
Conference
Tampa
Cybersecurity Conference
When it comes to staying on top of your organization’s security needs, it is vital to make connections and learn from experts. Attend the Tampa Cybersecurity Conference with thought leaders and luminaries face-to-face and gather insights on the latest trends and threats in cybersecurity.
These conferences gather IT professionals from the local community and feature extensive training sessions, live Q&A panels, access to solution providers, and networking opportunities. Join us at the Tampa Cybersecurity Conference to earn CPE credits and enjoy a networking reception with peers!
Take a look at all Data Connectors has to offer here!
Date
Thu. Mar 02
-
Featured Speakers
Justin Crenshaw
Guest Keynote: Justin Crenshaw
Larry Whiteside Jr.2023 Trends & Directions
Jason Miller2023 Trends & Directions
Steven Rodin2023 Trends & Directions
Nikunj Nagalia2023 Trends & Directions
Bill Steele2023 Trends & Directions
Bryan Langley2023 Trends & Directions
Mathieu GorgeKeynote Presentation: Mathieu Gorge
The Cyber Elephant in the Board RoomSigned Books by Keynote Speaker Mathieu Gorge
James J.W. GrantGuest Keynote: Jamie Grant
Hadas CassorlaGuest Keynote: Hadas Cassorla
Rick DeanCyber Inter-Agency Collaboration Panel
Philip KapustaCyber Inter-Agency Collaboration Panel
Kelly ShannonCyber Inter-Agency Collaboration Panel
Michael Pierno, MEP, USCG(ret)Cyber Inter-Agency Collaboration Panel
Kristopher D. PagittCyber Inter-Agency Collaboration Panel
Hadas CassorlaCyber Executive Panel
Steve HindleCyber Executive Panel
James J.W. GrantCyber Executive Panel
Martin ZinaichCyber Executive Panel
Anil VargheseCyber Executive Panel
Event Schedule
Times for the Tampa Cybersecurity Conference are in Eastern Time (CDT/CST).
The Conference will be open from 8:00 AM to 6:30 PM Thursday, March 2nd.
- Welcome / Introductions
-
Best of Both Worlds: Privileged Access Management 8:30 am
As the cybersecurity landscape continues to evolve, protecting organizations from daily cyber threats is becoming increasingly difficult. According to the Verizon Data Breach Investigation Report, over 90% of successful Windows breaches occur due to users having privileged access. To avoid being included in this year’s report, it’s important to take a major step in cybersecurity planning by removing local Admin rights from end-users. However, this can be challenging as it may result in end-users becoming frustrated when they need to request updates.
Speaker:
-
Using the dark web to gather pre-attack intelligence 8:50 am
Presented by SearchLight Cyber
Defining the pre-attack stage of a cyberattack:
- How intelligence on the pre-attack tactics of threat groups can help organisations pre-empt and prevent attacks
- Real life examples of when threat groups’ pre-attack reconnaissance and resource development activity could be observed in the dark web
- How dark web intelligence can be mapped to pre-attack tactics of the MITRE ATT&CK framework to practically improve defences.
Speaker:
-
Hybrid Cloud Cyber Resiliency from Prevention to Recovery 9:45 am
Malicious actors are attacking companies of all sizes, necessitating an enterprise-quality cyber resiliency strategy and scalable toolset for small and medium sized organizations. The likelihood of ransomware attacks has transitioned from ‘if’ to ‘when,’ and many discover too late that they have gaps in their disaster recovery plans.
Do you have the right people, tools, and testing in place to protect your most valuable asset 24/7 – your data?
Get key insights from Storagepipe on the benefits of a multi-layered Cybersecurity framework to protect cloud and hybrid IT environments for businesses of any size.
Speaker:
-
How AI Can Think Like an Attacker 10:15 am
In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.
Speaker:
-
Why Validating Your Security Posture Matters 10:45 am
Security leaders make significant investments in best-of-breed security solutions, pentesting, and ransomware assessments each year. Yet, organizations are breached daily. As Einstein said, “Insanity is doing the same thing over and over again and expecting different results.” Security leaders need a paradigm shift. Proactive security models have gone mainstream and can be easily adopted by organizations to stay ahead of their adversaries. This session will discuss lessons learned from the trenches and outline best practices to shift to a proactive security program.
Speaker:
- Guest Keynote: Justin Crenshaw 11:25 am
-
2023 Trends & Directions 12:00 pm
If 2022 taught us anything, it’s that cybercriminals are still coming up with new ways to cash in. But with a new year upon us, what can we anticipate for 2023?
Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. You’ll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. Get a better sense of how your organization can spend the rest of 2023 with a security strategy that will set you up for success during this insightful discussion.
Moderator:
Panel Participants:
- Lunch Break
-
Keynote Presentation: Mathieu Gorge 1:10 pm
Making sense of Geopoltical Risks in 2022 – Impact on Cybersecurity & Compliance
There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2022 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2023 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes?
Speaker:
- Signed Books by Keynote Speaker Mathieu Gorge 1:40 pm
-
METHODS FOR DETECTING RANSOMWARE: PROS AND CONS OF EACH 2:05 pm
In the fight against ransomware, much of the discussion revolves around prevention and response. Actually detecting the ransomware, however, is just as important to securing your business
Detection sits right between both prevention and response, and it’s a critical first defense against ransomware. The truth is that ransomware will get through your systems one way or another. And when it does, it’s important to detect it right away so you can stop it from moving through your network and encrypting any valuable or sensitive files.
But detecting ransomware can be tricky. Attackers use obfuscation and evasion techniques to avoid detection, and new ransomware variants are being produced every day. As a result, businesses should be using multiple different ransomware detection techniques, fully aware of the pros and cons of each.
In this presentation, we’ll take a look at 5 ransomware detection techniques and their pros and cons, as well as make recommendations for what organizations should look for in an anti-ransomware EDR.
Speaker:
-
Zero Trust, UEBA, and You: The Power of Human Insight in Cybersecurity 2:25 pm
In this presentation, we will discuss the synergies between Zero Trust and User and Entity Behavior Analytics (UEBA) in addressing human-related security threats. Zero Trust is an effective approach to securing access to applications and resources, but it still requires a comprehensive strategy to addressing human-related security threats. UEBA uses machine learning algorithms to detect and respond to anomalous behavior in users and devices, providing an additional layer of security to Zero Trust. We will provide practical insights on how to implement Zero Trust and UEBA, including key considerations such as data privacy, compliance, and governance. Attendees will gain an understanding of how these technologies can be used to build a comprehensive and proactive approach to cybersecurity.
Speaker:
-
Guest Keynote: Jamie Grant 2:45 pm
Creating Florida’s First Cybersecurity Program: Lessons Learned So Far
Nation-State attacks are not always focused on political or military adversaries. Recently, below-military-grade action can create havoc or destabilize adversaries, or manipulate markets. Hard to trace and even harder to convict, they may affect stock price or even influence the outcome of elections.
Attend to talk about the problem, and see what US enterprises are doing to prepare themselves for these situations.
Speaker:
-
Guest Keynote: Hadas Cassorla 3:35 pm
Nobody Cares That You Can Do Your Job: And How To Fix That
A pervasive problem in our industry is that no one thinks the executives or board understand or care about security. That leaves leaders and teams feeling disconnected and ineffective. This keynote will provide the tools and solution on how to tell the security story so that you are better heard and more successful.
Speaker:
-
Cyber Inter-Agency Collaboration Panel 4:05 pm
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Panel Participants:
-
Cyber Executive Panel 4:50 pm
Submit your bio for consideration to participate in one of our Cyber Executive Panels
to [email protected] or fill out our Call for Speakers form here.
Moderator:
Panel Participants:
- Conference Closing Session 5:20 pm
- Happy Hour Networking Reception 5:30 pm