Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Session One9:00 am - 9:30 am
Reducing your impact from a Third Party Breach
In 2019 nearly half of the breaches were due to a third party vendor. This trend will continue to get worse and contractual agreements are not taking brand damage into consideration.
This presentation will provide recommended security controls for third party risk management, defensive technologies, and standards on how to hold your third parties accountable and how to increase your monitoring of contractors and vendors to your network.
Ricky Allen is CISO for Critical Start, and President of the South Texas ISSA chapter. He holds certifications such as SABSA Security Architecture, CISSP, CISA, and Six Sigma. Ricky previously held roles at Accenture as an executive in their strategic information security consulting practice and at HP Enterprise Security Products as the practice lead for developing Security Operations programs for ArcSight SIEM products. Ricky has presented at conferences such as BSides, Black Hat, API Cybersecurity, HOU.SEC.CON, SANS, SecureWorld, and Data Connectors. Ricky is based in Houston, TX and has a degree in Management Information Systems from Texas A&M University.
Session Two9:30 am - 10:00 am
What is Robotic Decision Automation and Why Should I care?
Writing SIEM Rules and monitoring detection consoles is out. Not only do we not like it, it hasn’t proved to be particularly effective. The Respond Analyst is a new kind of analyst that increases capacity and improves the capability of any security team, regardless of size – without adding to the burden of an already overworked team. Powered by Robotic Decision Automation (RDA), the Respond Analyst is ideal for organizations that are collecting meaningful security data, but struggle with having the manpower and resources to properly analyze and triage security incidents.
Mike has over 25 years of experience in communications, networking, and security. He has sold, architected, and deployed SIEM solutions across the United States and around the world for companies like McAfee, NitroSecurity, and LogMatrix. Having spent many years helping security operations programs of all sizes design and implement security monitoring and log management solutions, Mike is expert in developing correlation rule sets and operationalizing processes and procedures to maximize efficiency. This expertise set the foundation for his belief in the value that automation can bring to cybersecurity. He shares that conviction each day as he helps Respond Software’s customers drive increased efficiency and explore how intelligent decision automation can transform their security programs. Mike’s academic background is in Computer Science, and he’s a veteran of the United States Air Force.
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
Threat Intelligence and Layered Security in the Equifax Era
The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.
Ted has worked with web and network security technologies for more than 20 years. He began his career in technology as a full-stack engineer in web development and design. As Chief Operating Officer, Ted guides the overall operations of Sentinel IPS, the CINS Active Threat Intelligence System, and all other supporting technologies. You may also find him presenting at an information security conference or trade show, spreading the word about shared threat intelligence.
Session Four11:00 am - 11:30 am
Achieving “Always On” IT Resilience
It’s time to revolutionize your data protection strategy. Protecting and transforming your digital business for exceptional customer experiences requires an “always on” platform for disaster recovery, backup and cloud mobility. An IT Resilience Platform allows you to cost-effectively and swiftly manage both unplanned disruptions, including outages, ransomware attacks, and natural disasters, as well as planned events, such as moving to the cloud or data center consolidations.
Experienced IT Professional, Sales Engineer with hands on experience in System Administration, Storage Administration, Cloud Storage (IBM, AWS, GCP, Azure), Data Protection, Virtualization (VMWare, Hyper-V, KVM), and networking.
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Break12:45 pm - 1:15 pm
Break / Vendor Booth Time
Session Six1:15 pm - 1:45 pm
Security breaches, data leaks and email-based attacks are a real threat to your organization. Now, more than ever, you need a new approach to email security and management. Don’t let the limitations of traditional technologies prevent you from protecting email and corporate information.
We have made it our mission to mitigate the risks you face from email, and support you in reducing the cost and complexity of protecting yourself by moving this workload to the cloud. We live and breathe cloud technology. We developed our proprietary cloud architecture to offer you comprehensive email security, service continuity and archiving in a single subscription service. Our goal is to make it easier for you to protect your business in today’s fast-changing security and risk environment.
Session Seven1:45 pm - 2:15 pm
A new approach to email security for Office 365
For hackers, Microsoft Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Romain Basset is a sales engineer at Vade Secure, where he helps SMB and enterprise organizations of all sizes keep their users from clicking on suspicious links or attachments.
He holds a Master’s Degree in Computer Engineering and has over 10 years of experience in IT security engineering and product management.
Break2:15 pm - 2:30 pm
Break / Vendor Booth Time
Session Eight2:30 pm - 3:00 pm
Your Last Line of Defense: A Guide to Disaster-proof Data Backup and Restore
While the importance of data backup is well established, the backup plans most companies use are decades old. The explosion of data in last 20 years has been matched by ever increasing storage capacity, a combination that creates one huge problem: how do you restore this ocean of data quickly when disaster strikes? In this session you’ll learn the techniques and technologies that will get your business back up and running quickly in an emergency while maintaining your long-term archives.
Morten Westerberg is the CEO and founder of Nordic Backup with branches in Denmark, Norway and the United States. Morten, who has dual Danish and US citizenship, began his professional career working with Managed IT Services and Business Continuity Planning in the late 90’s, which lead him to found Nordic Backup in Denmark in 2003, Norway in 2006, and the United States in 2009.
With over 20 years of experience in Business Continuity and data backup methods, Morten is an expert in cloud backup with a customer-centric focus on service and business recovery. His motto is, “Anyone can do a backup, but few know how to restore.”
Session Nine3:00 pm - 3:20 pm
Idaptive Next-Gen Access is the only industry-recognized solution that uniquely converges single single-on (SSO), adaptive multifactor authentication (MFA), enterprise mobility management (EMM) and user behavior analytics (UBA). With Idaptive, organizations experience secure access everywhere, reduced complexity and have newfound confidence to drive new business models and deliver kick-ass customer experiences. Over 2,000 organizations worldwide trust Idaptive to proactively secure their businesses.
8:30 am - 4:30 pm424 W. MarkhamLittle Rock, AR 72201501-372-4371