
Conference
Kansas City
Cybersecurity Conference
Join the Kansas City Cybersecurity Conference to hear from some of the industry’s leading experts from across the country. You will hear from industry experts on topics vital to keeping up with the ever-changing landscape of cybersecurity.
The Kansas City Cybersecurity Conference will allow you to interact with representatives from some of the world’s top cybersecurity solutions providers, as well as network with fellow cybersecurity professionals.
Take a look at all Data Connectors has to offer here!
Date
Thu. Mar 30
Location
DoubleTree by Hilton Kansas City-Overland Park
10100 College Blvd
Overland Park, KS 66210
+1 913-451-6100
-
Featured Speakers
Mathieu Gorge
Keynote Presentation: Mathieu Gorge
The Cyber Elephant in the Board RoomSigned Books by Keynote Speaker Mathieu Gorge
John FelkerGuest Keynote Presentation: John Felker
John FelkerCyber Inter-Agency Collaboration Panel
Jake StreetCyber Inter-Agency Collaboration Panel
David L. TeskaCyber Inter-Agency Collaboration Panel
Joshua BryantCyber Inter-Agency Collaboration Panel
Tyrone Watson-FergusonCyber Executive Panel
Yaron LeviCyber Executive Panel
Jeff WagnerCyber Executive Panel
Neil WatkinsCyber Executive Panel
Carraig StanwyckCyber Executive Panel
Event Schedule
Times for this Event are in Central Time (CDT/CST).
The Conference will be open from 8:00 AM to 6:30 PM Thursday, March 30th.
- Welcome / Introductions
-
How Does My Small Team Standup to a Ransomware Attack? 9:00 am
Small Team Strategies and Defense for Ransomware Attacks
Ransomware attacks show no sign of slowing down, and a majority target small and medium size organizations. How do these organizations defend themselves with major resource constrainers, no security operations center, and maybe a working SIEM?This interactive presentation will look at how a ransomware attack unfolded against a small manufacturing company, the steps the company took to recover, and their final overall costs and losses. From those lessons learned, we will devise an actionable ransomware strategy, including risk reduction, early detection, technology fit, and process best practices – all in the context of what is operationally sound and affordable for a small team.
Speaker:
-
How AI Can Think Like An Attacker 9:20 am
In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveiled an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.
Speaker:
-
What Does it Mean to be Cyber Resilient? 10:15 am
Reactive measures against cyberattacks are only part of having a strong security posture. To be truly cyber resilient, you need to ensure that your organization can:
- Anticipate what threats are targeting your industry
- Withstand cyberattacks to limit their impact\
- Recover from cyberattacks quickly with minimal to no damage or losses
- Adapt to the evolving threat landscape
But how exactly can you check off all of these boxes?
With the right tools and practices in place, you can cover all of your bases and increase your resilience against various cyber risks without straining your security team. This can look like:
Implementing a Phishing and Security Awareness Training (PSAT) program to educate employees on the latest TTPs used by cybercriminals relevant to your industry
Engaging a 24/7 Managed Detection and Response (MDR) for Cloud provider to enable threat detection, investigation, and proactive response across your multi-cloud environment
Adopting a comprehensive Vulnerability Management program that enables continuous awareness of the threat landscape
Cyber threats never rest. An effective cyber resilience strategy will help you make the most of your cybersecurity resources and IT spend without having to compromise any defense measures.
Speaker:
-
MDR Done Right 10:35 am
Managed Detection & Response (MDR) is an attractive time- and cost-saving solution that allows you to remediate advanced threats in your environment while unburdening your staff. But what does effective MDR really mean—and what does it take to deliver it well?
We’ll look at trigger points for investing in MDR and the best criteria for selecting an MDR vendor. We’ll also highlight a day in the life of a SecOps analyst and share practical advice on maximizing your MDR investment.
Join us to hear insights on how MDR can make an impact on your organization in helping you beat the threats.
Speaker:
-
Keynote Presentation: Mathieu Gorge 10:55 am
Making sense of Geopoltical Risks in 2023 – Impact on Cybersecurity & Compliance
There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2022 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2023 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes?
Speaker:
- Signed Books by Keynote Speaker Mathieu Gorge 11:40 am
- Lunch Break
-
Lunch Demo: Zero Trust- Does Not Have to be Hard 12:05 pm
Learn about the who, what, and how in zero trust.
Speaker:
- Lunch Demo: OneForce 12:15 pm
-
2023 Trends & Directions in Cybersecurity 12:25 pm
If 2022 taught us anything, it’s that cybercriminals are still coming up with new ways to cash in. But with a new year upon us, what can we anticipate for 2023?
Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2023 with a security strategy that will set you up for success during this insightful discussion.
Panel Participants:
-
Demystifying IoT Devices on the Network 1:20 pm
The number of IoT devices continues to grow at an impressive rate every year, with the total number pushing nearly 15 billion. These unmanaged devices easily circumvent existing corporate policies and controls as they often lack the ability to be monitored via endpoint security solutions, asset management, etc. This lack of both visibility and ability to control makes it virtually impossible to understand what an organization’s true threat landscape is. This presentation is the culmination of several years of research into identifying, tracking, and reporting on unmanaged devices using behavioral cues fundamental to how IoT devices function.
Speaker:
-
Data Security Posture Management (DSPM) - What is it? How will it benefit my organization? 1:40 pm
Security and risk managers face challenges mitigating data security and privacy risk as sensitive data rapidly proliferates across on-premises and cloud environments.
According to Gartner, successful risk mitigation today requires leveraging DSPM technology that provides visibility into 4 key areas: where sensitive data resides, who is accessing it and how, and the pathway to quick remediation.
You can’t unsee a security issue once you’ve identified it;DSPM technology puts you in a position to take effective action. In this session, learn the fundamentals of DSPM, and how using it as the basis for conducting risk assessments and implementing and enforcing data governance policies can improve your organization’s security posture.
Speaker:
-
Guest Keynote Presentation: John Felker 2:00 pm
Cybersecurity Leadership Lessons, from Hawaii to Afghanistan
If it’s not Illegal, immoral, or unethical – it’s on the table. John Felker led some of our nation’s largest and most important groups within consequential missions related to security, defense and protection. Pulling from his experiences at CISA, NCCIC, the US Coast Guard Cyber Command, and more, he will share with the Conference audience his most prescient takeaways from a lifetime of service, with a specific focus on cybersecurity.
Today, cybersecurity leaders are uniquely positioned to lead their peers and the organizations they serve as we are among the most sought-after, read-in, and connected executives in our respective firms. Patching together a depth of technical knowledge, Mr. Felker will focus on further developing information gathering practices, leadership style, and effective decision making in team-based environments that will embody your character as a leader and at the same time encourage the loyalty and compliance of staff at all levels.
Look for best practices on delegation, setting metrics, training, accountability, and building effective teams in this unique presentation from a monumental executive leader.
Speaker:
-
The Importance of Measuring Risk 2:50 pm
Presented by Whitehat Virtual Technologies
Securely optimizing the cloud for better business outcomes is the product of clear communication of terms and expectations, alignment with business processes and functions, and partnerships among multiple internal and external stakeholders. “Activity” does not equal “progress.” In this session, attendees will hear about creating definitional clarity, building adaptability, and creating cross-functional, business-wide alignment.
Speaker:
-
S.O.S. - Saving Our Sanity: How Managed Detection and Response Rescues IT Pros 3:10 pm
This presentation will focus on how Managed Detection and Response (MDR) can help IT professionals save their sanity. IT professionals often face the challenge of managing large volumes of security data, which can be overwhelming and time-consuming. MDR is an approach that can help IT professionals to detect and respond to cyber threats in real-time, while reducing the burden of managing security operations.
The presentation will cover the benefits of MDR, including real-time threat detection and response, continuous monitoring, and access to cybersecurity experts. It will also explore how MDR can help IT professionals to improve their overall security posture, reduce the risk of data breaches, and enhance their organization’s compliance with industry standards.
The presentation will conclude with practical tips on how IT professionals can select the right MDR service provider and how to work with them to maximize the benefits of the service. Attendees will leave the presentation with a better understanding of how MDR can help them to manage their security operations more effectively, reduce their workload, and ultimately, save their sanity.
Speaker:
-
Cyber Inter-Agency Collaboration Panel 3:30 pm
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Moderator:
Panel Participants:
-
Cyber Executive Panel 4:20 pm
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
- Conference Closing Session
- Networking Reception and Happy Hour 5:00 pm
-
Partners
Gold Partners
Silver Partners
Bronze Partners
Exhibitor Partners
Affiliate Partners