Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session Two9:15 am - 9:45 am
The Bots are coming!
Actually, they are here. They now represent over 50 percent of internet traffic. But not all bots are bad. There are many good bots, such as chat bots and search engine bots, that we rely on in our day-to-day digital lives. You do need to know the difference and take control of your bot traffic—they cannot be ignored and you cannot just block them all. In this presentation, we will look at the growth of bots, good bots versus bad bots, what to look for in a bot mitigation solution and a few use cases.
Al Sterling has been in the network and application performance space for 20 years, with the last few years specializing in the DNS and Security space. His customer service experience includes working with over 3,000 Oracle Dyn customers – the top banks, social media companies, and e-commerce sites.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
AV, EDR, NGAV…What’s Next in Endpoint Protection?
Antivirus has been around since the 1980s. How did it evolve in the past decade? What about hot, machine learning powered Next Generation Antivirus products promoted by well-funded startups? Or should we assume compromise and focus on the Endpoint Detection and Response (EDR) instead? What are the pros and cons of these approaches and where is endpoint security going next?
This interactive presentation will discuss the reasons behind the vulnerable state of endpoint security and include a demo of the infamous Rubber Ducky that remains practically unstoppable by today’s endpoint protection products.
You will leave this presentation with the following knowledge:
-Understand the current state of endpoint security and latest attacks
-Explore available endpoint protection tools, including Endpoint Detection and Response (EDR)
-Learn about benefits and shortcomings of modern endpoint protection tools and approaches
-See an advanced file-less attack in action
-Learn the latest best practices and approaches that promise to reduce threat surface and minimize breaches
For a copy of this presentation, please contact Jessica Filip – email@example.com
Rene Kolga, CISSP, has over 15 years of cybersecurity experience in the areas of endpoint protection, insider threat, encryption and vulnerability management. He worked for both Fortune 500 companies and Silicon Valley startups, including Symantec, Citrix, Altiris, ThinAir and Nyotron. Rene earned his Computer Science degree from Tallinn University of Technology. He frequently speaks on security topics at industry conferences like Black Hat, InfoSecurity and (ISC)2 Security Congress.
Session Four10:45 am - 11:15 am
Achieving “Always On” IT Resilience
It’s time to revolutionize your data protection strategy. Protecting and transforming your digital business for exceptional customer experiences requires an “always on” platform for disaster recovery, backup and cloud mobility. An IT Resilience Platform allows you to cost-effectively and swiftly manage both unplanned disruptions, including outages, ransomware attacks, and natural disasters, as well as planned events, such as moving to the cloud or data center consolidations.
Marc is a creative Senior Sales Executive with over 20 years of experience helping companies best leverage technology to achieve measurable business outcomes. Since starting a consulting business while in college, Marc developed passion for enabling client success and growth through adoption of technical solutions. He gained manufacturer and integrator solution selling expertise in the New York metro enterprise sales and financial services accounts. Marc’s focus on performance and cost optimization of technical solutions has fostered his success with excellent communication, relationships, and sales execution to support clients’ needs.
Lunch11:15 am - 11:45 am
Break / Vendor Booth Time / Lunch
Session Five11:45 am - 12:15 pm
Tom Dwyer is a Principal Engineer and the Data Center Practice Lead at Nexum, Inc., a VAR, managed services provider, and training services provider based in Chicago. He has over 20 years’ experience in networking, security, and data center technologies.
At Nexum, Tom focuses on designing, building, and troubleshooting complex data center, routing, switching, and cloud network architectures for Fortune 500 companies and across multiple verticals including financial services and higher education. Tom is a recurring speaker at the Chicago Network Operators Group (CHI-NOG) and Information Systems Security Association (ISSA) conferences. Tom has been both a technical editor and a contributing author for the Juniper Day One Ambassador Cookbook series.
Tom is a Juniper Ambassador, Juniper Ingenious Champion, and is certified by Juniper as a JNCIE-ENT #424.
Break12:15 pm - 12:30 pm
Break / Vendor Booth Time
Keynote Session12:30 pm - 1:30 pm
Critical Relationships: A look at the FBI’s Public/Private Partnerships
Marcus Joachim is a Supervisory Special Agent (SSA) in the FBI’s Chicago Field Office. SSA Joachim supervises a National Security Counterintelligence/Cyber Squad.
SSA Joachim entered the FBI in 2008 as an Honors Intern and became a Special Agent in 2009. Following graduation from the FBI Academy, he was assigned to the Los Angeles Division where he investigated mishandling of classified information, theft of trade secrets and espionage. SSA Joachim subsequently served in the Director’s Office and Counterintelligence Divisions at FBI Headquarters. While at FBI Headquarters, SSA Joachim worked closely across all levels of government and with the private sector to facilitate collaboration, information sharing and to reduce the risk to the nation’s critical infrastructure.
SSA Joachim is also certified as an FBI negotiator. SSA Joachim graduated from Howard University in Washington, DC with a B.A. in Communications and a J.D. from Howard University School of Law.
Break1:30 pm - 1:45 pm
Break / Vendor Booth Time
Session Seven1:45 pm - 2:15 pm
The Science of Security Awareness
Many organizations treat employee security awareness and training as an annual chore, compliance requirement or an abstract and unattainable goal. The truth is, employee security training is data-driven, employee awareness is measurable and security awareness and training programs help you achieve the ultimate goal of fewer security breaches at your organization. In this presentation, we’ll explore the science of employee training and how to implement a data-driven security awareness program at your organization.
For a copy of this presentation, please contact Camille Dupuis – firstname.lastname@example.org
Carol Sun is an Enterprise Team Lead for Infosec IQ. Carol works diligently to help organizations implement security awareness training that empowers employees with the knowledge and skills to stay cybersecure at work and home. An expert in cybersecurity awareness, Carol works with companies of all sizes to customize engaging programs that produce measurable and memorable results. Formerly, Carol worked as the development director at multiple non-profit organizations including Overture Center for the Arts and YWCA Charleston . In her free time, Carol can be found checking out the local cuisine and shopping in the city she calls home, Chicago.
Session Eight2:15 pm - 2:45 pm
Segmentation Made Simple
For all your ‘things’ on the ground, on the move, or in the cloud. This presentation is a deep dive into the fundamental flaws of TCP/IP as it applies to our modern world of complex cloud and IoT device networks. It outlines how Host Identity Protocol (HIP) solves for systems that weren’t designed for the state of networking today.
Rob is the Regional Sales Director for the Great Lakes region for Tempered Networks where he helps enterprise organizations address complex networking projects in the new era of connectivity for environments such as Industrial IoT, M2M, multi-cloud, etc. Prior to Tempered Networks, Rob spent 16 years at F5 Networks where he was instrumental in the company’s successful IPO as one of their original Solutions Engineers. Rob transitioned to Territory Account Manager in 2004, and was a top performer in helping his enterprise customers meet their vital application delivery goals. Before F5, Rob ran the AIX and Networking practice for a large IBM reseller in Houston Texas. Rob attended school at Western Michigan University and resides outside of Detroit, Michigan.
Break2:45 pm - 3:00 pm
Break / Vendor Booth Time
Session Nine3:00 pm - 3:30 pm
Compromised User and Host Detection Using Behavioral Analytics
Studies show that over 80% of advanced attacks are attributed to external actors. Once these cyber criminals capture credentials that provide access to corporate networks, they are virtually undetectable by traditional defenses. During this session, we will discuss a variety of attacks utilizing compromised credentials and the benefits of utilizing behavioral analytics, machine learning and network data to identify and stop these attacks.
For a copy of this presentation, please contact Sabrina Wagoner – email@example.com
Cliff is a 20+ year engineering and sales veteran helping customers build business driven network and security solutions. He leads Aruba’s security sales in the North Central US and prior to Aruba managed top customers at ForeScout, Riverbed, IBM, Oracle, and McAfee, and Network General.
Session Ten3:30 pm - 4:00 pm
Deception: Turning an attackers strength to a weakness
Attackers have always operated from a position of strength because of their ability of anonymity, time, and space to operate. Deception traditionally has been deployed internal and with emphasis on the insider threat. A new approach has emerged on the market that combines interior and exterior deception in practical ways that hardens defenses while detecting, preventing and responding to threats automatically without complex orchestrations while eliminating the attackers anonymity, time, and space to operate.
For a copy of this presentation, please contact Kim Trama – firstname.lastname@example.org
As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader. Frank also is co-inventor of a patent issued for selectively regulating network traffic. Francesco is an experienced network engineer and prior to PacketViper, held the Director of Information Security and Technology position at Liberty USA, Partner and Director of Libcom Internet Services ISP, Sr Network/Systems Engineer, Architect, and PM for nationally based technology businesses such as The Future Now, XLConnect, and MicroAge. Francesco holds a BS in Technical Management from Embry-Riddle University. Francesco is a decorated veteran that served twelve years in the US Army Assualt Helicopter Battalion at FT Drum, and Schoefield Barracks.
Session Eleven4:00 pm - 4:20 pm
Protecting Your Digital Supply Chain
The Zero Trust Imperative of Third-Party Risk
It’s been estimated that more than 60% of the most severe breaches in recent years were a result of compromised third party suppliers, customers, and partners. The overwhelming need to share critical business information across the extended enterprise combined with a complete lack of control over third party security creates a fragmented and exponentially expanding threat surface that permeates the digital supply chain of every industry. In 2019, there is no such thing as a trusted third party. How do you protect your business, when you don’t know who you can trust?
Mr. York joined Accellion in 2018 with 20 years of experience in cloud marketing, sales and product management. A seasoned executive and entrepreneur, Mr. York’s successes span growing startups to enterprise market leaders, such as Navis and SPSS. As CMO of Meltwater, he led worldwide product management, digital marketing, field marketing, and public relations. He spearheaded growth at Xignite as VP Sales and Marketing to lead the company from A to B round. Prior to Accellion, he founded Markodojo, an innovative marketing management SaaS.
Mr. York is also a thought leader in the cloud community, advisor, board member, speaker and author of the popular cloud blog Chaotic Flow. Mr. York holds a BS in Physics from Caltech, an MS from Cornell, and an MBA from the University of Chicago.
CISO PANEL4:20 pm - 5:00 pm
Secrets of Superstar CISO Success
CISOs aren’t born, they’re made. And tested. Constantly. With obligations like protecting employees and digital assets from data breaches, and demonstrating compliance with a daunting number of internal policies and industry regulations, CISOs have a lot on their plate. So, what’s the secret to CISO success? Similarly, what differentiates a strategic CISO from a tactical CISO?
This panel, “Secrets of Superstar CISO Success,” will seek to answer these questions with perspectives on:
- How to prepare today for the threats of tomorrow
- Charting a security strategy that protects and supports the business
- How to earn a seat at the executive table
- What you know now that you wish you knew then
We hope you’ll join us for this informative and enlightening panel.
8:15 am - 5:00 pm505 N. Michigan AvenueChicago, IL 60611(312) 944-4100