
Conference
Houston
Cybersecurity Conference
Connect with your peers and industry experts at the Houston Cybersecurity Conference for live, in-person sessions on topics ranging from cloud security, to protecting your organization from advanced threat actors. These engaging sessions will help you better navigate each new cyber threat that emerges.
At the Houston Cybersecurity Conference, you’ll hear insightful keynotes on vital security topics to help learn the skills needed to stay ahead of cyber threats, while having the opportunity to network with fellow cybersecurity professionals. Sign up today to be notified when registration is open!
Take a look at all Data Connectors has to offer here!
Date
Thu. Jan 26
Location
5060 West Alabama
Houston, Texas 77056
1-888-236-2427
-
Featured Speakers
Mike Alvarez
Guest Keynote Presentation - Sgt. Mike Alvarez
Clarke SkobyCyber Inter-Agency Collaboration Panel
Steve LupoCyber Inter-Agency Collaboration Panel
Scott McHughCyber Inter-Agency Collaboration Panel
Chris WolskiCyber Executive Roundtable
Philippe FlichyCyber Executive Roundtable
Pierluigi StellaCyber Executive Roundtable
Chris NicolaouCyber Executive Roundtable
Michael OberlaenderCyber Executive Roundtable
Harvey NuszCyber Executive Roundtable
Event Schedule
Times for this Event are in Central Time (CDT/CST).
The Conference will be open from 8:00 AM to 6:30 PM Thursday, January 26th.
- Welcome / Introductions
-
Reducing Cyber Risk 9:10 am
Reducing Cyber Risk comes with challenges. Lack of actionable information, excess noise, and too many tools deteriorates security postures and efficiency. Overcoming these challenges can be accomplished with a new perspective on Security.
Speaker:
-
Automating Cyber Risk Prioritization 9:30 am
With increasing threats, challenging economic environments, budget limitations, and cyber talent shortages, how can security leaders efficiently manage cyber risk at scale?
This session discusses opportunities for identifying, automating, and prioritizing cyber risk throughout an organization’s attack surface.
- What opportunities are there for automating the identification of the most impactful threats amongst the noise in the vast amounts of vulnerability and threat data?
- Incorporating context to the likelihood of threat scenarios and the impact to organizations goes beyond traditional CVSS-based vulnerability ranking.
Speaker:
-
Users Love Passwordless, But What Does IT Get Out of It? 10:15 am
Presented by Secret Double Octopus
Can you imagine returning to the bad old days of typing 6-digit pins on your smartphone? Phishing-resistant passwordless MFA is like that, the workforce loves it, but the big winner is IT. Relieving users from password management separates them from infrastructure administration, giving IT speed and agility without user coordination. It is the one thing IT leaders bring to the business that delights users, slashes the attack surface, lowers operating costs, and placates regulators and cyber insurance actuaries.
Join this session to learn the dollars & sense and explore implementation options for going passwordless.
Speaker:
-
Importance of Validating Your Security Posture 10:45 am
For years, organizations have invested millions of dollars into best-of-breed security solutions. Yet, organizations are breached daily. Modern challenges require modern solutions. Stop assuming you are secure and prove security effectiveness before attackers come after your organization.
The audience will gain understanding in:
- Proactive security models vs. reactive models
- Answers to the test is NOT cheating
- Optimizing security solutions to become ransomware resilient
- Quantify risk in your environment with binary artifacts.
Speaker:
-
APIs, Botnets, DDOS: Target of Multi-Mode Attacks 11:25 am
Presented by Cyber Watch Systems & Threatx
APIs and web applications are often the holy grail for attackers. These adversaries see great value in these assets and exert significant time and creativity to evade rules-based detection techniques. ThreatX goes far beyond the basics of rules by inspecting the specific behaviors of an adversary over time. Through this inspection, ThreatX’s Attacker-Centric Behavioral Analytics (ACBA) enable security teams to stay ahead of an ever-changing threat landscape and defend against attackers’ intent on exploiting traditionally vulnerable web applications and APIs.
Speaker:
-
Protecting Against Cyber Attacks 11:45 am
We’ve seen the real-world consequences of cyberattacks – from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. The impact of a single attack can be far-reaching and devastating to all those affected. When paired with unprecedented geopolitical uncertainty, it’s never been more important for organizations to be vigilant against bad actors.
Learn the latest techniques for developing your security posture with this expert panel discussion. Come prepared with your thoughts and questions and gain an insider’s perspective on the latest threats and most effective security strategies during this thoughtful, interactive session.
Moderator:
Speakers:
- Lunch Break
-
Keynote Presentation - Chris Wolski 12:55 pm
Are You Ready!!!
It is not a matter of if, but a matter of when.” The “when” happened at Port of Houston and it didn’t come the way most companies prepare for. When it happened, we were ready to execute the response and, through proper delegation, stopped the attack.
Speaker:
-
Risky Links - It is More Than Just Email 2:00 pm
Risky links come to us in several ways;slack, LinkedIn, SMS – it’s almost unending. In fact, it just may be. The good news is that a link opens mostly in one place, the browser. ConcealBrowse will isolate the risky links when they are opening and protect the user from the malware being deployed.
Speaker:
-
Maximizing Your Current Toolset with a Visibility Fabric 2:20 pm
How to maximize the value of your existing toolset for Visibility
Speakers:
- Guest Keynote Presentation - Sgt. Mike Alvarez 3:00 pm
-
Cyber Inter-Agency Collaboration Panel 3:30 pm
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
-
Cyber Executive Roundtable 4:25 pm
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Moderator:
Panel Participants:
- Conference Closing Session 5:05 pm
- Happy Hour Networking Reception 5:10 pm
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibiting Partners
Affiliate Partners