Data Connectors is proud to host the Cybersecurity Strategies Conference.
8:00 am - 5:00 pm200 West 12th StreetKansas City, MO 64105816-421-6800
Check-in and opening introductions
Session Two9:15 am - 9:45 amDaniel ClarkSenior Sales Engineer
Fighting Back Against CryptoJacking
Cryptojacking has erupted onto the cybercrime scene, thanks to the surge in value of cryptocurrencies such as Bitcoin, Monero, and Ethereum. Use this campaign to start new security conversations, demonstrate your expertise, and create opportunities for Sophos solutions.
Crooks are aggressively targeting laptops, desktops, servers, and even mobile devices. From a single device to entire networks, they infect as many devices as they can to mine for cryptocurrency on, or while using, other people’s computers. Simply put, you do the work, pay for the electricity and hardware, and they pocket the rewards.
Join us to learn how to fight back! We’ll explore the differences between legitimate mining and cryptojacking; how cryptojacking works; the costs of cryptojacking to today’s organizations; and practical steps you can take to avoid being a victim of cryptojacking.
Daniel Clark is a Senior Security Professional with nearly thirty years of experience in securing information systems. As a Sr. Sales Engineer with Sophos, Dan works with top companies to address the complexity of security.
Session Three10:15 am - 10:45 amBrendan DalpeSenior Security Consultant
The Zero-Trust Engine: A New Model for Event Analytics
Zero-trust isn’t just a buzzword, it’s a truly disruptive ideology, but while in existence for almost 10 years, vendors still fail to correctly embrace the methodology. Companies faced with a shortage of talent continue to be overwhelmed by logs and alerts from legacy correlation engines. It’s not a coincidence that breaches continue to occur!
Come learn how Critical Start applied a zero-trust methodology to event analytics to increase the efficiency of security organizations and find the true incidents from logs.
During his tenure in the security industry, Brendan has served as an analyst, consultant and network engineer. He helps organizations strengthen their security posture by applying deep expertise in Next Generation Firewall and SIEM capabilities
Session Four10:45 am - 11:15 amRob PollockCentral Region Channel Sales
The Changing Landscape of DDoS Attacks – Advanced DDoS Is Here – Are You Ready?
Distributed Denial of Service (DDoS) attacks have entered a new era! Historically DDoS attackers have used a “brute force” approach to making an online services unavailable by overwhelming your company’s internet connection. DDoS targets wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and presents a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Brute force attacks have morphed into more sophisticated, multi-vector attacks. Your adversaries are patient, launching targeted attacks using deception & “smokescreen” tactics to take down your network. The frequency of DDoS attacked has risen dramatically as well. The emergence of IOT devices has led to larger, more destructive attacks from Lizard Stressor, to Mirai & now Memcache. 2018 has seen the first DDoS exceeding I tbps! (1.3 tbps & 1.7 tbps attacks)
Arbor will discuss the misconceptions & facts about modern day DDoS attacks and best practices to protect your company against DDoS attacks while providing maximum network availability. “Bandwidth saturation” will impact your business – an attack that exceeds your internet pipe is all it takes. In this new world, “peace time” no longer exists so having a DDoS protection strategy is critical! With 30+% of DDOS attacks causing havoc at the Application Layer with potential data exfiltration, the stakes could not be higher.
Session Seven1:15 pm - 1:45 pmDavid ColemanSenior Product Evangelist
An Overview of WLAN Security
As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.
So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:
- The 5 tenets of WLAN security
- Choosing the proper authentication and encryption model that doesn’t force user workarounds
- Utilizing Private PSK technology
- Device and user access control
- Future challenges for Wi-Fi security and WPA3
Session Nine2:30 pm - 3:00 pmHeather DeSiena
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365