Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Session One9:00 am - 9:30 am
Achieving “Always On” IT Resilience
It’s time to revolutionize your data protection strategy. Protecting and transforming your digital business for exceptional customer experiences requires an “always on” platform for disaster recovery, backup and cloud mobility. An IT Resilience Platform allows you to cost-effectively and swiftly manage both unplanned disruptions, including outages, ransomware attacks, and natural disasters, as well as planned events, such as moving to the cloud or data center consolidations.
Russ has enjoyed 19 plus continuous years of focused technology management and consulting – in the Hosting, Storage, Cloud and managed services industries.
His career has provided him with a wide breadth of technology understanding from data communication, networking, security, and cloud. His long tenure and focus in the technology sector provides a unique perspective on understanding technology challenges and pairing them with solutions that deliver true business value.
Session Two9:30 am - 10:00 am
A Practical (low cost) Approach to Securing East-West Traffic & Critical Data
Despite best efforts organizations continue to struggle detecting and stopping attacks that lead to costly exposures of critical data.
Why is this? One reason is that organizations typically do not have a simple means to provide visibility to threat as they move East-West across their network. Leaving them blind to up to 80% of their threat surface.
Come learn how to leverage simple techniques to make your existing threat detection and investigation processes much more effective.
Learn also how to add layers of defense to protect your most critical assets.
For a copy of this presentation, please contact Amy Carey – firstname.lastname@example.org
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
Avoiding Mistakes During Breach Response and Hunting for Threats on Your Network
There are some key mistakes that organizations makes when dealing with breach response. Let’s take a look at them along with some tips for effectively hunting for threats.
Tejas Pargaonkar is an Enterprise Systems Engineer within RSA’s NetWitness product group. At RSA, he primarily focuses on helping customers secure their environments from modern attacks using RSA’s technology. Additionally, he is an active member of the RSA Conference Security Operations Center team. Tejas has been in information technology for nearly a decade and holds a B.S. in Electrical Engineering from the Georgia Institute of Technology.
For a copy of this presentation, please contact Carrie Everett-Vaughan – email@example.com
Session Four11:00 am - 11:30 am
Lightweight Deception. Heavyweight Results.
- Cyber challenges to security
- Turning an attackers strength to a weakness
- Efficient and practical internal deception
- Using deception to turn the tides
As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader. Frank also is co-inventor of a patent issued for selectively regulating network traffic. Francesco is an experienced network engineer and prior to PacketViper, held the Director of Information Security and Technology position at Liberty USA, Partner and Director of Libcom Internet Services ISP, Sr Network/Systems Engineer, Architect, and PM for nationally based technology businesses such as The Future Now, XLConnect, and MicroAge. Francesco holds a BS in Technical Management from Embry-Riddle University. Francesco is a decorated veteran that served twelve years in the US Army Assualt Helicopter Battalion at FT Drum, and Schoefield Barracks.
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Keynote Session12:00 pm - 12:45 pm
E-Skimming – A new twist on an old trick
Mark Grantz is a Supervisory Special Agent in the U.S. Secret Service’s Technical Security Division. Mr. Grantz has been with the Secret Service for 19 years and has over 25 years of law enforcement experience. During his tenure with the government, Mr. Grantz has overseen high level, international investigations, managed intrusion detection and video surveillance systems at the White House and other protected facilities and is presently the manager of the Secret Service’s Network Operations Center. Working within the Critical Systems Protection program, Mr. Grantz assists in the implementation of security controls on networks, information systems and critical infrastructure to eliminate or reduce the risk of cyber-attack, which could have an adverse effect on the life and safety of a protectee or disrupt the implementation of a Secret Service physical security plan. Mr. Grantz has spoken internationally as a plenary and keynote speaker on the subjects of cyber-crime and insider threats, was recognized by the Department of Justice as an expert witness in the field of Eastern European Cyber-Crimes and was a co-author of the paper “Toward an Adaptive Structuration Model of International Cyber-Crime”.
Break12:45 pm - 1:15 pm
Break / Vendor Booth Time
Session Six1:15 pm - 1:45 pm
How Zero Trust Improves Cybersecurity
Learn how the “Don’t trust, verify” Zero Trust approach to cybersecurity prevents lateral movement inside a network by implementing authentication for the right user at the right time, to the right applications. Zero Trust helps organizations keep up with today’s hybrid and multi-cloud environments by providing simple yet secure access control while improving visibility and auditability.
Jimmy Mills is a Senior Solutions Architect for SSH.COM and has worked with several large enterprises assisting and overseeing SSH Key Management remediation projects. He has 20+ years’ experience coming from Unix Engineering and Access Management roles before joining the thought leadership team at SSH.
Session Seven1:45 pm - 2:15 pm
A new approach to email security for Office 365
For hackers, Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Romain Basset is a sales engineer at Vade Secure, where he helps SMB and enterprise organizations of all sizes keep their users from clicking on suspicious links or attachments.
He holds a Master’s Degree in Computer Engineering and has over 10 years of experience in IT security engineering and product management.
For a copy of this presentation, please contact Lynne Leonardi – Lynne.Leonardi@vadesecure.com
Break2:15 pm - 2:30 pm
Break / Vendor Booth Time
Session Eight2:30 pm - 3:00 pm
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
For a copy of this presentation, please contact Nick Damiano – firstname.lastname@example.org
CISO PANEL3:00 pm - 4:00 pm
Craig Jackson is a consultant with CTI, where he leads information security engagements for customers across the mid-Atlantic region. For the past five years he has specialized in penetration testing, wireless security & design, regulatory compliance, and corporate security training. He also serves on the board of directors for InfraGard Maryland, currently as president of the chapter. Craig holds a degree in Information Assurance, as well as OSCP, CISSP, GPYC, GAWN, CEH, and other vendor certifications.
Gayle GuilfordChief Information Security OfficerBaltimore City Government
Mark PotterChief Information Security OfficerNewWave Telecom and Technologies
Bernie TullChief Technology OfficerFirst Healthcare Advisory Solutions
James Parren Courtney IICertified Chief Information Security OfficerCourtney Consultants, LLC
8:15 am - 5:00 pm1743 W Nursery RoadLinthicum, MD 21090410-859-8300