Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session One8:45 am - 9:15 am
Security Operations: Has managing security tools become unmanageable?
As long as there has been IT security practices, there has been challenges that make the job of securing data more difficult. Not all these challenges come from the latest “zero-day” threat or phishing campaigns. Some are created by the business itself. With the boom of security products and organizations buying these tools across their network, they have inadvertently produced the latest security challenge organizations are facing today.
This challenge is securely focused around “Security Operations”, and the nearly impossible task of efficiently managing the complex security environments which were brought into an organization from point solution mentality. Couple the complex nature of today’s security infrastructure with the lack of certified engineers and you are left with an unmaintainable task of managing the very tools that were purchased to protect you. This wide spread issue impacts the largest organizations down to SMB’s.
What can be done to streamline and manage this process? Join SMP’s session and find out how organizations can look at security operations in a new light.
Jonathan Borgesen is SMP’s Cyber Security Advisor. Jonathan has a decade of experience in the Cyber Security Industry. During that time Jonathan has focused on educating organizations on modern threats as well as the best course of action to protect against those threats. Through this methodology, Jonathan has assisted many organizations meet their security goals whether it be on the Endpoint, Network, or Cloud. Jonathan is passionate about leveraging automation to assist organizations address skills shortages and an increasing threat landscape.
For a copy of this presentation, please contact Jennifer Blauvelt – email@example.com
Session Two9:15 am - 9:45 am
Win Big with IT Resilience
In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you to manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
Time is Up: Rethink DLP
Legacy DLP has failed all of us in security! The promise of Data Loss Prevention has turned into an endless cycle of policy management, user blocking and blind spots–all while missing the key to the plot: protecting the *user’s* data. Join this session to hear why legacy DLP has pitfalls, interesting data around insider threat and leakage and how and why you should be thinking about protecting your users over preventing them from doing their work.
Mark Hubbard is a senior product manager at Code42 where he focuses on delivering market-leading solutions that delight and exceed customer expectations. He has 15 years of experience in the technology industry, ranging from startups to Fortune 50 organizations. Prior to Code42, Mark led product and marketing teams at SaaS technology providers in industries such as retail, tax and agriculture. When not in the office, Mark enjoys spending time with his kids and riding on one of his variety of bicycles.
For a copy of this presentation, please contact Meghan Marostica – firstname.lastname@example.org
Session Four10:45 am - 11:15 am
EMOTET: Nastier than WannaCry and harder to stop
Emotet is an exceptionally nasty, destructive threat causing huge
problems for organizations around the world. This fast-moving, ever changing malware uses multiple advanced techniques to get through your
defenses – which means it requires the very best defenses to stop it.
Lunch11:15 am - 11:45 am
Break / Vendor Booth Time / Lunch
Session Five11:45 am - 12:15 pm
Okta: Who We Are, What We Do, Threat Landscape
For a copy of this presentation, please contact Courtney Jadevaia – email@example.com
Break12:15 pm - 12:30 pm
Break / Vendor Booth Time
Keynote Session12:30 pm - 1:30 pm
Supervisory Special Agent Thomas LawlerFBI - New Haven
FBI Supervisory Special Agent in Charge Thomas Lawler has over 22 years of experience conducting Cyber criminal investigations, research and analysis, computer forensics, system administration, network security management, vulnerability and threat assessments, risk management, and the development and execution of effective threat mitigation strategies.
Break1:30 pm - 1:45 pm
Break / Vendor Booth Time
Session Seven1:45 pm - 2:15 pm
The Human Firewall is on fire – what do you do when the smoke clears?
Many enterprises are focused on prevention and are too busy with day-to-day firefights to look beyond the flames and think about how to recover. Beyond preventing attacks, organizations need to focus on detection and response. It’s no longer a matter of if you’re going to be attacked, but when.
Join this session to:
• Learn the cutting edge tactics of these digital thieves
• Identify and combat these attacks
• Learn how to recover, should an attack break through your defenses
For a copy of this presentation, please contact Kristy Pauloski – firstname.lastname@example.org
Session Eight2:15 pm - 2:45 pm
Innovative Endpoint Management – A Holistic Approach to Vulnerability Management, Patching, OS-Upgrades and Software Distribution
Zero Day Vulnerability, Windows Fall Anniversary Update, Office 365 Migration: Are any of these topics causing you to lose sleep? This seminar will show you how you can automate OS-migrations, software deployment projects, and effective security exploit management all from one easy to use Endpoint Management Suite. This solution assists in making you the expert!
Bob Troup is Executive Sales Manager for baramundi Software USA Inc., Headquartered in Framingham, MA,. Bob is a 30-year industry veteran in corporate networking and endpoint management sales and consulting with companies including, Ivanti, VMWare, Auria Corp., and Xyplex. He specializes in solutions and deployment consulting for complex networks and cloud-based software environments.
Break2:45 pm - 3:00 pm
Break / Vendor Booth Time
Session Nine3:00 pm - 3:30 pm
Secure Access Transformed
Michael Dalton is a Sr Identity Engineer at RSA, the Security Division of Dell. Over the past 30 years, his work as a security focused field sales engineer has provided a unique solutions into common challenges in Identity and Access Management.
He lives in West Hartford, CT with his phenomenal wife Kim, sons Ben and Clark and loves to go hiking!
For a copy of this presentation, please contact Carrie Everette-Vaughan – Carrie.EverettVaughan@rsa.com
Session Ten3:30 pm - 4:00 pm
A new approach to email security for Office 365
For hackers, Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Jamie Duff is an experienced sales leader with nearly 20 years’ experiencing working in the information technology and managed services industry. In his current role at Vade Secure, Jamie is tasked with accelerating the growth of Vade Secure’s corporate sales business in North America, both by hiring and managing a team of talented sales professionals and by building channel of MSPs from the Microsoft partner ecosystem. He previously held sales and sales leadership positions with Retarus, Real Asset Management, John Galt Solutions, and Qwest. Jamie graduated with a Bachelor of Science (BS) degree in Finance from Providence College.
Session Eleven4:00 pm - 4:20 pm
The current Malware Threat Landscape – and Best Practices for Enterprise Grade Remediation
Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.
This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.
Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.
8:15 am - 5:00 pm315 Trumbull StreetHartford, CT 06103