CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Session Two9:15 am - 9:45 am
The Bots are Coming!
Actually, they are here. They now represent over 50 percent of internet traffic. But not all bots are bad. There are many good bots, such as chat bots and search engine bots, that we rely on in our day-to-day digital lives. You do need to know the difference and take control of your bot traffic—they cannot be ignored and you cannot just block them all. In this presentation, we will look at the growth of bots, good bots versus bad bots, what to look for in a bot mitigation solution and a few use cases.
Scott Taylor is the Director of Solutions Engineering at Oracle Dyn. He has been in the network and application performance space for over 15 years, with the last 4 of those years specializing in DNS and Internet analytics. His customer experience includes working with the top banks, social media companies and e-commerce sites.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
Identity and Access Management – Tackling the Beast
Brian Dudek is a Sales Engineer with Data Strategy. He graduated from Ferris State with a CIS degree in 1997 and has worked in the field for over 20 years. He is a CISSP and CISM. His specialties are in security, mobility, Microsoft, data center, and networking. He is also an adjunct instructor at Davenport University where he teaches classes around network design and security.
For a copy of this presentation, please contact Kyla Murrell @ firstname.lastname@example.org
Session Four10:45 am - 11:15 am
Hurricanes, Banditos, and Steam Baths – How I got my data back
Stories of recovery. You will learn how disaster doesn’t need to equal downtime.
Terry Creighton is a Solutions Architect with Quorum. With 10 years in the Backup and Disaster Recovery space, Terry has a Bachelors in Information Management, and has worked in the information technology field since 2001.
For a copy of this presentation, please contact Lauren Neel@ email@example.com.
Lunch11:15 am - 11:45 am
Break / Vendor Booth Time / Lunch
Break12:45 pm - 1:15 pm
Break / Vendor Booth Time
Session Six1:15 pm - 1:45 pm
Cloud Security Platforms – Important Aspects to Consider
Please join us as we highlight the shared security model adopted by all Infrastructure as a Service IaaS providers.
We’ll briefly cover the areas where enterprises must focus their attention including Cloud Security Management, Active Protection, Automated Remediation, Identity Access Management, Powerful Network Visualization, Continuous Monitoring and Governance Rules.
For a copy of this presentation, please contact Ken Dickey @ firstname.lastname@example.org
Session Seven1:45 pm - 2:15 pm
Innovative Endpoint Management – A Holistic Approach to Vulnerability Management, Patching, OS-Upgrades and Software Distribution
Zero Day Vulnerability, Windows Fall Anniversary Update, Office 365 Migration: Are any of these topics causing you to lose sleep? This seminar will show you how you can automate OS-migrations, software deployment projects, and effective security exploit management all from one easy to use Endpoint Management Suite. This solution assists in making you the expert!
Bob Troup is Executive Sales Manager for baramundi Software USA Inc., Headquartered in Framingham, MA,. Bob is a 30-year industry veteran in corporate networking and endpoint management sales and consulting with companies including, Ivanti, VMWare, Auria Corp., and Xyplex. He specializes in solutions and deployment consulting for complex networks and cloud-based software environments.
Break2:15 pm - 2:45 pm
Break / Vendor Booth Time
Session Eight2:45 pm - 3:15 pm
Hacking Identity: A Pen Tester’s Guide to IAM
Know your opponent and know yourself. It held true for Sun Tzu 2500 years ago, and it holds true for pen testers today. A pen tester who has worked in sec ops role has a distinct advantage, especially if that pen tester has a solid grasp of the good, the bad, and the ugly of identity and access management (IAM) in an enterprise setting. For red teams, this presentation will cover pen testing tips and tricks to circumvent weak or missing IAM controls. For blue teams, we’ll also cover the steps you can take to shore up your IAM controls and catch pen testers in the act. Purple teaming, FTW!
By day, Jerod Brennen(@slandail) is a Security Solutions Architect with One Identity.
By night, he’s a husband, father, writer, filmmaker, martial artist, musician, and gamer. I think it’s fair to say that he’s earned every gray hair in his beard, having spent his career fulfilling infosec roles in consulting, higher education, retail, and public utilities.
Jerod loves to share what he’s learned over the years every chance he gets: at local and regional information security professional organizations, at larger information security conferences, and online via blogs and podcasts. He also teaches online information security courses for Pluralsight and LinkedIn Learning, as well as in-person courses, both domestically and internationally.
At the end of the day, Jerod just wants to help folks get one step closer to doing what they want to do securely.
For a copy of this presentation, please contact Noelle Felix @ Noelle.Felix@oneidentity.com.
Session Nine3:15 pm - 3:45 pm
Weaving a Security Fabric Covering for YOUR IT Network
The absence of technology integrations across customer environments make it increasingly difficult to gain visibility into what is happening across the expanded attack surface and identify cyber threats. Isolated security systems that cannot share intelligence lack the ability to rapidly and automatically respond to sophisticated, fast-moving threats.
Learn how an integrated, open ecosystem of security solutions—woven together to scale and adapt as business demands change—enables companies to address the full spectrum of security challenges across the expanding attack surface.
For a copy of this presentation, please contact Xenophon Griveas @ email@example.com.
Session Ten4:00 pm - 4:20 pm
How Mature Is Your Insider Threat Program?
Even though 60% of breaches are the result of insiders, a survey sponsored by Veriato reveals that the Insider Threat Program maturity level of most organizations is lower than expected. Whether entrusted with patient health data, customer financial information, IP or other proprietary information, a single breach can result in enormous damage to a corporation. This presentation will discuss the threat insiders can pose to critical data and key issues to consider when implementing an Insider Threat Program.
Patrick Knight is the senior director of cyber strategy and technology at Veriato, an innovator in actionable user behavior analytics and a global leader in insider threat protection, where he helps organizations protect critical data from threats by trusted insiders. For over 17 years, his cyber security career has included helping enterprises protect against online threats through the development of anti-malware, network intrusion detection, computer and network forensics and encryption technologies. Previously, he served in the U.S. Intelligence Community and the United States Army for 12 years in the fields of Signals Intelligence Analysis and Cryptanalysis and as a Russian and Serbo-Croatian Linguist. He can be reached on Twitter at @PatrickKnight70 and on LinkedIn at linkedin.com/in/PatrickKnight70.
8:15 am - 5:00 pm3645 River Crossing ParkwayIndianapolis, IN 46240(317) 705-0000