Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session One8:45 am - 9:15 am
State-of-the-Art Security Event Analysis ( AI / ML / Expert Systems / Probabilities )
In this talk, we’ll discuss how new approaches and technology advances allow Security Operations teams of all sizes to finally have the capacity of Fortune 100 Companies. Your small team can analyze billions of incoming security events daily using state-of-the-art techniques such as AI, ML, Expert Systems, and probabilistic math. We’ll also discuss the pros and cons of each of these approaches.
Raj is currently part of the Respond team focused on helping organizations with automation of Security Operations. Prior to Respond, Raj held Field, Product management and Development roles at Fortify Software, WorkSoft, Rational Software, and Pure Software focusing on SDLC and security.
For a copy of this presentation, please contact Jane Dunne – Jane@respond-software.com
Session Two9:15 am - 9:45 am
Network Security is a Team Sport
Now more than ever, protecting your network takes teamwork. So, who are the players? There are more than you think: It’s not just you and your staff. Your users and vendors are obviously on the team, but it goes a lot deeper than that, too. Through a handful of quick case studies, we’ll pull back the curtain on shared threat intelligence, open source software, outsourcing, and even social media to see how an emphasis on working together can help combat common issues like ransomware and malware.
Ted has worked with web and network security technologies for more than 20 years. He began his career in technology as a full-stack engineer in web development and design. As Chief Operating Officer, Ted guides the overall operations of Sentinel IPS, the CINS Active Threat Intelligence System, and all other supporting technologies. You may also find him presenting at an information security conference or trade show, spreading the word about shared threat intelligence.
One of Sentinel’s first employees, Ted is not afraid to get his hands dirty supporting Sentinel customers or lending a hand in Sentinel software development. Ted received his Bachelor of Business Administration from the University of Iowa (Go Hawks!) and his Master of Education (Secondary Mathematics) from the University of North Texas.
He resides in the DFW area with his wife and two sons, which keep him busy on seemingly every karate dojo and auditorium in the North Texas area. He can also be found swinging a hammer for Habitat for Humanity or riding his beloved bicycle for Team in Training.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
The Life of a 0-Day
We’ve all heard stories about advanced nation-states leveraging zero-days to exploit a previously unknown security vulnerability. Perhaps the most infamous example is Stuxnet (with its four zero-days) that went undetected for an estimated five years prior to being discovered. However, that does not mean the ability to develop exploits for zero-day vulnerabilities is reserved only for well-financed state-sponsored actors.
We will cover the definition of zero-days, their types (including immortal, quasi-alive, etc.), the cost of developing or buying zero-day exploits and their lifetime. What is the life expectancy of zero-day exploits and their underlying vulnerabilities? You are up for a surprise (or two)!
Finally, we will embark on a discussion of whether the government should stockpile zero-days or disclose them as soon as they are discovered. This talk leverages data from the first large-scale study of zero-days.
Rene Kolga, CISSP, has over 15 years of cybersecurity experience in the areas of endpoint protection, insider threat, encryption and vulnerability management. He worked for both Fortune 500 companies and Silicon Valley startups, including Symantec, Citrix, Altiris, ThinAir and Nyotron. Rene earned his Computer Science degree from Tallinn University of Technology. He frequently speaks on security topics at industry conferences like Black Hat, InfoSecurity and (ISC)2 Security Congress.
For a copy of this presentation, please contact Jessica Filip – email@example.com
Session Four10:45 am - 11:15 am
One Platform for IT Resilience — simple, scalable, and always available.
Successful businesses are embracing digital transformation – harnessing the power of technology to drive efficiencies, create new experiences, and ultimately beat the competition. These business leaders are relying on their IT organizations to make it happen. Challenged to maximize IT resources and faced with the complexity of protecting the business while modernizing and transforming, IT leaders are shifting to an IT resilience strategy. IT resilience is the ability to seamlessly adapt to new technology and drive IT transformation, while mitigating the risks of downtime, ensuring an always-on business and the best customer experience.
Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto combines disaster recovery, backup and cloud mobility in a simple, converged platform. With enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds.
Lunch11:15 am - 11:45 am
Break / Vendor Booth Time / Lunch
Session Five11:45 am - 12:15 pm
Building Effective CyberDefenses Strategies Against Privileged Attack Vectors
The daily newsfeed continues to be littered with tales of new cyberattacks. Central to most of these stories is an element of privilege abuse or misuse. Based on strategies developed by BeyondTrust and presented in the book Privileged Attack Vectors, you will learn how privileges, passwords, and vulnerabilities are leveraged as attack vectors, and the steps you can take with Innovation Network Technologies to mitigate these threats.
Attendees will learn:
- What is privileged access management?
- Best practices for assessing, prioritizing and addressing privileged risks
- 12 key steps to mitigate the threats of unmanaged privileges
For a copy of this presentation, please contact Gene Loye – firstname.lastname@example.org
Break12:15 pm - 12:30 pm
Break / Vendor Booth Time
Keynote Session12:30 pm - 1:30 pm
Special Agent Miguel A. Clarke has been employed with the FBI for more than 20 years. He is a graduate of the University of Kansas and joined the FBI in 1998. Special Agent Clarke investigated Major Drug Trafficking Organizations, Violent Crimes and Multi-national Gangs before joining the National Security Squad in 2000. In 2001, SA Clarke joined the newly-created Dallas Cyber Squad. His primary responsibility was investigating criminal computer intrusions within the Northern District and Eastern District of Texas.
In 2004, SA Clarke began working National Security cyber cases, exclusively. He was the primary case agent for the United States’ efforts to protect the F-35 Joint Strike Fighter from broad-spectrum, Cyber-Counterintelligence threats (hostile foreign governments). In 2008 he was promoted to a Supervisory Special Agent and served at the National Cyber Investigative Joint Task Force in the Washington, D. C. area. SSA Clarke returned to Dallas to start a dedicated National Security Cyber Squad for FBI Dallas in 2010. In this role, he assembled and led a successful, high-functioning, Cyber Squad which successfully mitigated numerous classified threats to the national information infrastructure. SSA Clarke spent 7 years supervising various National Security and Criminal Investigative programs. In 2017, SA Clarke joined the Office of the Private Sector program to help coordinate FBI efforts to better engage with Private Sector partners to protect Critical Infrastructure.
Break1:30 pm - 1:45 pm
Session Seven1:45 pm - 2:15 pm
Segmentation Made Simple – Utilizing Zero Trust via Host Identity Protocol (HIP)
How HIP technology solves for antiquated TCP/IP protocols, bridging the gap between security and connectivity in modern IoT and hybrid-cloud networks.
Robert Kern is a Regional Sales Director for Tempered Networks with nearly thirty years of experience providing network and security solutions for customers in multiple market verticals throughout the central United States as well as Mexico.
Robert has tenure with several notable and innovative companies, including SynOptics (Bay Networks) and F5 Networks. With his pioneering attitude and keen sense of business, Robert was instrumental in bringing their disruptive solutions to market.
Based in Dallas, Robert has cultivated long-standing relationships with Fortune 500 accounts, from oil and gas to global transportation companies, and is well-respected for his ability to map solutions to meet critical business challenges.
His other interests include a passion for restoring and collecting Pontiac muscle cars, raising funds for wounded veterans, and working on family ancestry.
Session Eight2:15 pm - 2:45 pm
Data as the New Perimeter
Data is essentially inert and passive, lacking an inherent ability to either control its own fate or mitigate risks while under process, as well as at rest and in transit. Data loss and theft is a result of the problem.
The safety of the data is wholly dependent on human behavior and infrastructure. In reality, the enterprise protects data indirectly through a static perimeter. Endpoints are managed, and trust assumed. This approach is not data-centric and has reached obsolescence.
This workshop will survey the domain of the state actors and ensuing vulnerabilities to our infrastructure and corporations. It will highlight a paradigm that imbues data with self-governance, provenance and protection capabilities, to make it the new perimeter and a source to rethink deployments, workflows, and responsibilities. Use Cases will also be discussed.
Amir provides strategic direction and execution capacities to set Data: Empowered as a new global standard in the data protection space. He has twenty-five years of experience in the IT and Corporate Learning industries, including two-decades at the largest IT company in Latin America, where he was Head of a Business Intelligence Unit representing Microstrategy, and, a Chief Learning Officer, representing Harvard Business Publishing.
Amir was the founder of the first Non-Profit Organization that assisted Israel’s Incubator System, in which he hand-held over 100 high-tech companies. He was the Vice Chairman of the American-Israel Chamber of Commerce and Industry, overseeing its initiatives, and a Recipient of its Business Leadership Award.
Amir Served in the Directorate of Military Intelligence for the Israel Defense Forces, and was awarded the Most Outstanding Soldier of the Corp. in 1981. He holds an AB in Political Science and Psychology from Tel Aviv University ’86; an MIA in International Economics from Columbia University ’90; and, an MBA from the ‘Grand Ecole’ EDHEC ’92 specializing in IT and Management where he graduated first in his class.
For a copy of this presentation, please contact Rivers Nesler – email@example.com
Break2:45 pm - 3:00 pm
Break / Vendor Booth Time
Session Nine3:00 pm - 3:30 pm
Certificate Management Challenges and How to Overcome Them
Join Kyle Grueninger, Vice President of Sales, The SSL Store™ as he discusses the difficulties businesses face when managing SSL in this new era of data protection. “Certificate Management Challenges and How to Overcome Them” will highlight key factors contributing to the increase in SSL usage, recent real-life examples of certificate expirations and their business impact, common challenges companies must solve to efficiently manage SSL, operational consequences of SSL mis-management and what to look for in effective certificate management solutions.
For a copy of this presentation, please contact Kyle Grueninger – kyle@theSSLlstore.com.
Session Ten3:30 pm - 3:50 pm
Protecting Your Digital Supply Chain
The Zero Trust Imperative of Third-Party Risk
It’s been estimated that more than 60% of the most severe breaches in recent years were a result of compromised third party suppliers, customers, and partners. The overwhelming need to share critical business information across the extended enterprise combined with a complete lack of control over third party security creates a fragmented and exponentially expanding threat surface that permeates the digital supply chain of every industry. In 2019, there is no such thing as a trusted third party. How do you protect your business, when you don’t know who you can trust?
CISO PANEL4:00 pm - 5:00 pm
Secrets of Superstar CISO Success
CISOs aren’t born, they’re made. And tested. Constantly. With obligations like protecting employees and digital assets from data breaches, and demonstrating compliance with a daunting number of internal policies and industry regulations, CISOs have a lot on their plate. So, what’s the secret to CISO success? Similarly, what differentiates a strategic CISO from a tactical CISO?
This panel, “Secrets of Superstar CISO Success,” will seek to answer these questions with perspectives on:
- How to prepare today for the threats of tomorrow
- Charting a security strategy that protects and supports the business
- How to earn a seat at the executive table
- What you know now that you wish you knew then
We hope you’ll join us for this informative and enlightening panel.
8:15 am - 5:00 pm4801 LBJ FreewayDallas, TX 75244