Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Session Two9:30 am - 10:00 am
Deception Technology- Luxury Item or Lifeline?
Is deception technology only for mature security operations or is it an effective cyber security solution to help companies mature their capabilities? Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. Learn how deploying deception throughout your environment can build the bridge to strengthening all the levels in your security stack.
In this presentation you’ll hear about real-world deployment experiences, the value customers are realizing, and what Red Teams are saying about deception-based threat detection
Matt is the Area Vice President for the Southeast at Attivo Networks. He is a key contributor to Attivo’s success, and as an early stage employee has been instrumental in helping define deception technology use cases and develop tangible partnerships, which have led to marquis brands becoming Attivo customers. The company’s success and market leadership are attributed to a customer centric approach and its commitment to customer success. Matt has been an integral part of the leadership team in defining and developing programs that unite new technology and customers to solve difficult cybersecurity challenges. Prior to Attivo Networks, Matt held various leadership roles for a Fortune 500 Global Software company.
For a copy of this presentation, please contact Attivo Team at firstname.lastname@example.org
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
A new approach to email security for Office 365
For hackers, Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Session Four11:00 am - 11:30 am
Transforming Security Operations with Robotic Decision Automation
Overwhelming amounts of incoming data and ever-changing environments keep businesses and IT struggling to keep pace. RDA solves this problem by automating deep analytical reasoning across large data sets. With RDA data can be analyzed in a fraction of the time and fact-based, sound decisions can be made in real-time at enterprise scale. The Result: Teams become more effective with faster, more accurate decisions that lead to quicker, more informed responses.
Mike is a Sales Engineer at Respond Software. He is focused on helping organizations of all sizes drive efficiencies across their security operations teams. Prior to Respond Software, Mike sold, architected, and deployed SIEM solutions across the globe for McAfee, NitroSecurity and LogMatrix. While at LogMatrix (aka OpenService) he helped to develop their risk-based correlation engine and helped the company pivot from systems management to SIEM. He has a B.S. in Computer Science, served in the United States Air Force, and has 25+ years experience in communications, networking, and security. He was once a firm believer in the power of correlation but has seen the light and is working to atone for the sins of his past.
For a copy of this presentation, please contact Jane Dunne – Jane@respond-software.com
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Keynote Session12:00 pm - 1:00 pm
Mr. Baker was born in Springfield, Missouri but primarily raised outside Milwaukee, Wisconsin. He earned a Bachelor of Science degree in Accounting and a Bachelor of Arts degree in Spanish from Oral Roberts University in Tulsa, Oklahoma. From 2001 to 2004, Mr. Baker worked as a Certified Public Accountant (CPA) for a public accounting firm where his audit clients included Fortune 500 companies from the aerospace/defense, retail, and oil and gas sectors. Mr. Baker also held an internship on the U.S. Senate Finance Committee prior to working as a CPA.
Mr. Baker entered on duty with the FBI as a Special Agent in July 2004. Following New Agents training, he was assigned to the Memphis Division, primarily working violent crime and gang matters until late 2007. Thereafter, he investigated public corruption matters. Mr. Baker also served as a Special Agent Accountant and member of the Memphis Division Evidence Response Team. Mr. Baker earned his Certified Fraud Examiner certificate in 2006.
In November 2008, Mr. Baker was selected as the Acting Supervisory Special Agent (SSA) of the Memphis Division’s white collar crime and public corruption squad. He served in this capacity until February 2009, when he was selected as the Acting SSA of the violent crime and gang squad in Memphis. During this time, Mr. Baker became a Crisis Management Coordinator (CMC) for the Memphis Division. In July 2010, he was promoted to the position of SSA on Memphis’ civil rights/public corruption squad. Mr. Baker led this team until January 2012 when he assumed responsibility over the Memphis Division’s counterintelligence/cyber squad.
In February 2013, Mr. Baker was promoted to the role of Assistant Inspector in the Inspection Division at FBIHQ, where he served until March 2014. During this time, he participated in performance reviews of FBI programs in field offices, overseas Legal Attache offices, and FBIHQ divisions, as well as responses to Agent-involved shootings and serious accidents.
In March 2014, Mr. Baker returned to the Memphis Division, where he again served as the counterintelligence/cyber SSA. His collateral assignments included the roles of Primary CMC and Back-Up Media Coordinator for the division. In January 2015, Mr. Baker was selected to be the Assistant Special Agent in Charge (ASAC) over the Criminal/Administrative Branch of the Memphis Division. He served in this capacity until January 2017 when he was designated ASAC over the Memphis Division’s National Security/Intelligence Branch.
Break1:00 pm - 1:30 pm
Break / Vendor Booth Time
Session Six1:30 pm - 2:00 pm
Make Threat Hunting a Reality
Join us to gain in-depth knowledge on how to fully equip yourself with the right tools and knowledge to effectively execute a threat hunt for successful outcomes. During this presentation, you’ll learn how to prepare for a prospective hunt implementation, gain practical insight into effective threat hunting strategies, and utilize MITRE ATT&CK Framework to assist in remediation of threats.
Justin Swisher is a Threat Hunter at Fidelis Security. Building on more than twelve years of IT security experience with an emphasis in network security architecture and monitoring, Mr. Swisher has worked to develop new techniques to improve detection and threat hunting. After spending four years with the Air Force as an intelligence analyst, Mr. Swisher brought those analytical skills to leading cybersecurity vendors in an effort to improve network security detection and response.
Session Seven2:00 pm - 2:45 pm
“Cyber-enabled” crimes pose a growing risk to our community and global economy. With the expansion of cyberspace, threat actors have refined their attack methodologies to exploit a greater number of threat vectors. Unfortunately, subsequent indicators of compromise go unrecognized and unreported, which further increases risks of exposure to organizations. Despite ongoing intelligence information sharing initiatives, there still remains an increased lack of collaboration among stakeholders. This a community based problem requiring “community based solutions.”
Channing Irvin, a veteran agent with over 25 years of law enforcement experience, was appointed as the Special Agent in Charge (SAIC) of the Memphis Field Office. Channing began his law enforcement career as a police officer with the Columbus Ohio Division of Police and in 2000, he began his career as a special agent with the United States Secret Service, Columbus Resident Office. After serving in the Columbus Resident Office as a criminal investigator, Channing served five years on the Presidential Protective Division and also worked in the Office of the Assistant Director for Protective Operations where he managed the directorates programs and initiatives.
Channing ascended the management ranks serving as the Assistant to the Special Agent in Charge of the Office of Protective Operations as a White House Military Office Liaison, overseeing business continuity programs and initiatives. Early in 2015, Channing was assigned to the Office of Protective Operations where he possessed direct oversight of the acquisition process the agency’s resource tracking and management software and applications. In 2016, he was appointed to the Office of the Chief Information Officer, Cybersecurity Programs. During this time, Channing managed a team of IT specialists and contractors that were responsible for the deployment and administrative of all of the USSS critical Information, communication and technology system security. In 2017, Channing was promoted to the Assistant Special Agent in Charge of the Office of Strategic Information and Intelligence Counter Surveillance Division, where he directed the agencies vulnerability threat assessments and mitigation strategies for all protective venues and National Security Special Events (NSSE’s).
Channing is a native of Pittsburgh, Pennsylvania and a veteran of the U.S. Marine Corps. He holds a bachelor’s degree in Criminology from The Ohio State University, a Master of Science in Telecommunications/Network Security and a Master in Technology Management from George Mason University. Channing is a graduate of the American University Key Executive Leadership program, which is part of his Senior Executive Service Candidate Development Program. A follow on developmental assignment was completed with the FBI HQ, Finance Division/Financial Systems Section, where he engaged corporate technology innovation and outreach programs.
Break2:45 pm - 3:00 pm
Break / Vendor Booth Time
Session Eight3:00 pm - 3:30 pm
Cybersecurity Landscape 2019-2020
With the ever evolving threat landscape, how to keep up and protect your data!
Mr. Wren will discuss the Cyber Security landscape for the remainder of 2019 and into 2020. In addition, he will dive into the Dark Web, review recent case studies he and his team have worked and provide ideas on practical cost effective solutions to help you defend your data and protect your brand identity.
8:15 am - 5:00 pm2625 Thousand Oaks Blvd.Memphis, TN 38118901-362-6200