Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session One8:45 am - 9:15 am
Internet 3.0: Networking of only trusted identities
While Networking 1.0 was about networking all PCs and giving users access to the Internet, the current era of Networking 2.0 has been focused on networking everything. These things are being networked and attempts are being made to secure them with no provable identity. Instead, we’re creating complex networking and security policies based on an IP address as identity. This creates exponential attack vectors and makes networking much more complex, costly, and fragile, introducing risk for our mission critical infrastructure. To dramatically reduce the business risks that impact most organizations today, a new identity networking paradigm is required to fix the underlying flaw in IP: a flaw that afflicts all networking and security products. Only through provable device identity can we begin to unify networking and security, overcoming the risk, complexity, and cost of today’s networks. Lowering CapEx and OpEx through radical policy simplification and segmentation, with no disruption to existing infrastructure, is now possible. With Networking 3.0, organizations can securely connect, cloak, segment, move, failover, and disconnect any connected ‘thing’ instantly – anytime, anywhere, without worry.
Rob is the Regional Sales Director for the Great Lakes region for Tempered Networks where he helps enterprise organizations address complex networking projects in the new era of connectivity for environments such as Industrial IoT, M2M, multi-cloud, etc. Prior to Tempered Networks, Rob spent 16 years at F5 Networks where he was instrumental in the company’s successful IPO as one of their original Solutions Engineers. Rob transitioned to Territory Account Manager in 2004, and was a top performer in helping his enterprise customers meet their vital application delivery goals. Before F5, Rob ran the AIX and Networking practice for a large IBM reseller in Houston Texas. Rob attended school at Western Michigan University and resides outside of Detroit, Michigan.
Session Two9:15 am - 9:45 am
The Bots are Coming!
Actually, they are here. They now represent over 50 percent of internet traffic. But not all bots are bad. There are many good bots, such as chat bots and search engine bots, that we rely on in our day-to-day digital lives. You do need to know the difference and take control of your bot traffic—they cannot be ignored and you cannot just block them all. In this presentation, we will look at the growth of bots, good bots versus bad bots, what to look for in a bot mitigation solution and a few use cases.
Al Sterling has been in the network and application performance space for 20 years, with the last few years specializing in the DNS and Security space. His customer service experience includes working with over 3,000 Oracle Dyn customers – the top banks, social media companies, and ecommerce sites.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
Win Big with IT Resilience
Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto is changing the way disaster recovery, data protection and cloud are managed. With enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds. Zerto is trusted by over 6,000 customers globally and is powering resiliency offerings for Microsoft Azure, IBM Cloud, AWS, Sungard and more than 350 cloud services providers
Session Four10:45 am - 11:15 am
Time is Up: Rethink DLP
Legacy DLP has failed all of us in security! The promise of Data Loss Prevention has turned into an endless cycle of policy management, user blocking and blind spots–all while missing the key to the plot: protecting the *user’s* data. Join this session to hear why legacy DLP has pitfalls, interesting data around insider threat and leakage and how and why you should be thinking about protecting your users over preventing them from doing their work.
Abhik Mitra is a product marketing manager at Code42. With more than 10 years of experience in Enterprise Technology, Abhik is the strategic conduit between the customer and Product Management, Sales, and Marketing teams at Code42. Prior to Code42, he served as a global product manager for companies including Xiotech, Kroll Ontrack, and Imation.
Lunch11:15 am - 11:45 am
Break / Vendor Booth Time / Lunch
Session Five11:45 am - 12:15 pm
Enabling Dynamic, Adaptive, Multicloud Security
Juniper’s Software-Defined Secure Network (SDSN) cyber security platform integrates, centralizes, and automates defense from today’s sophisticated threat landscape by automatically and dynamically detecting and responding to threats as a whole ecosystem rather than as an individual entity. This session will highlight how every element in an SDSN framework (physical, virtual, router, switch, firewall, edge) becomes an active participant in detecting and containing threats.
Break12:15 pm - 12:45 pm
Break / Vendor Booth Time
Session Six12:45 pm - 1:15 pm
A new approach to email security for Office 365
For hackers, Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Keynote Session1:15 pm - 2:15 pm
Cybersecurity from the FBI’s perspective
FBI Special Agent Benjamin Simon and FBI Intelligence Analyst Matthew Schwieger are members of the FBI Detroit Cyber Task Force. The Cyber Task Force is responsible for criminal and national security computer intrusion investigations in Michigan.
Break2:15 pm - 2:40 pm
Break / Vendor Booth Time
Session Eight2:40 pm - 3:10 pm
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
Session Nine3:10 pm - 3:40 pm
How Do They (Cyber Criminals) Get In? How To Prevent a Breach.
Andy Crocker is a Security Consulting Engineer for the Advanced Threat Protection organization within Fortinet, Inc.. Andy has been at Fortinet for over 3 years exclusively supporting our Advanced Threat Protection products. Andy is NSE 7 certified.
Andy has spent over 35 years in Information Technology. 16 of those years were at FedEx in Memphis, supporting all facets of the IT environment there, including networking and network engineering. The last 20 years Andy has been a Sr Systems Engineer for several organizations providing technical support in a pre-sales role. Technical training has been a large part of the various roles and responsibilities.
Session Ten3:40 pm - 4:00 pm
8 Steps to Slay the Compliance Dragon
If you don’t feel the compliance dragon breathing down your neck yet, you will soon. But you can slay that dragon. I’ve been where you are, and I know the frustrations, the chaos, the feeling of barely maintaining control. There is a way out. The annual compliance cycle doesn’t have to be a cluster storm of insane stress and chaos. More and more CISOs are discovering that their compliance activities can be smooth, efficient and trouble-free. Imagine running a compliance process that’s simply no big deal!
The key to taking control of compliance is taking stock of your current situation and strategically gaining control over the moving pieces, one component at a time—then maintaining your compliance efforts with very doable rinse/repeat maintenance activities.
This presentation shares the 8 critical steps you need to follow to slay the compliance dragon—for good. Tired of feeling beaten up by your annual compliance cycle? Then let’s slay that dragon!
Adam started in compliance just like most Total Compliance Tracking users: in a corporate IT department, trying to figure out how to manage annual audits. After herding the compliance cats—first on the front line and then as a manager—Adam decided to help others in the security and compliance space make the process easier. Leveraging his background in systems development, Adam founded TCT with the mission to improve the compliance management universe.
CISO PANEL4:00 pm - 5:00 pm8:15 am - 5:00 pm21111 Haggerty RoadNovi, MI 48375248-349-4000