Data Connectors is proud to host the Cybersecurity Strategies Conference.
8:15 am - 5:00 pm9300 Bryn Mawr AvenueRosemont, IL 60018847-696-1234
CHECK-IN AND OPENING INTRODUCTIONS
Session One8:45 am - 9:15 amRob PollockCentral Region Channel Sales
The Changing Landscape of DDoS Attacks – Advanced DDoS Is Here – Are You Ready?
Distributed Denial of Service (DDoS) attacks have entered a new era! Historically DDoS attackers have used a “brute force” approach to making an online services unavailable by overwhelming your company’s internet connection. DDoS targets wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and presents a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Brute force attacks have morphed into more sophisticated, multi-vector attacks. Your adversaries are patient, launching targeted attacks using deception & “smokescreen” tactics to take down your network. The frequency of DDoS attacked has risen dramatically as well. The emergence of IOT devices has led to larger, more destructive attacks from Lizard Stressor, to Mirai & now Memcache. 2018 has seen the first DDoS exceeding I tbps! (1.3 tbps & 1.7 tbps attacks)
Arbor will discuss the misconceptions & facts about modern day DDoS attacks and best practices to protect your company against DDoS attacks while providing maximum network availability. “Bandwidth saturation” will impact your business – an attack that exceeds your internet pipe is all it takes. In this new world, “peace time” no longer exists so having a DDoS protection strategy is critical! With 30+% of DDOS attacks causing havoc at the Application Layer with potential data exfiltration, the stakes could not be higher.
Session Two9:15 am - 9:45 amJonathan LangeExecutive Manager
Innovative Endpoint Management: Vulnerability Management, Patching, OS-Upgrades and Software Distribution
Windows Fall Anniversary Update, Office 365 Migration, Vulnerability and Patch Management: Are any of these three topics causing your blood pressure to rise? This session will show you how you can automate OS migrations, software deployment projects, and effective security exploit management all from one easy to use Endpoint Management Suite. No university degree or nerd glasses required—buckle up!
Jonathan Lange is sales manager for baramundi software USA, Inc. in the US market. Having advised customers in various countries from small businesses to global enterprises, he is well aware of the challenges IT departments face today in order to keep their infrastructure up-to-date, safe and efficient.
Session Three10:15 am - 11:00 amJamie Duff
A new approach to email security for Office 365
For hackers, Office 365 is the new black!
Because a simple set of Office 365 credentials can give you access to sensitive documents, applications and confidential business information, Office 365 is now the go-to place for cybercriminals looking to make a fast and high profit.
Each day these hackers implement new and always more creative phishing and spear-phishing attacks, that easily bypass the traditional email security solutions.
Discover what their techniques are, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Session Four11:00 am - 11:30 amGary SouthwellVice President & GM HPP Division
A Practical (low cost) Approach to Securing East-West Traffic & Critical Data
Despite best efforts organizations continue to struggle detecting and stopping attacks that lead to costly exposures of critical data.
Why is this? One reason is that organizations typically do not have a simple means to provide visibility to threat as they move East-West across their network. Leaving them blind to up to 80% of their threat surface.
Come learn how to leverage simple techniques to make your existing threat detection and investigation processes much more effective.
Learn also how to add layers of defense to protect your most critical assets.
Session Five12:00 pm - 12:30 pmSteve Shelton
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
Session Six12:45 pm - 1:15 pmThomas ScottSolutions Consultant
Protecting Your Data: What You Need to Know about Cloud Security and the Dark Web
Effectively leveraging the cloud is not just about migrating data and applications. Security must travel into the cloud as well. When organizations fail to understand that security in the cloud is a shared responsibility, the consequences can be disastrous (and profitable for threat actors!). In this session, Armor will demonstrate the vulnerability of your unprotected data in the cloud via a real-world experiment using “honeypots” disguised as a healthcare web portal.
You will learn:
- The most likely attacks your organization will face
- How active and dynamic security controls can mitigate risk
- Simple steps you can take to prevent a breach
- Why your data is so valuable on the Dark Web (findings from Armor’s Black Market Report)
Session Seven1:15 pm - 1:45 pmCarlos MunozRegional Director of Sales
100% eliminate web and email borne malware with an Isolation Platform “Browser in the Cloud” Solution
Carlos’ career has spanned a wide breadth of the CyberSecurity industry: endpoint security, governance risk and compliance, network security, threat detection/protection as well as isolation and virtualization based security solutions. From 1998 to 2001 he ran the city of Chicago region of commercial accounts for Cisco Systems, first focusing on traditional brick and mortar customers and then was chosen to build Cisco’s Illinois based Dotcom and Application Service Provider team in 2000. After Cisco, Carlos became Global Account Manager for Check Point Software, becoming the top performing member of the Global accounts team by winning several new Fortune 500 customers. From there Carlos started up the Midwest Region for Fortinet. After Fortinet Carlos became Field Sales Manager for Citrix Systems focused on promoting secure virtualization and application delivery solutions. Then as Cyber Security Executive for Darktrace Limited, promoting their “Enterprise Immune System” based on unsupervised machine learning and mathematics. Most recently he was Director of Sales at Dome9 Security the recognized leader in public cloud security and automation solutions.
As an expert on security best practices, trends, and emerging technologies, Carlos helps CyberSecurity executives at some of the world’s largest organizations to create value in light of limited security operations to properly protect, detect and respond to today’s cyber threats. His clients include Abbott Laboratories, Allstate Insurance, American Family Insurance, Aon Insurance, Cargill, Cook County, Discover Financial Services, Kellogg’s, Kraft Foods, Motorola, United Airlines and the Walgreens Company. Carlos is a regular speaker at CyberSecurity conferences. Carlos attended the University of Illinois at Chicago, earned an Engineering degree, the University’s coveted President’s Award and holds several CyberSecurity certifications.
Keynote Session2:00 pm - 2:45 pmReid SawyerSVP Emerging Risks Practice Leader, JLT
A nationally recognized expert, Reid joined JLT in 2015 as Senior Vice President. Leading the Emerging Risks Practice, after a 22-year career in the U.S. Army, Reid actively advises numerous senior government, industry leaders, and Boards with particular emphasis on cyber, geopolitical, and strategic risk advisory.
Reid serves a member of the New York City Fire Department’s Terrorism Task Force, providing subject matter expertise on resiliency, preparedness, and cyber issues for senior leaders in New York City, a position he has held since 2003. He also serves on the Advisory Board for the University of Chicago’s Project on Security and Threats.
In his last position, he served as the senior intelligence strategist for the Middle East and South Asia at U.S. Central Command, leading the organization’s most elite analytical team, for which he received the Director of National Intelligence Meritorious Unit Citation. Previously Reid was selected for a prestigious fellowship with the Federal Bureau of Investigation (FBI). During his fellowship year, he led the first summit on intellectual property theft through cyber means.
Having founded the nation’s premier counterterrorism research institute, The Combating Terrorism Center at West Point, he led influential national counterterrorism policy reviews and testified before a bicameral Congressional committee hearing. During his career, he deployed to Iraq, Afghanistan, Africa, and Latin America while serving in Special Operations Forces.
The editor of two books on transnational threats and author of numerous articles, Reid was a professor at the United States Military Academy and an adjunct professor at Columbia University’s graduate School of International and Public Affairs for eight years. Lieutenant Colonel (Retired) Sawyer holds a Bachelor of Science degree from the United States Military Academy and a Master of Public Administration from Columbia University.
Session Nine3:00 pm - 3:45 pmMaria GrahamDirector of Business Development
Do you have time for security?
Today, the focus on security tends to emphasize technology and expertise. Does an enterprise have the technology in place to stop threats? Do they have people with the expertise to response to threats? Often overlooked is the question “does the organization have enough time to adequately manage their security needs?” During Nuspire’s presentation, Maria Graham will delve into different elements required to maintain a secure network, how much time and effort each of these elements take, and what technology and expertise is needed for a credible security posture. She will discuss different approaches and strategies to deal with time constraints to security management, and how companies of different maturity levels can respond to their unique needs.
Maria has been with Nuspire for nearly six years where she held a number of roles throughout the company, including the Senior Channel Executive, Channel Sales Team Lead and Franchise Program Sales Manager to her current role as Director of Business Development. Throughout her time at Nuspire, Maria has focused on increasing the company market share through a team of experts dedicated to ensuring an unmatched positive experience for the end-user, while also managing her own sales funnel, driving new business leads and training and motivating sales consultants.
Session Ten3:45 pm - 4:30 pmDavid GurleyRegional Systems Engineer
Secure Your Data Center and Cloud with a Smart Micro-Segmentation Strategy
The data center has evolved rapidly in recent years with virtualization, cloud, and containers enabling more dynamic and distributed applications. While app teams have benefited, it’s created new challenges for security teams. With discussion about micro-segmentation on the rise, there’s little discussion about what it is and how to use it to effectively improve security. Until now.
David Gurley is a Regional Systems Engineer at Illumio. He focuses on evangelizing the benefits of micro-segmentation as well as working with Illumio customers to implement successful segmentation projects. Prior to Illumio, David was at Cisco focusing vertical solutions with non-traditional buying centers.