Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session One8:45 am - 9:15 am
Achieving “Always On” IT Resilience
It’s time to revolutionize your data protection strategy. Protecting and transforming your digital business for exceptional customer experiences requires an “always on” platform for disaster recovery, backup and cloud mobility. An IT Resilience Platform allows you to cost-effectively and swiftly manage both unplanned disruptions, including outages, ransomware attacks, and natural disasters, as well as planned events, such as moving to the cloud or data center consolidations.
Session Two9:15 am - 9:45 am
At CSPi we are committed to helping our customers meet some of computing’s most demanding performance, availability and security challenges.
Today’s security teams receive a great deal of real-time information and intrusion alerts, generated from their security equipment and tools; yet, the volumes of data make it make it nearly impossible for incident response teams to validate a data breach. With our Myricom nVoy Series solution we offer our customers a new approach to cyber threat identification and investigation – a rapid breach response solution that identifies alerts associated with a specific asset and provides an extraction of the entire set of conversations associated with that breach.This detailed data is crucial in performing timely and accurate analysis needed to comply with data-privacy regulations such as GDPR, PCI DSS, HIPPA, SOX, and 48 different U.S. state laws related to PII.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
More than 30,000 customers worldwide—including nearly half the global Fortune 500—rely on RSA’s business-driven security™ strategy for cyber threat detection and response, identity and access management, online fraud prevention, and governance, risk and compliance solutions. Armed with the industry’s most powerful tools, enterprises can better focus on growth, innovation and transformation in today’s volatile business environment.
RSA is a part of the Dell Technologies family of brands. Dell Technologies is a unique family of businesses that provides the essential infrastructure for organizations to build their digital future, transform IT and protect their most important asset: information. The company services customers of all sizes across 180 countries – ranging from 98 percent of the Fortune 500 to individual consumers – with the industry’s most comprehensive and innovative portfolio from the edge to the core to the cloud.
Session Four10:45 am - 11:15 am
Lightweight Deception. Heavyweight Results.
- Cyber challenges to security
- Turning an attackers strength to a weakness
- Efficient and practical internal deception
- Using deception to turn the tides
As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader. Frank also is co-inventor of a patent issued for selectively regulating network traffic. Francesco is an experienced network engineer and prior to PacketViper, held the Director of Information Security and Technology position at Liberty USA, Partner and Director of Libcom Internet Services ISP, Sr Network/Systems Engineer, Architect, and PM for nationally based technology businesses such as The Future Now, XLConnect, and MicroAge. Francesco holds a BS in Technical Management from Embry-Riddle University. Francesco is a decorated veteran that served twelve years in the US Army Assualt Helicopter Battalion at FT Drum, and Schoefield Barracks.
Lunch11:15 am - 11:45 am
Break / Vendor Booth Time / Lunch
Keynote Session11:45 am - 12:45 pm
E-Skimming – A new twist on an old trick
Mark Grantz is a Supervisory Special Agent in the U.S. Secret Service’s Technical Security Division. Mr. Grantz has been with the Secret Service for 19 years and has over 25 years of law enforcement experience. During his tenure with the government, Mr. Grantz has overseen high level, international investigations, managed intrusion detection and video surveillance systems at the White House and other protected facilities and is presently the manager of the Secret Service’s Network Operations Center. Working within the Critical Systems Protection program, Mr. Grantz assists in the implementation of security controls on networks, information systems and critical infrastructure to eliminate or reduce the risk of cyber-attack, which could have an adverse effect on the life and safety of a protectee or disrupt the implementation of a Secret Service physical security plan. Mr. Grantz has spoken internationally as a plenary and keynote speaker on the subjects of cyber-crime and insider threats, was recognized by the Department of Justice as an expert witness in the field of Eastern European Cyber-Crimes and was a co-author of the paper “Toward an Adaptive Structuration Model of International Cyber-Crime”.
Break12:45 pm - 1:15 pm
Break / Vendor Booth Time
Session Six1:15 pm - 1:45 pm
How Zero Trust Improves Cybersecurity
Learn how the “Don’t trust, verify” Zero Trust approach to cybersecurity prevents lateral movement inside a network by implementing authentication for the right user at the right time, to the right applications. Zero Trust helps organizations keep up with today’s hybrid and multi-cloud environments by providing simple yet secure access control while improving visibility and auditability.
Jimmy Mills is a Senior Solutions Architect for SSH.COM and has worked with several large enterprises assisting and overseeing SSH Key Management remediation projects. He has 20+ years’ experience coming from Unix Engineering and Access Management roles before joining the thought leadership team at SSH.
Session Seven1:45 pm - 2:15 pm
A new approach to email security for Office 365
For hackers, Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Romain Basset is a sales engineer at Vade Secure, where he helps SMB and enterprise organizations of all sizes keep their users from clicking on suspicious links or attachments.
He holds a Master’s Degree in Computer Engineering and has over 10 years of experience in IT security engineering and product management.
Break2:15 pm - 2:30 pm
Break / Vendor Booth Time
Session Eight2:30 pm - 3:00 pm
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
8:15 am - 5:00 pm1743 W Nursery RoadLinthicum, MD 21090410-859-8300