Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session Two9:15 am - 9:45 am
Win Big with IT Resilience
In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you to manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
13 Things To Get you to a Kick A** Security Awareness Program Do you have a failing or non-existent security awareness program for internal employees? As security becomes increasingly important for all members of your organization (not just the security team!), a program like this becomes imperative to being a successful and secure organization. Join Chrysa to takeaway tactics and ideas for your internal security awareness program that you’ll be able to immediately apply in your organization.
For a copy of this presentation, please contact Meghan Marostica @ email@example.com
Session Four10:45 am - 11:15 am
The Evolving Threat Landscape and how to deal with it.
As security companies evolve to provide better and more effective protection, the adversaries also evolve, in a repetitive cycle of cat and mouse. These evolved cybercriminals are an amalgamation of the skilled targeted attacker and the more pedestrian pre-packaged malware toolkit user. They will use manual hacking techniques not destruction and sabotage but to maintain and increase their income streams. One of the most encouraging trends we see is how security has begun to shift the burden to attackers, forcing them to change their operations. Come listen to how Sophos is driving this change with a number of important, advanced protection techniques, including generalized exploit protections, which can arrest virtually infinite variations of memory and control flow abuses; deep learning, which provides the best proactive prediction of malware at scales never before achieved; and behavioral detections that provide runtime defenses against such would-be epidemics as ransomware. Speaker’s Bio: Anthony Iacobone better known as TJ Iacobone or that guy in the hat, given his affinity and propensity for wearing ballcaps when not presenting, has been with Sophos for nearly 2 decades. Over that span he has seen and combated a multitude of threats from Sircam and Nimda to the current deluge of ransomware like Wanna Cry and Sam Sam. Originally from Massachusetts he has lived in the Raleigh area for 5 years and covers the Carolinas for Sophos. When not busy selling and presenting TJ has 3 wonderful kids and an amazing wife that get the rest of his time away from work.
For a copy of this presentation, please contact Victoria Milligan @ Victoria.Milligan@Sophos.com.
Lunch11:15 pm - 11:45 pm
Break / Vendor Booth Time / Lunch
Keynote Session11:45 pm - 12:45 pm
Brian N. Cyprian has been a Special Agent since 2005 and supervisor for the Charlotte Cyber Task Force since March 2016. Cyprian develops strategy to defeat cyber adversaries and to protect U.S. critical infrastructure. He is responsible for informing critical stakeholders and citizens of vulnerabilities and schemes targeting the United States, specifically those who are located North Carolina. Both criminal and national security computer intrusions are investigated by the Charlotte Cyber Task Force and emphasis is placed on proactively developing relationships prior to cyber incidents. Prior to reporting to Charlotte, Cyprian was assigned to FBI Headquarters, Cyber Division, where he managed national security computer intrusion investigations. He has worked in the Chicago and Kansas City Field Offices. Cyprian has a B.S. in Computer Information Systems and a MBA from Texas A&M University –Commerce. He has several computer certifications, to include the CISSP and GIAC’s Certified Intrusion Analyst.
Break12:45 pm - 1:00 pm
Break / Vendor Booth Time
Session Six1:00 pm - 1:30 pm
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
For a copy of this presentation, please contact Michael Landewe @ firstname.lastname@example.org
Session Seven1:30 pm - 2:00 pm
Certificate Management Challenges and How to Overcome Them Join Michael Ward, Executive Vice President, The SSL Store™ as he discusses the difficulties businesses face when managing SSL in this new era of data protection. “Certificate Management Challenges and How to Overcome Them” will highlight key factors contributing to the increase in SSL usage, recent real-life examples of certificate expirations and their business impact, common challenges companies must solve to efficiently manage SSL, operational consequences of SSL mis-management and what to look for in effective certificate management solutions.
For a copy of this presentation, please contact Michael Ward @ email@example.com.
Break2:00 pm - 2:20 pm
Break / Vendor Booth Time
Session Eight2:20 pm - 2:50 pm
Deception technology, luxury item or life line? Is deception technology only for mature security operations or is it an effective cyber security solution to help companies mature their capabilities? Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. Learn how deploying decoys throughout your environment can build the bridge strengthening all the levels in your security stack. Join us for this session where you’ll hear about real-world deployment experiences, the value customers are realizing, and what Red Teams are saying about deception-based threat detection.
For a copy of this presentation, please contact Brooke Irish @ firstname.lastname@example.org.
Tom Atkins is a veteran Information Security professional with over 25 years of experience. Tom specializes in guiding young technology companies successfully into new markets. He works closely with leading companies to identify and resolve their core security challenges. At FireEye, he was the first customer-facing employee for the East Coast and at OpenDNS held a similar role building the Enterprise sales organization and strategy and managing the transition through the acquisition by Cisco in 2015. Tom is currently leading the East sales team for Attivo Networks, the leading deception company in the market.
Session Nine2:50 pm - 3:20 pm
Data is the New Perimeter
Data is essentially inert and passive, lacking an inherent ability to either control its own fate or mitigate risks while under process, at rest or in transit. The potential risk and the actual loss of Data through user error or bad actor theft is a major detractor of capital that could be used toward innovation to drive economic and shareholder value. Financial institutions who have grown through acquisition(s) have been saddled with legacy technologies that lack flexibility to meet current business demands not to mention the ever changing and imposing regulatory environment that has caused an escalation in costs and suboptimal solutions.
The safety of the data is wholly dependent on our networks and human behavior. In reality, the enterprise protects data indirectly through a static perimeter or through third parties, in which endpoints are managed, and trust assumed. This approach has generated heavy financial burdens and damages to brand reputation on our institutions. Our contention is that industry needs to recognize that the historical perimeter is obsolete and embrace a data centric paradigm.
This workshop will highlight the various trends and nefarious actors that are impacting how we secure Data and how we extend our boundaries. It will emphasize a paradigm that imbues data with self-governance, provenance and protection capabilities, to make it the new perimeter and a source to rethink deployments, workflows, and responsibilities. Use Cases will also be discussed.
Kevin Beauregard, in 2005, co-founded Get The Net, LLC (“GTN”), a compliance and operational risk consulting firm servicing the Alternative Investment and Investment Banking Communities which provide customized solutions to the complex issues while considering a client’s strategy, size, and in-house expertise. From 1998 through 2005, Kevin, a Founding Member and Managing Director of Bank of America’s Equity Financial Products Unit, was responsible for building the team’s infrastructure which enabled the business to grow its revenues to $700M+ by its third year of trading. Global Business Management responsibilities for Cash Equities, Prime Brokerage and Equity Capital Markets were added in 2002. In the ten years prior, Kevin held various Business Management positions at Salomon Brothers supporting Equity Derivative, Interest Rate Swaps, Risk Arbitrage, Government Trading, Firm Finance and Foreign Exchange strategies.
Session Ten3:20 pm - 3:50 pm
The Human Firewall Is On Fire – What Do You Do When The Smoke Clears?
John joined Mimecast in August 2016 and is responsible for generating new business across Tennessee and the Carolinas. Prior to joining Mimecast, John spent 15 years in the U.S. Coast Guard conducting global anti-terrorism and counter drug operations resulting in over 30 tons of cocaine seized, and over 1,000 lives saved. John earned a BS from the U.S. Coast Guard Academy, a MS from Northeastern University, and a Certificate in Leadership from Harvard University. He has been married for 13 years, has three young children, and in his free time enjoys skiing, fishing, and quality family time.
Session Eleven4:00 pm - 4:20 pm
Lift, Shift, Store and Secure
As digital transformation accelerates, this discussion will focus on how CIO’s make investments by highlighting a couple drivers for decision making. Specifically, cost containment via centralization, automation, virtualization, outsourcing (which is analogous to cloud) and now “containerization”. The intent is to lead the audience to a couple key and somewhat shocking realities.
- 80% of IT Spend is “dead money”, commitments already allocated in the budget.
- 17% of the budget are for investments that reduce the cost of computing and/or improve overall IT performance.
- Out of every $100 in this scenario, with InfoSec receiving 3% of the budget, IT Security has roughly .60 cents for new investments. Just over .5 % for new tools.
The technology focus will be centered on Kubernetes, Containers, Micro-services and Storage. All four components are void of native controls, however, by leveraging the CIO’s investment drivers (80% dead money, and 17% new investments), the intention is to use Kubernetes, Containers and Storage as drivers for InfoSec to engage with DevOps, and participate in achieving IT’s business goals – securely.
8:15 am - 5:00 pm4800 South Tryon StreetCharlotte, NC 28217704-527-8400