Data Connectors is proud to host the Cyber Security Strategies Conference.
Check-In and Opening Introductions8:15 am - 8:45 am
Session One8:45 am - 9:15 am
Definitively Solve Web Threats and Phish through Isolation
Eventually, all deterministic solutions for malware and phishing start to fail and can be bypassed. The state of the detection art is less effective tomorrow. Rather than relying on technology to determine what is good and what is bad, what if prevention technology assumed everything to be bad, to be potentially malicious? This is the foundation underlying “isolation”.
Come hear how isolation provides an “air gap” between the enterprise and the web, yet still allows browsing and communication. Make it safe to click again.
Session Two9:15 am - 9:45 am
Stop Unknown Threats: Deep Learning for Deeper Cybersecurity
With 75% of malware threats unique to a single organization, reactive endpoint security alone is not enough.
Join this webinar to learn how the predictive deep learning technology in Sophos Intercept X detects new and unseen malware, protecting you from never-seen-before attacks. We’ll cover:
- The latest malware trends and attack techniques
- Why traditional endpoint protection alone is not enough
- How Intercept X uses predictive deep learning to detect unseen malware
- What the experts are saying about Intercept X
We’ll also explore additional advanced protection capabilities in Intercept X, including anti-ransomware and anti-exploit technology, and why it’s the world’s most comprehensive endpoint protection.
Larry has over 20 years of IT security experience. He has worked extensively with public, private, educational, and military organizations. Larry joined Sophos in April of 2014.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
Are You Avoiding These Top 10 File Transfer Risks?
You know what good cybersecurity practices look like. Maybe you even set them up in your organization. Files are encrypted in transit, workstations and servers are protected with strong password policies, firewalls and blacklists secure the internal network from intruders, and employees are well versed in what a phishing attack looks like. Everything is going well … and then you’re hit with a critical data breach, and you’re not sure why. Hadn’t you covered all the bases?
It’s easy to miss certain exposures and vulnerabilities that endanger your files. The smallest gap in security can risk everything—and leave you with a mess. But fortunately, once you’ve identified the weak areas, they’re often simple to fix.
In this presentation, GoAnywhere Partner Manager Chris Wilson will explore the ten file transfer perils that organizations often run into, including:
- Giving away your user IDs and passwords via FTP transfers
- Exposing data to the DMZ (Demilitarized Zone)
- Not securing your system with the right permissions
Risks and insecurities are everywhere, and sometimes they’re hard to spot. Learn how to avoid common pitfalls, then discover how you can safeguard your data with a secure file transfer solution like GoAnywhere MFT.
Chris Wilson manages GoAnywhere partners in North America for HelpSystems. He has over 25 years of experience managing and developing business and technical integration partners. Chris conceived and enhanced numerous HelpSystems products in the application development, BI, and cybersecurity space and now works with ISVs, systems integrators, and MSPs to protect their customers’ sensitive data in transit via GoAnywhere.
Session Four10:45 am - 11:15 am
Why attackers love email and what you can do about it
Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Josh Ray is a Commercial Sales Representative with over 5 years of security experience, and 12 years in the IT Industry. Josh is responsible for growing the Mimecast user base in the Minnesota, Wisconsin, and Dakotas region by increasing Cyber Resilience in email. Previous to Mimecast Josh spent several years working at Trend Micro, where he was exposed to security products across many different corporate layers. He also worked with IBM, Keynote Systems, and Triton Digital Media where he was exposed to many different types of IT organizations and types of software development.
Josh graduated from Texas Tech University with a Bachelors in Communication Studies, Masters in Communication Studies, and an MBA. His Master’s thesis focused on online communication channels and social norms. Josh currently volunteers as the membership chair at The Conservancy on Oak Lawn Park in Dallas as well as with the Texas Tech Alumni Association of Dallas.
Break11:15 am - 11:30 amBreak / Vendor Booth Time
Keynote Session / Seated Lunch11:30 am - 12:15 pm
Special Agent Jamie ButcherFBI
Join SA Jamie Butcher in her discussion regarding National Cybersecurity.
Break12:15 pm - 12:30 pm
Break / Vendor Booth Time
Session Five12:30 pm - 1:00 pm
Cyber Exposure – The Next Frontier
The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program. Join us for a discussion on how companies can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.
Session Six1:00 pm - 1:30 pm
Autonomous Cyber Defense: AI and the Immune System Approach
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network – before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
Break1:30 pm - 1:45 pm
Break / Vendor Booth Time
Session Seven1:45 pm - 2:15 pm
An Overview of WLAN Security
As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.
So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:
- The 5 tenets of WLAN security
- Choosing the proper authentication and encryption model that doesn’t force user workarounds
- Utilizing Private PSK technology
- Device and user access control
- Future challenges for Wi-Fi security and WPA3
Session Eight2:15 am - 2:45 pm
About Trend Micro
250+ million endpoints. 500,000+ companies worldwide. One security software company.
For nearly 30 years, Trend Micro’s unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats.
The depth of our experience remains unmatched. From the endpoint to the network to the cloud, we’ve got you covered with a connected threat defense recognized by analysts, customers, and industry gurus of all kinds.
Break2:45 pm - 3:00 pm
Break / Vendor Booth Time
Session Nine3:00 pm - 3:30 pm
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
Session Ten3:30 pm - 4:00 pm
Instilling a security-first mindset that permeates across everything that you do within your organization is vitally important in today’s world. Delve into some fundamental techniques that can be employed to make security the norm rather than the exception.
Session Eleven4:00 pm - 4:30 pm
Delivering Integrated Cyber Defense in the Cloud Generation
Hackers are finding new ways to steal data and infiltrate organizations daily. Integrated Cyber Defense helps you improve security, reduce complexity, and lower cost. Robert Arandjelovic, Director of Product Marketing at Symantec, will discuss the inherent challenges affecting integrated cyber defense in the cloud generation including pressures of multiple environments, budget, traffic visibility, and cloud architecture.
Key takeaway– Understand the blueprint for unifying cloud and on-premises security to provide advanced threat protection and information protection across all endpoints, networks, email, and cloud applications.
Robert Arandjelovic is Symantec’s Americas Director of Product Marketing, responsible for aligning the company’s endpoint, network, messaging and cloud security solutions with the evolving business climate and threat landscape. Previously, Robert served as Symantec’s EMEA Director of Product Marketing since 2014. With over 18 years of experience in the industry, Robert has been a first-hand witness to the evolution of networking and cyber security technologies, as well as their rising strategic importance to businesses.
Session Twelve4:30 pm - 5:00 pm
Protecting Your Data: What You Need to Know about Cloud Security and the Dark Web
Effectively leveraging the cloud is not just about migrating data and applications. Security must travel into the cloud as well. When organizations fail to understand that security in the cloud is a shared responsibility, the consequences can be disastrous (and profitable for threat actors!). In this session, Armor will demonstrate the vulnerability of your unprotected data in the cloud via a real-world experiment using “honeypots” disguised as a healthcare web portal. You will learn:
- The most likely attacks your organization will face
- How active and dynamic security controls can mitigate risk
- Simple steps you can take to prevent a breach
- Why your data is so valuable on the Dark Web (findings from Armor’s Black Market Report)
Thomas Scott serves as a Solutions Consultant at Armor. He is responsible for working with customers globally to build world-class server security and compliance for cloud, on-premise, and hybrid ecosystems. He previously worked as the Cybersecurity Operations Team Lead for Mary Kay where he was responsible for all aspects of monitoring and alerting in both on-premise and cloud environments. He graduated Cum Laude from Texas A&M University attaining his BBA in Management Information Systems.8:00 am - 5:00 pm333 West Kilbourn AvenueMilwaukee, WI 53203414-276-1234