Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session Two9:15 am - 9:45 am
The Five Tenants of Wi-Fi Security
David Coleman, author of the Certified Wireless Security Professional Study Guide, discusses the five tenants of Wi-Fi security. An overview of the Robust Security Network (RSN) security mechanisms that are defined for WLAN security. Learn about current Wi-Fi security capabilities and what is coming next with the WPA-3 Wi-Fi security certification.
David Coleman is a wireless mobility consultant, public speaker, and trainer. For the last twenty years, David has instructed IT professionals from around the globe in enterprise WLAN design, WLAN security, WLAN administration and WLAN troubleshooting. In his spare time, David writes white papers, blogs, and books about enterprise Wi-Fi networking. David is the co-author of Sybex Publishings Certified Wireless Network Administrator (CWNA) Study Guide and numerous other books about Wi-Fi. David is the Senior Product Evangelist for Aerohive Networks and is CWNE #4.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
A New approach to email security for Office 365
For hackers, Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Session Four10:45 am - 11:15 am
Top 5 Ransomwares in 2019 and How to Protect Against Them
Jason Snook, (CISM) Certified Information Systems Manager and (CBCP) Certified Business Continuity Professional navigates the Ransomware headlines dominating the news so far in 2019. Our discussion will answer which Ransomware variants are making noise in the world, what they target, and ultimately how to prepare to mitigate these threats. Learn the keys to Ransomware response and how to ensure your company is ready to battle the latest threats.
Jason lives, works, and plays in Eugene Oregon. He’s been working in IT as a system engineer, network engineer, and finally IT director for over 15 years. He’s worked on the customer side engineering solutions working with vendors, and dealing with the buying end of technology prior to working with Quorum. Jason’s been at Quorum for over 4 years as a Solutions Architect and brings that customer perspective to the world of technology sales.
Lunch11:15 am - 11:45 am
Break / Vendor Booth Time / Lunch
Break12:45 pm - 1:00 pm
Break / Vendor Booth Time
Session Six1:00 pm - 1:30 pm
Secure Networking – Simplified
This session is designed to demonstrate that it is time we re-think how we design networks. Using HIP (Host Identity Protocol) we can literally create secure, zero trust networks in seconds that enable businesses to address SCADA requirements, Micro Segmentation initiatives, HIPPA/PCI compliance and more.
Cal Jeffrey has been in the Network and Cyber Security industry for nearly 30 years. He has worked for the most prominent companies in Network Security and been involved with global deployments at some of the largest international companies across numerous industries.
Session Seven1:30 pm - 2:00 pm
The current Malware Threat Landscape – and Best Practices for Enterprise Grade Remediation
Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.
This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.
Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.
Krishnan Natarajan is Senior Director for Malwarebytes, based in Santa Clara California. He has experience with multiple areas of information security: web application security, user and entity behavior analytics, insider threat, data loss prevention, and endpoint security. Prior to Malwarebytes, Krishnan has held leadership roles at several S.F. Bay Area companies including Whitehat Security, Dtex Systems, and Hewlett-Packard. Krishnan is alsoactive in the security community as the manger in the 400,000 member Information Security Community on LinkedIn. He holds undergraduate and graduate degrees from M.I.T.
Break2:00 pm - 2:15 pm
Break / Vendor Booth Time
Session Eight2:15 pm - 2:45 pm
The top Security Challenges and how AI/Machine Learning is evolving to Address
In this presentation we’ll discuss a number of issues contributing to the increasing number of breaches and how we can leverage the latest advances in AI/ML to turn this trend around.
The issues that we’ll discuss are: Conventional tools only combat known attacks. The incredible increasing volume of data. Outsourced Managed Security Service Providers (MSSP) Operations are mostly failing at preventing breaches. Alert Overload. Lack of Security Professionals. Lack of subscribing to and managing environments to a Security Framework. Average time to fully contain a breach is lengthening. The cost of a breach remains very expensive. The length of time to identify a breach is barely improving. Efficacy of Conventional Security tools averages only 85%. Almost every company needs more money for cybersecurity but won’t get it.
For each of the above challenges there are new approaches that need to be understood and potentially leveraged to reduce risk.
Pete is currently Cybraics “Chief Data Officer” and has global responsibility for Systems Engineering, Analyst Relations, and assists in Product Development, Marketing, Customer Engagements and Operations.
Pete is the former CISO of Hertz Rent a Car Global Holdings, CISO of Virtustream (a Dell company) and VP of Security engineering at Terremark/Verizon. Pete has been a local South Florida trailblazer being the CEO of an MSSP, a wireless ISP, a network engineering company and a CRM telephony company.
Pete has 31 years of progressive responsibility in the deployment, marketing, sales, product development, engineering design, project implementation and operation of information technology, IaaS/SaaS/PaaS, cloud, data center operations, the entire spectrum of security technologies, compliance frameworks and Managed Security Service Provider services and operations.
In 2017, Pete was selected as a “Top 100 Global Chief Security Officers” by Hot Topics Magazine.
Pete’s cloud security deployments and designs have been rated by Garter as #1 and #2 in the world and he literally “wrote the book” on secure cloud reference designs as published in Intel Press: “Building the Infrastructure for Cloud Security: A Solutions View.”
Pete is a former president of the South Florida ISSA and started the Chili cook off and Hack for the Flag Contest still going strong!
Pete enjoys mentoring security professionals and had some prodigies that have really had some great success!
Pete lives in the Keys with his wife Jenifer and has 3 kids, two away at collage spending his retirement money.
Session Nine2:45 pm - 3:15 pm
Application Security in an Ever Changing Digital Landscape
Why is application security such a crucial function of any robust Cyber Security Program. We will take a look at the findings from our latest research on application security vulnerability trends. Why is application security still the weakest link in most programs and how to position application security programs successfully in an organization. We will dive into why application security is solved by one or more products, but by a comprehensive program. Most importantly, what are the key steps companies have taken to establish application security programs that have really moved the needle with respect to reducing the application attack surface.
Stan Wisseman is a Chief Security Strategist and Business Solutions Director for MicroFocus security products. In these roles, Mr. Wisseman is responsible for providing driving business, but also providing thought leadership and insight regarding the ever-changing global threat landscape. Mr. Wisseman has over 30 years of information security experience and has built security into products, systems, software, and enterprises. He led application security consulting practices at Cigital and Booz Allen Hamilton. While serving as Deputy CISO at Fannie Mae, he helped establish an application security program. Mr. Wisseman has a Masters from Santa Clara University and is CISSP, CISM, CSSLP, CCSK certified.
Break3:15 pm - 3:30 pm
Session Ten3:30 pm - 3:50 pm
Sertainty enables you to build from a new foundation. Our technology makes it easy to configure and mix intelligence into ordinary data-files empowering its ability to act and react.
Sertainty shifts data control and risk mitigation from an indirect/re-active paradigm to a direct/active paradigm by driving governance, provenance and protection INTO YOUR DATA and technology solutions. We call this Data: Empowered.
CISO Panel4:00 pm - 5:00 pm
Mark GelhardtVP, Technology GovernanceUS Bank
Ben HalpertVP, Risk and Corporate SecurityIonic Security
Tamika BassChief Information Security OfficerGeorgia Department of Public Health
Chris BullockChief Executive OfficerCyber Investigations & Intelligence Agency
Dexter CaffeyChief Executive OfficerSmart Eye Technology
8:15 am - 5:00 pm2 Galleria Pkwy SEAtlanta, GA 30339770-955-8000