
Conference
St. Louis
Cybersecurity Conference
Join your fellow cybersecurity professionals at the St. Louis Cybersecurity Conference to better help you navigate whatever cyber threats may come. Connect with your peers and industry experts for live, in-person sessions on topics ranging from cloud security, the future of ransomware, and protecting your organization from advanced threat actors.
Connect with other cybersecurity leaders and executives at the St. Louis Cybersecurity Conference to hear from industry luminaries on the topics you need for a complete security strategy. Engage with a variety of solutions providers, and interact with subject matter experts throughout the day, to help you stay on the leading edge.
Connect with Data Connectors on LinkedIn here!
Date
Thu. Nov 03
-
Featured Speakers
Joye Purser
Keynote Presentation: Joye Purser
George FinneyKeynote Speaker: George Finney
Daniel StiegmanKeynote Presentation : Daniel Stiegman
Joye PurserCyber Inter-Agency Cooperation Panel
Derek RiegerCyber Inter-Agency Cooperation Panel
Brian CockrillCyber Inter-Agency Cooperation Panel
Christopher CockburnCyber Inter-Agency Cooperation Panel
Mark DargisCyber Inter-Agency Cooperation Panel
Joye PurserCyber Executive Panel
Daniel StiegmanCyber Executive Panel
Zachary LewisCyber Executive Panel
George FinneyCyber Executive Panel
Marie GeorgeCyber Executive Panel
Event Schedule
Times for the St. Louis Cybersecurity Conference are in Central Time (CDT/CST).
The Conference will be open from 8:00 AM to 6:30 PM Thursday, November 3rd.
- Welcome to the St. Louis Cybersecurity Conference
-
Identity & Access Management: A Growing Need for Mid-Sized Organizations 9:30 am
Mid-market businesses today are faced with increasingly complex IT landscapes, rapidly evolving digital threats and growing pressure through privacy and security regulations. To protect their data and ensure appropriate access across various local and cloud services, medium-sized organizations more than ever depend on automated IAM solutions.
However, common IAM products designed for an enterprise context have proven too large and complex to be used effectively: Their lengthy setup and massive scope exceed the needs and resources of medium-sized companies. Mid-market access management takes a more efficient approach to help organizations quickly regain control of users and data.
In this session, you will learn:
• What makes identity & access management a necessity for the mid-market
• How IAM boosts security, productivity and compliance
• What to look out for when choosing an IAM providerSpeaker:
-
The Battle of the Algorithms 9:50 am
With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Chase in this session where he explores the benefits of Autonomous Response as a must-have that goes beyond ‘defense’. Includes real-world threat finds and attack scenarios.
Topic for this session– Autonomous Response –
- Explore today’s threats and challenges
- How advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough.
Speaker:
-
Level-Up Your Security Posture with a Virtual Security Assistant 10:35 am
New attack vectors arrive daily. If you are not actively monitoring and detecting threats inside your infrastructure (network, SaaS, Cloud), you open yourself up to risk and even liability. Add this to the pain of being overworked, short-staffed, and lacking budget, and you’ve got a recipe for disaster. Learn how to overcome these challenges, strengthen your security posture and breathe a little easier with a virtual security assistant platform.
Speaker:
-
Protecting Against Cyber Attacks 11:05 am
We’ve seen a lot of real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline, the recent Microsoft Exchange and even the slowing of care for hospital patients and their personal info being exposed, to major disruptions in food supply lines. The impact of a SINGLE attack can be DEVASTATING to EVERYONE. And when paired with unprecedented geopolitical uncertainty, it’s NEVER been more important for us all to be vigilant against bad actors.
Panel Participants:
- Conference Lunch Break
-
Keynote Presentation: Joye Purser 12:20 pm
Cyberwars and the New Target: US Critical Infrastructure
The explosion of ransomware and other cyber attacks have forever changed the strategic and business importance of the CISO. Dr. Joye Purser shares how and why the landscape has shifted, and what companies can do to better prepare for and respond to the inevitable cyber breach.
Speaker:
-
Look the Enemy in Their Eyes 1:10 pm
It’s easy to get wrapped up in the technology questions: What are the products and services to ensure network security? Understanding the who and why of bad actors can drive better decisions—before, during, and after an attack. Learn how getting at the human side of cybersecurity can reduce threats and help remediate the inevitable breach.
Speaker:
-
Keynote Speaker: George Finney 1:30 pm
Project Zero Trust
The most effective means we have available to protect ourselves when it comes to cybersecurity is prevention. And the most effective strategy for prevention is Zero Trust. Many organizations struggle with success when it comes to cybersecurity—not because they are doing nothing but because they don’t have a consistent strategy for protecting their data. Zero Trust is a strategy for protecting your organization’s most important assets. This strategy focuses on preventing breaches by eliminating one of your biggest blind spots when it comes to computers and computer networks—trust. Since Zero Trust focuses on a strategy of prevention, attendees will find opportunities to realize improvements in efficiency and reduced costs, in addition to increased security.
Attendees will learn:
- John Kindervag’s’ five-step methodology for implementing Zero Trust
- How to limit the blast radius of a breach
- Common myths and pitfalls when implementing Zero Trust
- Actionable tactics for implementing Zero Trust for multiple protect surfaces
Speaker:
-
Inspecting Signals 2:35 pm
Your devices are talking. Whether it’s to each other or the world at large, IoT devices, computers, even satellites are all making noise….and bad actors could be listening. Trenton Ivey, the Director of Information Security Research with Secureworks Counter Threat Unit, will explain the physics of wireless technology, functional attacks against wireless devices, and even how to eavesdrop on live satellites!
Speaker:
-
Keynote Presentation : Daniel Stiegman 2:55 pm
Simplifying Insider Threats: An Insider Threat Framework
Refusing to grant access requests can be difficult when senior employees are pressuring security staff for something they perceive they need — but often, when questioned, it is clear they only want access rather than needing it.
In today’s climate of rampant credential compromise, this kind of caution can be crucial to limiting a company’s exposure to malware attacks — which increasingly take advantage of vestigial access privileges that employees and security staff may well have forgotten about.
Sometimes it doesn’t even take that much effort. To solve decentralized efforts to investigate and gather intelligence information on insider threats, can prove difficult. To assist in gathering the information, this presentation will take some of the practices used in the Intelligence Community and realities when investigating malicious insider cyber threats. This framework shows analysts how they can properly and effectively gather that intelligence information.
This framework shows users the key areas that investigators/ analysts should look at in determining an insider threat.
Panel Participants:
-
Cyber Inter-Agency Cooperation Panel 3:25 pm
This week’s Conference brings together numerous agencies who collaborate to thwart cybercrime. In this panel, representatives from federal and state agencies will join together and take audience questions. Panelists will talk about what their organizations are doing to support the advancement of cybersecurity preparedness in the region. They will share best practices, and learnings from the real interactions they have day-to-day with organizations across the region.
Moderator:
Panel Participants:
-
Cyber Executive Panel 4:15 pm
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Moderator:
Panel Participants:
- Conference Closing Session 4:55 pm
- St. Louis Cybersecurity Conference Networking Reception & Happy Hour 5:00 pm
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners