
Conference
Dallas
Cybersecurity Conference
Connect with your peers and industry experts at the Dallas Cybersecurity Conference for live, in-person sessions on topics ranging from cloud security, to protecting your organization from advanced threat actors. These engaging sessions will help you better navigate each new cyber threat that emerges.
At the Dallas Cybersecurity Conference, you’ll hear insightful keynotes on vital security topics to help learn the skills needed to stay ahead of cyber threats, while having the opportunity to network with fellow cybersecurity professionals. Sign up today to be notified when registration is open!
Take a look at all Data Connectors has to offer here!
Date
Thu. Sep 29
-
Featured Speakers
Cecil Pineda
Your First 100 Days as a CISO
Chad AdamsCISA Briefing
Chad AdamsCyber Inter-Agency Collaboration Panel
Wendy CassidyCyber Inter-Agency Collaboration Panel
David GranthamCyber Inter-Agency Collaboration Panel
Jeremy EhrhardtCyber Inter-Agency Collaboration Panel
Michael JacksonCyber Inter-Agency Collaboration Panel
Dave BelangerCyber Executive Panel
Raymond KingCyber Executive Panel
Cecil PinedaCyber Executive Panel
Sailaja Kotra-TurnerCyber Executive Panel
Dewakar GargCyber Executive Panel
Event Schedule
Times for this Event are in Central Time (CDT/CST).
The Conference will be open from 8:00 AM to 6:30 PM Thursday, September 29th.
- Welcome / Introductions
-
The Battle of the Algorithms: How AI is Beating AI at its Own Game 9:15 am
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats – wherever they strike.
Panel Participants:
-
4G/5G Network Security 9:35 am
Protecting organizational infrastructure, networks, and hardware devices is a never ending pursuit these days. There is a secure network solution that offers a simple to manage alternative to complex VPN infrastructures for securely connecting sites, vehicles, IoT, and remote workers. This session will cover how to secure remote sites with ease, reduce attack surfaces by building undiscoverable network resources, and how to provide any-to-any connectivity. Learn how to unlock operational agility through built-in tunnel orchestration and simplified configuration. It’s all about end-to-end WAN and network security services that tightly integrate with routing and security devices to establish encrypted connections to access applications and resources in the cloud or data center.
Speaker:
-
How to Keeping Your Business Flowing: Securing Email and Collaboration Tools 10:20 am
As businesses rely more on email and collaboration tools to run their operations, cyber-criminals are finding new ways to compromise remote workforces. Harmony Email and Collaboration protects cloud email and collaboration suites from cyber-attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as O365, Gmail, OneDrive, G-Suite, Teams, Slack, and many others. The platform deploys in 5 minutes via API to preventatively block phishing, spam, malware, data leakage, account takeover, BEC, and shadow IT across the organization.
Speaker:
-
Protecting Against Cyber Attacks 10:40 am
We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.
Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.
Panel Participants:
-
Insider Risk Program: Where Do I Start? 11:35 am
Many of you may be reading this from home, on the road, on a plane, in the office, a coffee shop or anywhere in between. The way in which work has fundamentally changed forever. And the way businesses safeguard their information also needs to change. Savvy security leaders are looking for proactive ways to better their security posture. Enter Insider Risk Management. Join Beth Miller, Senior Risk Advisor with Code42 to learn how, and where to start with an Insider Risk Program. During the session you will learn:
-What is insider risk, and why is it important to understand
-Why this approach is critical to the way we work today
-The path forward: People, process and technology
-Tips on how to get started
Speaker:
-
Managing Cloud Risk Without Slowing App Delivery 11:55 am
As organizations move workloads to the cloud they realize their software development approach needs to radically change. Securing the cloud requires a total re-think as well. Although security teams still need to manage access rights, fix vulnerabilities, and detect runtime threats, the techniques have evolved.
Learn how the largest financial services, media and software companies address cloud security. You will gain insight into the top security challenges and pragmatic techniques to manage cloud risk without slowing down application delivery. Nick Fisher, VP of Product Marketing, will share our customers’ best practices for securing containers, Kubernetes and cloud services.
Speaker:
- Lunch Break
-
Your First 100 Days as a CISO 12:50 pm
Is there really a formal set of plans for your First 100 Days as a CISO? Yes and no. On my 3rd tour as a CISO, it’s always good to have a plan for your First 100 days– more than likely, those plans will be great references at the very least. Every organization is different, you need to understand compliance and contractual obligations, risks and threats, business complexities, assets (IT assets, data, etc), service providers, leaders and people, past incidents, and many others. On your first 100 days, understanding of the business is key and the maturity and gaps of the organization’s security program – will be crucial. There is one critical area that will take time to understand and that “thing” plays an important factor in the success of your security program.
Speaker:
-
Immutable Storage: Level-Up Your Ransomware Readiness 1:50 pm
Data is expected to grow to 200 ZB by the end of 2025. That means more data to manage, more data to protect. IDC now recommends a 3-2-1-1 best practice as a mid-market data protection strategy. The addition of the new “1” is a copy of the data on immutable storage. Backup data is a key tool in business continuity & disaster recovery planning. Securing this backup data and maintaining multiple copies allows for a resilient recovery plan – and it’s critical that your cyber security plan includes a reliable recovery plan. In the event of any disaster, natural or man-made, like a ransomware attack, getting your IT systems and workloads back on their feet as fast as possible is essential. Join us for this do-not-miss discussion as we share best practices to help keep your data protected and secure via multiple layers of defense.
Speaker:
-
Threat Hunting: How to Grow and Retain Cyber Security Ninjas 2:10 pm
In an ever-evolving threat landscape your current Prevent and Detect controls may not be enough. In this presentation Secureworks threat hunter Robert Higham will explain what exactly threat hunting is and how it can help your organization. Hear the top five lessons learned from threat hunting and a few tips on what you can do to get started and help your business beat the threat.
Speaker:
-
Reducing 3rd Party Cyber Risk with Actionable Insights 2:50 pm
Presented by Cyber Watch Systems and CyberGRX
On average, 200 third parties have access to an enterprise organization’s systems on a given day and that number is expected to grow by 15% in the next year. Each of those 3rd parties represent an opportunity for a bad actor and the risk of data loss for your company. Traditional 3rd party cyber risk management has not been properly prioritized or effective at preventing data breach with approximately 52% of breaches originating outside the organization.
At the heart of an effective 3rd party risk program is data intelligence that can provide complete visibility and even predictive risk analysis at scale. We will discuss methods to increase the effectiveness of your 3rd party cyber risk program by using a holistic approach to produce actionable insights, reduce time to value, and expand the scope of coverage.
Speaker:
-
CISA Briefing 3:10 pm
The Department of Homeland Security (DHS) Cyber Infrastructure Security Agency (CISA) first issued its “Shields Up” warning in mid-February. Working with other agencies, important information is updated regularly at cisa.gov/shields-up. Consolidating that information and a host of the intelligence that CISA has made available, Mr. Chad Adams, Cyber Security Advisor, Region 6, will go over the nature of the current threats posed by these and other pressing headlines.
Speaker:
-
Cyber Inter-Agency Collaboration Panel 3:40 pm
Moderator:
Panel Participants:
-
Cyber Executive Panel 4:30 pm
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Moderator:
Panel Participants:
- Conference Closing Session 5:15 pm
- Happy Hour Networking Reception 5:30 pm
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners