Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session One8:45 am - 9:15 am
How To Prioritize Your Security Spend
Speaker, Marcus Jensen, will present a vendor agnostic approach to how to prioritize what security products you invest in compared to the level of risk they mitigate. This presentation is executives who struggle with limited security budget and making hard choices, or how to juggle and prioritize marketing from security vendors. Marcus spent 15 years in military cybersecurity with Navy/Marines/Air Force overseas and at home. He is a techie at heart, certified Cisco CCIE and CISSP. He now works for Cisco out of Iowa.
Session Two9:15 am - 10:00 am
Fortification Through Education
Cyber-attacks are relentless. At some point, each employee in your organization will be faced with a malicious email. Arming your workforce with the ability to recognize and report suspicious activity is critical to the protection of your data. Dave Cunitz, Director of IT Infrastructure from Heartland Co-op discusses how they successfully reduced the risk of a cyber-breach through a comprehensive cybersecurity education program. Attend this session to discover:
- Tools used to increase employee awareness of Phishing tactics
- How to get approval from the C-suite for cybersecurity training
- Case study on how Heartland Co-op successfully reduced their risk of a breach
Dave Cunitz has over 25 years of experience in the IT industry. Dave spent 18 years as an IT professional at Principal Financial in the IT department. He is currently the Director of IT Infrastructure for Heartland Co-op where he is responsible for the organization’s infrastructure and help desk.
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
Prevent Cyber Attacks: Automate Your Threat Intelligence
Todd is the Chief Strategy Officer of Bandura Cyber and is responsible for driving corporate and product strategy and execution. Todd brings to the team over 20 years of cybersecurity industry experience. Prior to Bandura Cyber, Todd was VP of Corporate Development for Hexis Cyber Solutions, a provider of advanced threat protection solutions. Before joining Hexis, Todd spent 17 years as a Wall Street analyst where he followed the cybersecurity, infrastructure software, and data center/hosting industries.
Todd has a B.A. in Economics with certificates in Finance and Management Science from the University of Maryland, Baltimore County, and a MBA from the University of Maryland, College Park. He is also a Certified Financial Analyst.
Session Four11:00 am - 11:30 am
Sophos Labs 2019 Threat Report
We will review the latest Sophos Labs threat report and also take a deep dive into one of the most successful ransomware campaigns of the past year, SamSam. How does this threat work? And how can Sophos help protect you again this and other zero day and targeted attacks.
Larry has over 20 years of IT security experience. He has worked extensively with public, private, educational, and military organizations. Larry joined Sophos in April of 2014.
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Keynote Session12:00 pm - 1:00 pm
From business email compromises to cyber terrorism, this presentation will touch on several current cyber threats. We will discuss how various attacks work, how to protect yourself, and perspectives from the FBI.
Jason Soo is a Special Agent with the FBI assigned to the Cyber Task Force in the Des Moines, Iowa. Prior to joining the FBI, he was a government contractor for six years, and supported the FBI for three of those years. During that time, he supported several types of cyber criminal and cyber national security cases. He graduated with a Ph.D. in Computer Science from Georgetown University in 2016.
Break1:00 pm - 1:15 pm
Break / Vendor Booth Time
Session Six1:15 pm - 1:45 pm
A new approach to email security for Office 365
For hackers, Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Jamie Duff is an experienced sales leader with nearly 20 years’ experiencing working in the information technology and managed services industry. In his current role at Vade Secure, Jamie is tasked with accelerating the growth of Vade Secure’s corporate sales business in North America, both by hiring and managing a team of talented sales professionals and by building channel of MSPs from the Microsoft partner ecosystem. He previously held sales and sales leadership positions with Retarus, Real Asset Management, John Galt Solutions, and Qwest. Jamie graduated with a Bachelor of Science (BS) degree in Finance from Providence College.
Session Seven1:45 pm - 2:15 pm
TCVM: A New Approach to Targeting Risk with Context-Aware Vulnerability Management
Improve vulnerability prioritization by combining threat signatures and vulnerability data
Threat–centric vulnerability management (TCVM) takes a fundamentally new approach to significantly reduce the risk of attack on an organization. TCVM uses the context of a network, assets and business as well as current threat intelligence to accurately determine risk and focus remediation where it matters most. Vulnerability management is about more than scanning, severity levels and patching. To have a real impact on lowering your risk of cyberattack, you need to centralize and analyze data from your entire attack surface. This type of approach means using more data sources in vulnerability discovery, more context in prioritization, more options in remediation and more accountability in oversight.
David Anteliz has more than 25 years’ experience in IT and network security. He currently serves as the senior sales engineer for Skybox Security in the Ohio Valley region of the north-central United States. Prior to Skybox, Anteliz held director and manager positions within the IT security and service provider space, including lead implementation roles in large-scale and global rollouts for securing networks across multiple verticals and solutions.
Break2:15 pm - 2:45 pm
Break / Vendor Booth Time
Session Eight2:45 pm - 3:15 pm
The Future of SD-WAN is Now
It is projected that over 50% of enterprises will deploy some form of Software-Defined Wide Area Network (SD-WAN) by 2020. This session will provide a brief overview of SD-WAN technologies, but focus on use cases, security capabilities and explaining the current state of Cisco solution sets.
Brian Clarke is a Solutions Architect at OneNeck. In this role, he is responsible for network-related customer solutions. Brian is primarily focused on Cisco solutions across all network specializations, including Enterprise Networking, Data Center and Collaboration services. Brian works with customers to clarify needs, identify potential solutions and provide ongoing support to ensure their continued trust and confidence in the OneNeck partnership.
Prior to joining OneNeck in 2010, Brian amassed more with more than 20 years of experience in the IT industry. He gained experience leading an IT training and consulting firm in Des Moines, Iowa, and traveled the globe as an independent contractor providing training and consulting services.
Brian maintains several designations across relevant technology specializations, including several Cisco Network Professional and Design Professional certifications.
Session Nine3:15 pm - 3:45 pm
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
Jeff Raymond is a Seattle, WA based Cloud Security Engineer at Avanan. While working for companies ranging from security giants to start-ups, he has found his passion in protecting organizations from phishing attacks and securing their cloud applications. Outside of work, he can either be found snowboarding or wakeboarding (depending on the season) or geeking out in his home lab.
Session Ten4:00 pm - 4:20 pm
Security: Start With Why
In today’s rapidly evolving threat landscape, we all know that security should be top-of-mind to keep our business, its data, and its clients protected. When people fall into a pattern of taking a reactive approach to managing security issues, it’s common to overlook the bigger picture planning on the front end that allows you to stay proactive. It’s important to think through what can and will happen if your security is compromised, both professionally and personally. Join Jake Gibson as he discusses why it’s critical to take a step back and start with WHY your services, support, devices, and processes need to be built around security first. Jake will share firsthand accounts of personal and professional scenarios he’s seen where security has been compromised leading to loss of private information, costly fines, hinderance to business operations, and even irreparable harm to brand reputation. We all know that we should be monitoring, maintaining, and evolving our security practices, but it’s time to slow down and discuss WHY.
Coming to LightEdge with over 20 years of experience in the information technology field, Jake is responsible for establishing, maintaining and enforcing the information security policies and procedures that keep LightEdge customers protected at all times. This includes both risk management and business continuity planning. In terms of compliance, Jake creates and maintains the LightEdge regulatory roadmap, coordinates all audit activities, and assists clients with all their compliance needs.
CISO PANEL4:20 pm - 5:00 pm
8:15 am - 5:00 pm101 E. Locust StreetDes Moines, IA 50309515-244-1700