Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session One8:45 am - 9:15 am
Zero Trust – Going Beyond the Perimeter
Learn how Cisco enables Zero Trust for the Workforce, Workplace, and Workloads by establishing multi-factor authentication and device trust while providing a consistent login experience for on-premise and cloud applications.
Gary is a Security Technical Solutions Architect, and has worked in Cisco Security for 19 years, with 9 years industry experience prior to that. He authored CCNP Security IPS 642-627 Quick Reference, as well as Security Monitoring with CS-MARS. He was technical editor of Intrusion Prevention Fundamentals.
Prior to working at Cisco, Gary wrote web-based teaching software, taught computer sciences courses, and managed the network and security at a college. Gary lives in Oregon with his wife, and his very close to his grown children. His hobbies include motorcycles and ATVs, boating, and almost everything in the outdoors.
Session Two9:15 am - 9:45 am
Stop accepting risk. Resolve every alert!
Organizations are moving to more sophisticated endpoint technologies to help improve their security posture and decrease their risk profile. However, the fundamental issue of alert fatigue remains, and three solutions have risen to the top as answers for the “noise”. Alerts can be ignored due to time and resource constraints, the noise can be turned down by disabling feature sets within the tools themselves, or third party MSSPs can be leveraged to address the alert overload. Each of those solutions are accompanied by either intentional or unintentional risk acceptance. Stop accepting risk. Resolve every alert!
Tommy Scott is a Sr. Security Consultant at Critical Start responsible for all presales activities for Critical Start’s MDR services in the Central Region. Tommy has spent a decade in the Information Security industry with experience ranging from Security Operations, Security Engineering, and GRC within industries such as healthcare, retail, and oil & gas.
Break9:45 am - 10:15 am
Coffee Break / Vendor Exhibit Time
Session Three10:15 am - 10:45 am
State of the Art Security Event Analysis
In this talk, we’ll discuss how new approaches and technology advances allow Security Operations teams of all sizes to finally have the capacity of Fortune 100 Companies. Your small team can analyze billions of incoming security events daily using state-of-the-art techniques such as AI, ML, Expert Systems, and probabilistic math. We’ll also discuss the pros and cons of each of these approaches.
Raj has more than 25 years of experience in software development, product management, and technical sales. As a developer, Raj acquired a deep understanding of the importance of incorporating built-in security at every stage of the software development lifecycle. Raj’s professional experience also spans all stages of the software development lifecycle, from product inception to business development. Working at companies like Fortify Software, WorkSoft, Rational Software, and Pure Software has given Raj a unique understanding of his customers’ needs for automation and robust security operations programs—a perspective that’s both highly technical and very much human-focused.
Session Four10:45 am - 11:15 am
Network Security for Free
How to get Network Security for free using fields that are already built in to the TCP/IP protocol suite.
Mike Motta is a well-respected instructor at the former Network Instruments University, now Viavi Solutions, with experience training thousands of people. A veteran of the IT industry, he has been using protocol analyzers on a daily basis for more than 30 years. His certifications include the CNX certification status in 1995, WCNA certification in 2013, SSCA VoIP certification as well as the GCIA certification in 2018 and the GCIH certification in 2019.
Lunch11:15 am - 11:45 am
Lunch / Vendor Exhibit Time
Keynote Session11:45 am - 12:30 pm
DHS Cyber Security programs which coordinate cyber preparedness, risk mitigation and incident response. The DHS cyber security resources include assessments, active monitoring and vulnerability mitigation processes to the nation’s sixteen critical infrastructure sectors and state, local, tribal, and territorial government entities.
Mr. Jenista serves as the Regional Cyber Security Advisor for Region VII (IA, KS, MO and NE) for the Cybersecurity & Infrastructure Security Agency (CISA), Integrated Operations Division. Based in Kansas City, KS, he supports the Department of Homeland Security’s (DHS) mission of strengthening the security and resilience of the nation’s critical infrastructure.
His programs coordinate cyber preparedness, risk mitigation and incident response. He provides Cyber Security resource briefings, Cyber Security assessments, and Incident Response planning to the nation’s sixteen critical infrastructure sectors and state, local, tribal, and territorial government entities.
Prior to joining the Department of Homeland Security Mr. Jenista worked for 12 years with U.S. Army as an Army Enterprise Systems Branch Chief and Information Systems Security Manager with responsibility for all aspects of Technical support, Service Delivery, Risk Management, Project Management, Enterprise Architecture and Information Security. Prior to joining the U.S. Army, he served 22 years in the U.S. Navy as a Senior Chief Petty Officer, holding duties as an Executive Officer, Weapons Officer and AEGIS Maintenance Supervisor.
Mr. Jenista holds a MBA and an MA in Information Technology Management from Webster University. He has a BS in Computer Information Systems from Park University and he holds the Certified Information System Security Professional (CISSP) certification.
Break12:30 pm - 1:00 pm
Dessert and Coffee Break / Vendor Exhibit Time
Session Six1:00 pm - 1:30 pm
Protection From Today’s Biggest Threats
In this session, we will cover some of today’s biggest threats, including Emotet and CryptoJacking. You’ll also learn how they attack, and what you can do to protect yourself. Many organizations already have the means to protect themselves, but are they using them properly? Are you doing the right things across your company?
Dan has over 25 years of experience in all aspects of information security. From his early days working with the Navy’s IFF encryption systems to his current role of solving security problems Dan has constantly worked to keep security simple. He has worked with and consulted to businesses with a single user as well as fortune 500 companies. In his current role as St. Sales Engineer for Sophos, he works with companies to synchronize their endpoint and perimeter protection systems.
Dan resides in St. Louis, MO and enjoys spending his free time working on a long list of home improvement projects.
Session Seven1:30 pm - 2:00 pm
Deception Technology, Luxury Item or Lifeline?
A common deception technology misconception is that it is a luxury item meant only for companies with mature security operations or large budgets. This session will provide insight into how deception has evolved, its fit within the security stack, and why financial institutions both large and small are turning to deception for accurate detection, building predictive defenses, and accelerated incident response. Join in to hear about real-world deployments and top use cases. Attendees will leave with insight into the value and benefits that defenders have realized from adding deception into their security operations programs and why it is often a lifeline for defense against today’s advanced attackers.
GB has 3 decades of experience in I.T. ranging from network support, programming, application & network performance management to security architecture & cyber security across verticals such as airlines, government, healthcare, manufacturing and medical devices. GB has a BA in Computer Science, Mathematics and Physics and an MBA in MIS and Operations. GB has held numerous industry certifications and is a Certified Ethical Hacker (CEH) and Certified Information Systems Security Professional (CISSP). GB lives in Aurora, IL and is extensively involved in community service.
Break2:00 pm - 2:15 pm
Break / Vendor Exhibit Time
Session Eight2:15 pm - 2:45 pm
Lightweight Deception, Heavyweight Results
As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader. Frank also is co-inventor of a patent issued for selectively regulating network traffic. Francesco is an experienced network engineer and prior to PacketViper, held the Director of Information Security and Technology position at Liberty USA, Partner and Director of Libcom Internet Services ISP, Sr Network/Systems Engineer, Architect, and PM for nationally based technology businesses such as The Future Now, XLConnect, and MicroAge. Francesco holds a BS in Technical Management from Embry-Riddle University. Francesco is a decorated veteran that served twelve years in the US Army Assualt Helicopter Battalion at FT Drum, and Schoefield Barracks.
Session Nine2:45 pm - 3:15 pm
High-Margin, Low-Maintenance: Reselling Native Office 365 Email Security
Harvesting Microsoft Office 365 credentials is now the most profitable activity for cybercriminals. That’s why, in Q4, Microsoft was the most impersonated brand, with 2.3x more attacks than #2 Netflix. While credential phishing is a serious enough threat, it’s just the beginning. Hackers are increasingly using compromised legitimate Office 365 accounts to launch even more damaging spear phishing attacks.
Trey King is a Solutions Architect with Vade Secure and has more than ten years in various aspects of security (systems, networking, software development, and email). He loves code, surfing, understanding things on a granular level, and thinks he is funnier than he really is.
Break3:15 pm - 3:30 pm
Break / Vendor Exhibit Time
Session Ten3:30 pm - 3:50 pm
How Zero Trust Improves Cybersecurity
Learn how the Zero Trust approach to access and authentication mitigates risk of misuse and prevents lateral movement inside a critical IT network. When implementing authentication for the right user at the right time with the right level of privilege, this approach helps organizations keep up with today’s hybrid and multi-cloud environments by providing simple yet secure access control, convenience of use and improved visibility and auditability. Join our Senior Solutions Architect, Jimmy Mills to learn why “Don’t trust, verify” is your slogan for the future.
Three key takeaways:
– How to manage access to critical data in complex on-prem and cloud IT networks through a single pane of glass and in a mostly automated fashion
– Why allowing only the right amount of privilege for the right user for the right amount of time improves security and mitigates internal and external risks
– How to log and audit every session for traceability, auditability and compliance using Zero Trust access management
Jimmy Mills is a Senior Solutions Architect for SSH.COM and has worked with several large enterprises assisting and overseeing SSH Key Management remediation projects. He has 20+ years’ experience coming from Unix Engineering and Access Management roles before joining the thought leadership team at SSH.
CISO PANEL4:00 pm - 5:00 pm
Ryan LouisaChief Technology Officer/ Chief Revenue OfficerSuperior Vendall
Seth Jeremy KatzAssociate Chief Information OfficerTruman Medical Centers
Brian RufManaging PartnerRuf Systems Group
Joe LeighChief Information Security OfficerVeracity Consulting
James WatersGlobal Chief Information Security OfficerBlack & Veatch
Jeffrey WheatSenior Director of Solution EngineeringatRISK Technologies
8:15 am - 5:00 pm2345 McGee StreetKansas City, MO 64108