Data Connectors is proud to host the Cybersecurity Strategies Conference.
8:15 am - 5:00 pm5605 Blazer ParkwayDublin, OH 43017614-791-1000
Check-in and opening introductions
Session One8:45 am - 9:15 amMatt PannebakerSales Engineer
The Threat Report
The threat landscape is undoubtedly evolving; less skilled cybercriminals are being forced out of business, the fittest among them step up their game to survive and we’ll eventually be left with fewer, but smarter and stronger, adversaries. These new cybercriminals are effectively a cross-breed of the once esoteric, targeted attacker, and the pedestrian purveyor of off-the-shelf malware, using manual hacking techniques not for espionage or sabotage, but to maintain their dishonorable income streams. One of the most encouraging trends we see is how we’ve begun to shift the burden to attackers, forcing them to change their operations. Come listen to how Sophos is driving this change with a number of important, advanced protection techniques, including generalized exploit protections, which can arrest virtually infinite variations of memory and controlflow abuses; deep learning, which provides the best static prediction of malware at scales never before achieved; and behavioral detections that provide runtime defenses against such would-be epidemics as ransomware.
In elementary school, Matt Pannebaker once drew a picture of a rabbit that garnered him three gold stars. Since that time he’s honed his show-and-tell skills to achieve the positon of Sophos Sales Engineer, covering Central and Southern Ohio. When he’s not selling the Sophos’ Endpoint, Mobile, Firewalls, Encryption and other solutions, he’s a husband, a father of three rambunctious boys and one wily dachshund, and gets away from it all through cycling and hiking.
Session Three10:15 am - 10:45 amAlexandra GatesPrincipal Product Marketing Manager
What Comes Next in Wi-Fi: 802.11ax, WPA3, & Why Increasing Speed Isn’t Enough
Optimizing user mobile experience requires more than just high speed Wi-Fi. IT professionals are facing challenges of capacity, flexibility, security, privacy, and visibility as they evaluate complex combinations of WLAN standards, management, and technology like OFDMA. This session covers 802.11ax, WPA3 & other security protocols, data analytics, and building robust wireless networks.
Alexandra Gates is a Principal Product Marketing Manager at Aerohive Networks, where she helps define market strategy and vision for the cloud and WLAN products. She is a CWNA with a comprehensive background in wireless technology, including capacity and management planning, RF design, network implementation, and general industry knowledge.
Session Four10:45 am - 11:15 amJonathan LangeExecutive Manager
Innovative Endpoint Management: Vulnerability Management, Patching, OS-Upgrades and Software Distribution
Windows Fall Anniversary Update, Office 365 Migration, Vulnerability and Patch Management: Are any of these three topics causing your blood pressure to rise? This session will show you how you can automate OS migrations, software deployment projects, and effective security exploit management all from one easy to use Endpoint Management Suite. No university degree or nerd glasses required—buckle up!
Jonathan Lange is sales manager for baramundi software USA, Inc. in the US market. Having advised customers in various countries from small businesses to global enterprises, he is well aware of the challenges IT departments face today in order to keep their infrastructure up-to-date, safe and efficient.
Keynote Session / Seated Lunch11:15 am - 12:15 pmSpecial Agent Scott LoveFBI Cincinnati Division - Columbus RA
Keynote speaker Scott Love is a Special Agent with the Federal Bureau of Investigation in Ohio and has been investigating Cyber related crimes for approximately 8 years. His presentation will be on The FBI’s Role in Cyber Threats and Current Cyber Trends.
Session Six12:15 pm - 12:45 pmPatrick KaneSr. Director, Sales East
Eliminate the existing blind spots and provide consistent cloud/on-perm pervasive security/monitoring coverage
Patrick Kane leads the sales team for the Eastern Americas Region. He is one of the longest tenured sales people with Big Switch and is a veteran to networking, network security and monitoring and his past companies include Gigamon, Juniper, and Cisco.
Session Seven1:00 pm - 1:30 pmJamie DuffDirector of Corporate Markets, USA
A new approach to email security for Office 365
For hackers, Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Jamie Duff is an experienced sales leader with nearly 20 years’ experiencing working in the information technology and managed services industry. In his current role at Vade Secure, Jamie is tasked with accelerating the growth of Vade Secure’s corporate sales business in North America, both by hiring and managing a team of talented sales professionals and by building channel of MSPs from the Microsoft partner ecosystem. He previously held sales and sales leadership positions with Retarus, Real Asset Management, John Galt Solutions, and Qwest. Jamie graduated with a Bachelor of Science (BS) degree in Finance from Providence College.
Session Eight1:30 pm - 2:00 pmJerod BrennenSecurity Solutions Architect
The Path to IAM Security
“Are we secure?” It’s the most dreaded question that information security and risk management professionals need to answer. Compliance is a useful starting point, but the number of “compliant” organizations who still suffered a data breach is proof positive that compliance simply isn’t enough. That’s where maturity models come into play. In this presentation, I’ll show you how to apply a capability maturity model (CMM)( to your identity and access management (IAM) program, using that model to assess where you are today. I’ll also share tools and techniques you can use to accelerate improvements to your program.
By day, Jerod Brennen(@slandail) is a Security Solutions Architect with One Identity.
By night, he’s a husband, father, writer, filmmaker, martial artist, musician, and gamer. I think it’s fair to say that he’s earned every gray hair in his beard, having spent his career fulfilling infosec roles in consulting, higher education, retail, and public utilities.
Jerod loves to share what he’s learned over the years every chance he gets: at local and regional information security professional organizations, at larger information security conferences, and online via blogs and podcasts. He also teaches online information security courses for Pluralsight and LinkedIn Learning, as well as in-person courses, both domestically and internationally.
At the end of the day, Jerod just wants to help folks get one step closer to doing what they want to do securely.
Session Nine2:15 pm - 2:45 pmTerry CreightonSolutions Architect
Hurricanes, Banditos, and Steam Baths – How I got my data back
Stories of recovery. You will learn how disaster doesn’t need to equal downtime.
Terry Creighton is a Solutions Architect with Quorum. With 10 years in the Backup and Disaster Recovery space, Terry has a Bachelors in Information Management, and has worked in the information technology field since 2001.
Session Ten3:00 pm - 3:30 pmJesse FrankelDirector Solutions Delivery
Dealing With the Tsunami of Unmanaged and IoT Devices
The explosive growth of “smart” devices – from printers to smart TVs to industrial devices and more – provides a new attack surface that can’t be managed or protected by legacy security tools. The risk is no longer theoretical, with the FBI and the DHS issuing multiple warnings. This session will explore the new threat landscape, providing several examples of attacks on these devices, and discuss new considerations of security architectures with a ‘Zero Trust’ philosophy to fill the gaps left by traditional security architectures.
Jesse leads solutions delivery at Armis Security, a new and innovative force in the IoT security space. Jesse has a rich track record with security technologies in tech startups and large organizations translating complex technology into highly effective solution scenarios. He has extensive experience across financial services, manufacturing, health care, hospitality and government verticals, especially around the operational and security challenges of innovation driven business transformation, including IoT. Among his favorite site visits: motorcycle manufacturer test track and automated baggage handling complex.
Session Eleven3:30 pm - 4:00 pmChris MorrisThreat Prevention SME
Advanced Threat Prevention: How to stay one step ahead of cyber-attacks and ransomware.
Chris Morris is the Threat Prevention SME for Check Point’s Central United States region. He has been in the IT industry for over 20 years, whose experiences include perimeter and endpoint security, network virtualization, disaster recovery, and network design.
CISO PANEL4:00 pm - 5:00 pmGregory Austin - ModeratorAdvisory Systems Engineer