Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Session One9:00 am - 9:30 am
State of the Art Security Event Analysis
In this talk, we’ll discuss how new approaches and technology advances allow Security Operations teams of all sizes to finally have the capacity of Fortune 100 Companies. Your small team can analyze billions of incoming security events daily using state-of-the-art techniques such as AI, ML, Expert Systems, and probabilistic math. We’ll also discuss the pros and cons of each of these approaches.
For a copy of this presentation, please contact Jane Dunne – Jane@respond-software.com
Raj is currently part of the Respond team focused on helping organizations with automation of Security Operations. Prior to Respond, Raj held Field, Product management and Development roles at Fortify Software, WorkSoft, Rational Software, and Pure Software focusing on SDLC and security.
Session Two9:30 am - 10:00 am
Threat Intelligence and Layered Security in the Equifax Era
The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.
For a copy of this presentation, please contact Denise Paruolo – firstname.lastname@example.org
Ted has worked with web and network security technologies for more than 20 years. He began his career in technology as a full-stack engineer in web development and design. As Chief Operating Officer, Ted guides the overall operations of Sentinel IPS, the CINS Active Threat Intelligence System, and all other supporting technologies. You may also find him presenting at an information security conference or trade show, spreading the word about shared threat intelligence.
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
Achieving “Always On” IT Resilience
It’s time to revolutionize your data protection strategy. Protecting and transforming your digital business for exceptional customer experiences requires an “always on” platform for disaster recovery, backup and cloud mobility. An IT Resilience Platform allows you to cost-effectively and swiftly manage both unplanned disruptions, including outages, ransomware attacks, and natural disasters, as well as planned events, such as moving to the cloud or data center consolidations.
With over 20 years of experience as a Systems Engineer, Allen Patterson, has designed high performing solutions for customers such as American Airlines, Paypal, General Motors, and Children’s Health. His current role is a Enterprise Systems Engineer with Zerto. In this role he supports enterprise customers across Texas, Oklahoma, Arkansas, and Louisiana. He develops solutions for Application Mobility, Business Continuance / Disaster Recovery and Long Term Retention utilizing the ZERTO platform.
Session Four11:00 am - 11:30 am
InNet partners with customers to design, deploy, and support a full suite of advanced technology solutions focusing upon enterprise and mid-market IT organizations and assisting in regards to networks, information security, business continuity, storage, cloud migration, virtualization and performance monitoring. As one of the most trusted solution providers in the Central and Eastern USA, InNet brings many years of valuable experience from a myriad of customer perspectives working with leading enterprise and corporate customers to deliver technology that meets business objectives.
Guardicore Centra – Building a software defined perimeter to protect your business.
Protecting critical assets, reducing the attack surface, segmenting any workload environment for compliance, breach detection in a hybrid environment.
Micro-segment internal data center, cloud or containerized crown jewels without any network modifications, faster deployment and ease of management.
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Keynote Session12:00 pm - 12:45 pm
This presentation describes how the FBI categorizes Cyber Threats and their impact on victims and industries.
It highlights some of the costs of Cyber Crime and some of the techniques used to target victims and compromise systems.
Awareness of the landscape will better equip companies to recognize possible threats to their business and take action to
defend themselves and protect their interests.
Special Agent Raymond Martinez has been with the FBI since 2009. He has a Bachelor’s of Business Administration in Information Systems from the University of Texas at San Antonio. Prior to joining the FBI he worked in the private sector as a Technical Coordinator. SA Martinez worked in the Los Angeles Field Office for over 8 years working Cyber investigations to include his assignment on the Los Angeles Electronic Crime Task Force. SA Martinez recently transferred to the San Antonio Field Office and is currently assigned to the Cyber Squad.
Break12:45 pm - 1:15 pm
Break / Vendor Booth Time
Session Six1:15 pm - 1:45 pm
Compromised User and Host Detection Using Behavioral Analytics
Studies show that over 80% of advanced attacks are attributed to external actors. Once these cyber criminals capture credentials that provide access to corporate networks, they are virtually undetectable by traditional defenses. During this session, we will discuss a variety of attacks utilizing compromised credentials and the benefits of utilizing behavioral analytics, machine learning and network data to identify and stop these attacks.
For a copy of this presentation, please contact Sabrina Wagoner – email@example.com
Ron Kent is a national technical specialist for Aruba Networks, and is based in Dallas, Texas. Ron is a 29 year veteran of the IT industry, a Certified Ethical Hacker, and has worked at companies such as RSA, Sybase, Business Objects, and Mattel. Before his time at Aruba, he spent almost a decade at RSA helping customers hunt down the forces of evil with SIEM and full packet capture solutions. When he isn’t tracking down the bad guys in the digital world, Ron enjoys spending time with his wife and family, and riding motorcycles in the Texas Hill Country.
Session Seven1:45 pm - 2:15 pm
The Future of Data Protection
Data is essentially inert and passive, lacking an inherent ability to either control its own fate or mitigate risks while at rest, in transit and under process. Data loss and theft is a result of the problem.
The safety of the data is wholly dependent on human behavior and infrastructure. In reality, the enterprise protects data indirectly through a static perimeter. Endpoints are managed, and trust assumed. This approach is not data-centric and has reached obsolescence.
This workshop will highlight a paradigm that imbues data with self-governance, provenance and protection capabilities, to make it the new perimeter and a source to rethink deployments, workflows, and responsibilities.
Jim Minie, Senior Solutions Engineer, is a 30+ year veteran in the Information Technology and Information Security industries. He has extensive knowledge of cybersecurity technology companies and their solutions, with direct experience as both customer/user and vendor.
Prior to Sertainty, Jim specialized in network design and implementation of security technologies including authentication/authorization, data encryption and key management, SIEM and Managed Security Services, User and Entity Behavior Analysis (UEBA), and others. His portfolio includes working for companies including Q1 Labs which was acquired by IBM, RSA Security, Symantec, a Fortune 50 financial company, and in the aerospace and brewing industries.
Jim’s accomplishments over his career include selling some of the largest IBM QRadar SIEM sales to a Who’s Who list of Fortune 1000 companies at the time, becoming IBM’s #1 Global Systems Engineer. This resulted in Jim personally achieving 700% of his On-Target-Earnings during a single year while at IBM.
Jim holds degrees in Management Information Systems/Management and Computer Science.
Break2:15 pm - 2:30 pm
Break / Vendor Booth Time
Session Eight2:30 pm - 3:00 pm
Certificate Management Challenges and How to Overcome Them
Join Kyle Grueninger, Vice President of Sales, The SSL Store™ as he discusses the difficulties businesses face when managing SSL in this new era of data protection. “Certificate Management Challenges and How to Overcome Them” will highlight key factors contributing to the increase in SSL usage, recent real-life examples of certificate expirations and their business impact, common challenges companies must solve to efficiently manage SSL, operational consequences of SSL mis-management and what to look for in effective certificate management solutions.
For a copy of this presentation, please contact Kyle Grueninger @ kyle@theSSLstore.com.
Session Nine3:00 pm - 3:20 pm
How Zero Trust Improves Cybersecurity
Learn how the Zero Trust approach to access and authentication mitigates risk of misuse and prevents lateral movement inside a critical IT network. When implementing authentication for the right user at the right time with the right level of privilege, this approach helps organizations keep up with today’s hybrid and multi-cloud environments by providing simple yet secure access control, convenience of use and improved visibility and auditability. Join our Jimmy Mills to learn why “Don’t trust, verify” is your slogan for the future.
For a copy of this presentation, please contact Kim Barnard – firstname.lastname@example.org
Jimmy Mills is a Senior Solutions Architect for SSH.COM and has worked with several large enterprises assisting and overseeing SSH Key Management remediation projects. He has 20+ years’ experience coming from Unix Engineering and Access Management roles before joining the thought leadership team at SSH.
CISO PANEL3:30 pm - 4:30 pm
Anthony CabralPartner / CISOClear Guidance Partners
Larry MooreGRC / Virtual CISOPivot Point Security
Marc KajiwaraVP Security and Compliance / CISOSchoox, Inc.
John FrushourDeputy Chief Information Security OfficerNew York-Presbyterian Hospital System
Ankit ChawlaManager, Security Architecture - CISOIBM
8:30 am - 4:30 pm500 East 4th StreetAustin, TX 78701512-482-8000