James J.W. Grant

    James J.W. Grant

    Chief Information Officer at State of Florida

    Collapse This Item

  • Stopping Ransomware with Autonomous Response 1:35 pm

    Presented by Darktrace

    New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization. 

    Join Kathryn Eckhart, Cyber Security Director at Darktrace, as she unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks. 

    This presentation will discuss: 

    • -Recent ransomware threat trends, including double extortion and RDP attacks 
    • -How Autonomous Response takes action to contain an emerging attack, even when security teams are out of office 
    • -Real-world examples of ransomware detected by Darktrace AI – including a zero-day and an attack initiated on Christmas Day
    Click to Expand

    Speaker:

    Kathryn Eckhart
    Kathryn Eckhart

    Kathryn Eckhart

    Cyber Security Director at Darktrace

    Collapse This Item

  • An Adversary-Focused Approach to Cybersecurity Defenses 2:15 pm

    Presented by eSentire

    Recent years have seen great progress in the enumeration and categorization of adversary TTPs. However, these frameworks and matrices are often cumbersome and unwieldy because they attempt to be “all things for all people”, listing every possible adversary and their TTPs. This presentation will take these frameworks and matrices as inputs and focus them on the specific adversaries and attack types that are relevant to your organization, so that you can be more efficient with your cybersecurity prevention and detection efforts.

    Click to Expand

    Speaker:

    Alex Boccio
    Alex Boccio

    Alex Boccio

    Alex Boccio at eSentire

    Collapse This Item

  • The Journey to Security Service Edge: The Killer Feature is Simplicity 2:40 pm

    Presented by Axis Security

    Due to the growth of “Cloud” over the past ten years, organizations have moved from the data center to “centers of data”.  As applications are now distributed, the networks and security solutions have become more complex and brittle. Adding fuel to this fire of complexity, network and security solutions must now address the demands of the hybrid workforce.  In this talk, John will discuss how you can use Security Service Edge in a simple way to solve some of the complex network security problems no matter how large your organization.

    Click to Expand

    Speaker:

    John Spiegel
    John Spiegel

    John Spiegel

    Director of Strategy at Axis Security

    Collapse This Item

  • Defense in Depth: New Strategies for 2022 3:05 pm

    Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations preparing to defend against inventive hackers penetrating their systems in 2022?

    Click to Expand

    Panel Participants:

    David Braun
    David Braun

    David Braun

    Director of Solutions Engineering at TigerGraph

    Zach Luze
    Zach Luze

    Zach Luze

    Data Security Director at Kudelski Security

    Ganesh Pai
    Ganesh Pai

    Ganesh Pai

    Founder and CEO at Uptycs

    Jeremy Rodgers
    Jeremy Rodgers

    Jeremy Rodgers

    Chief Information Security Officer

    Collapse This Item

  • Reimagining Your SOC with XDR 3:50 pm

    Presented by Rapid7

    Threat actors have the advantage. With increasingly advanced tactics and the patience and perseverance of a miner digging for a diamond, attackers are exploiting vulnerabilities and infiltrating your organization’s network. Companies of all sizes struggle to eliminate risk—especially as your attack surfaces expand due to digital transformation and remote work. There’s never enough time or resources to do it all and managing multiple independent point tools only creates more overhead. Your SOC analysts are inundated with low-fidelity data and bogged down with repetitive and menial tasks dealing with false-positive alerts. Your evolving modern environment requirements may be driving momentum for Extended Detection and Response (XDR). 

    What is XDR and how can it improve the effectiveness of your security strategy and drive greater efficiency with SOC personnel? Join this session to learn how a consolidated security data pipeline can collect and process telemetry at scale across your hybrid estate to deliver high-fidelity alerts and the automated prevention workflows needed to quickly identify and respond to threats. See how XDR can be used to minimize alert triage, reduce investigation time, and automate response guidance—empowering your team to speed response and limit the effects of threats.

    Click to Expand

    Speaker:

    Julian Waits
    Julian Waits

    Julian Waits

    SVP & Executive in Residence at Rapid7

    Collapse This Item

  • Managing Cloud Risk Without Slowing App Delivery 4:15 pm

    Presented by Sysdig

    As organizations move workloads to the cloud they realize their software development approach needs to radically change. Securing the cloud requires a total re-think as well. Although security teams still need to manage access rights, fix vulnerabilities, and detect runtime threats, the techniques have evolved. 

    Learn how the largest financial services, media, and software companies address cloud security. You will gain insight into the top security challenges and pragmatic techniques to manage cloud risk without slowing down application delivery. Suresh Vasudevan, Sysdig CEO, will share our customer’s best practices for securing containers, Kubernetes, and cloud services.

    Click to Expand

    Speaker:

    Jeremiah Sullivan
    Jeremiah Sullivan

    Jeremiah Sullivan

    Director of Solutions at Sysdig

    Collapse This Item

  • Keynote- Kaseya CISO Talks Cyber 4:35 pm

    Jason Manar was the FBI Special Agent working on the Kaseya case in 2021.  Today, he’s the CISO there, and has a lot to share about what the business has learned, and what takeaways benefit every cybersecurity leader in the audience.

     

    Click to Expand

    Speaker:

    Jason Manar
    Jason Manar

    Jason Manar

    Chief Information Security Officer at Kaseya

    Collapse This Item

  • Cyber Executive RoundTable 4:50 pm

    Submit your bio for consideration to participate on our Tampa Cybersecurity Conference

    Cyber Executive RoundTable to [email protected]

    or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    James J.W. Grant
    James J.W. Grant

    James J.W. Grant

    Chief Information Officer at State of Florida

    Martin Zinaich
    Martin Zinaich

    Martin Zinaich

    CISO at City of Tampa

    Jeremy Rodgers
    Jeremy Rodgers

    Jeremy Rodgers

    Chief Information Security Officer

    Jason Manar
    Jason Manar

    Jason Manar

    Chief Information Security Officer at Kaseya

    Klint Walker
    Klint Walker

    Klint Walker

    Cyber Security Advisor (Region IV) DHS Cybersecurity & Infrastructure Security Agency (CISA)

    Collapse This Item

  • Tampa Cybersecurity Conference Closing Session 5:35 pm
  • Networking Reception and Happy Hour 5:45 pm
  • Partners

    Platinum Partners

    ThreatLocker

    Gold Partners

    Auth0
    Pure Storage - Alternate
    TigerGraph
    Uptycs

    Silver Partners

    Axis Security
    Darktrace
    eSentire
    Rapid7
    Sysdig

    Bronze Partners

    Kudelski Security
    Okta - Alternate
    QOMPLX

    Exhibiting Partners

    Arcserve - Alternate
    Atlantic Data Security
    Axonius
    Check Point Software Technologies
    Climb Channel Solutions
    Cobalt
    Consortium Networks
    DGR Systems
    ExtraHop
    Forcepoint
    inNet
    Kenna Security
    Oomnitza
    SentinelOne
    Slash Next

    Affiliate Partners

    (ISC)<sup>2</sup> Central Florida
    (ISC)<sup>2</sup> Tampa Bay
    Infragard Tampa Bay
    ISACA West Florida Chapter
    WiCyS Florida Affiliate

    Collapse This Item

Partners Register