Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session Two9:30 am - 10:00 am
Lessons learnt deploying YubiKeys in the enterprise.
Jerome Becquart, COO at Axiad IDS, will discuss some of the challenges enterprises face while deploying YubiKeys or other hardware tokens to protect their accounts, networks, and applications from credential theft and data breach. Organizations are increasingly looking for a solution that streamlines the deployment and management of devices without compromising security and employee agility.
Jerome will illustrate the challenges, using a real-life example, of a large manufacturer of control systems that recently deployed YubiKeys to improve their overall security posture and comply with NIST SP800-171 mandate.
Jerome drives business operations and a corporate marketing team at Axiad IDS. He has over 20 years of experience in Identity and Access Management solutions including 15 years at ActivIdentity. Jerome’s management experience includes roles in operational management, professional services, product and solution marketing, and engineering and technical support. After the acquisition of ActivIdentity by HID Global in 2010, Jerome served as General Manager of the HID Identity Assurance business unit. He chaired the Global Platform Government Task Force for 3 years, and served on the Board of Directors of this Industry organization.
To receive a copy of this presentation, please contact Axiad IDS – email@example.com
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
A Practical (low cost) Approach to Securing East-West Traffic & Critical Data
Despite best efforts organizations continue to struggle detecting and stopping attacks that lead to costly exposures of critical data.
Why is this? One reason is that organizations typically do not have a simple means to provide visibility to threat as they move East-West across their network. Leaving them blind to up to 80% of their threat surface.
Come learn how to leverage simple techniques to make your existing threat detection and investigation processes much more effective.
Learn also how to add layers of defense to protect your most critical assets.
For a copy of this presentation, please contact Amy Carey – firstname.lastname@example.org
Session Four11:00 am - 11:30 am
Founded in 2002 and headquartered in Chicago, Nexum® takes a comprehensive approach to security. Nexum approaches business with one simple statement: “Do what’s right for the customer and success will follow.”
Nexum helps you mitigate risks, protect your data, increase business continuity and meet your unique business objectives by:
Detecting and preventing network threats, intrusions and disruptions
Equipping you with the information, tools, training and resources you need to effectively manage IT risk
Nexum, Latin for an arrangement by which one pledged one’s very liberty as security, Nexum is committed to ensuring your security. At Nexum, We Mean Security®.
For a copy of this presentation, please contact Kathy Lucas – email@example.com
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Keynote Session12:00 pm - 12:45 pm
Tom will discuss actual investigations as well as a short overview of the FBI Boston Office and FBI Cyber Program, an overview of Cyber Crime Statistics for all of New England, a review of Current Threats and FBI Resources for investigating/mitigating threats, a Case Study on Phishing Kits and Investigation and resources to report cyber fraud or computer crimes.
Break12:45 pm - 1:15 pm
Break / Vendor Booth Time
Session Six1:15 pm - 1:45 pm
Managing Risk in the Digital World
Session Seven1:45 pm - 2:15 pm
Yancy is a Boston-based Enterprise Sales Engineer for Okta with many years of experience in the security space. His previous roles include security software design, consulting and software development. He is passionate about understanding his customer’s challenges, earning their trust, and helping them fortify their security postures.
For a copy of this presentation, please contact Jill Graham – firstname.lastname@example.org
Break2:15 pm - 2:30 pm
Break / Vendor Booth Time
Session Eight2:30 pm - 3:00 pm
Cybercrime Tactics and Techniques Report
The Malwarebytes Labs research team showed a significant uptick in threats aimed at businesses in Q1 2019 from the same time last year. Companies need to take control against these increases in cyberthreats by remediating at scale, quickly mitigating attack impacts through isolation, and proactively hunting for threats before they execute.
Significant increases in overall threats, Emotet, ransomware, and its impact on your enterprise
How Mac, mobile malware, and especially adware are on the rise
User concern about the safety of their personal information, and how organizations are failing to protect their data
What it takes to create a resilient enterprise
Krishnan Natarajan is Senior Director for Malwarebytes, based in Santa Clara California. He has experience with multiple areas of information security: web application security, user and entity behavior analytics, insider threat, data loss prevention, and endpoint security. Prior to Malwarebytes, Krishnan has held leadership roles at several S.F. Bay Area companies including Whitehat Security, Dtex Systems, and Hewlett-Packard.
For a copy of this presentation, please contact Jen Munday – email@example.com
Session Nine3:00 pm - 3:20 pm
Modern access management for hybrid and multi-cloud environments
Today’s dynamic cloud environment encompasses many different user types who need to access shifting target servers.
Cloud environments can be complex and dynamic, demanding unified and nimble management tools.
Modern methods for user authentication and authorization and rules enforcement enable access management to cloud environments.
Visibility into access management traffic help meet best practices and security standards.
Markku Rossi brings close to 25 years of software engineering and architecture experience to the company. He is responsible for R&D and directs the company’s technology strategy. Markku has extensive knowledge and experience with SSH Communications Security products, having served the company from 1998 through 2005 as Chief Engineer and a major contributor to the SSH software architecture. Prior to rejoining the company in 2015, he co-founded several companies such as Codento and ShopAdvisor and served as CTO at Navicore and Chief Architect at Nokia. He has a Master of Science degree in Computer Science from Aalto University.
For a copy of this presentation, please contact Bridget Bridgman – Bridget.Bridgman@ssh.com
CISO PANEL3:30 pm - 4:30 pm
Kent Sinclair is an attorney, arbitrator, and cybersecurity professional, with over 25 years of experience. He was a Partner at an international law firm and served as a Managing Director of a global cybersecurity consulting firm. In 2015 he established his own law firm, Sinclair Law LLC, to help emerging companies and middle market enterprises solve problems involving privacy, information protection, cybersecurity and digital forensics. As an attorney, Kent often works closely with information security and digital forensics professionals to conduct risk assessments, respond to cybersecurity incidents, and conduct internal investigations. He also represents clients in business disputes, often involving technology related agreements or the misappropriation of trade secrets.
Kent received his law degree from Yale University. He is a Certified Information Privacy Professional (CIPP/US) through the International Association of Privacy Professionals (IAPP). He also serves as an arbitrator on commercial and data security related disputes through the American Arbitration Association (AAA).
8:15 am - 4:30 pm10 Huntington Ave.Boston, MA 02116617-262-9600