• Home
  • Attend
  • Sponsor
  • Call for Speakers
  • Our Partners
  • News
  • Subscribe
Data Connectors Logo
  • Home
  • Attend
  • Sponsor
  • Call for Speakers
  • Our Partners
  • News
  • Subscribe
  • Milwaukee 10/25/18 – Cybersecurity
    October 25, 2018

    • Register Now
    Hyatt Regency Milwaukee
    8:00 am - 5:00 pm
    333 West Kilbourn Avenue
    Milwaukee, WI 53203
    414-276-1234

    Check-In and Opening Introductions

    8:15 am - 8:45 am

    Data Connectors is proud to host the Cyber Security Strategies Conference.

    Session One

    8:45 am - 9:15 am
    Lennart Van Den Ende
    VP Sales Engineering

    Definitively Solve Web Threats and Phish through Isolation

    Eventually, all deterministic solutions for malware and phishing start to fail and can be bypassed. The state of the detection art is less effective tomorrow. Rather than relying on technology to determine what is good and what is bad, what if prevention technology assumed everything to be bad, to be potentially malicious? This is the foundation underlying “isolation”.

    Come hear how isolation provides an “air gap” between the enterprise and the web, yet still allows browsing and communication. Make it safe to click again.

    Session Two

    9:15 am - 9:45 am
    Larry Herzog Jr.
    Senior Channel Sales Engineer

    Stop Unknown Threats: Deep Learning for Deeper Cybersecurity

    With 75% of malware threats unique to a single organization, reactive endpoint security alone is not enough.

    Join this webinar to learn how the predictive deep learning technology in Sophos Intercept X detects new and unseen malware, protecting you from never-seen-before attacks. We’ll cover:

    • The latest malware trends and attack techniques
    • Why traditional endpoint protection alone is not enough
    • How Intercept X uses predictive deep learning to detect unseen malware
    • What the experts are saying about Intercept X

    We’ll also explore additional advanced protection capabilities in Intercept X, including anti-ransomware and anti-exploit technology, and why it’s the world’s most comprehensive endpoint protection.

    Speaker’s Bio:

    Larry has over 20 years of IT security experience. He has worked extensively with public, private, educational, and military organizations. Larry joined Sophos in April of 2014.

    Break

    9:45 am - 10:15 am

    Break / Vendor Booth Time

    Session Three

    10:15 am - 10:45 am
    Chris Wilson

    Are You Avoiding These Top 10 File Transfer Risks?

    You know what good cybersecurity practices look like. Maybe you even set them up in your organization. Files are encrypted in transit, workstations and servers are protected with strong password policies, firewalls and blacklists secure the internal network from intruders, and employees are well versed in what a phishing attack looks like. Everything is going well … and then you’re hit with a critical data breach, and you’re not sure why. Hadn’t you covered all the bases?

    It’s easy to miss certain exposures and vulnerabilities that endanger your files. The smallest gap in security can risk everything—and leave you with a mess. But fortunately, once you’ve identified the weak areas, they’re often simple to fix.

    In this presentation, GoAnywhere Partner Manager Chris Wilson will explore the ten file transfer perils that organizations often run into, including:

    • Giving away your user IDs and passwords via FTP transfers
    • Exposing data to the DMZ (Demilitarized Zone)
    • Not securing your system with the right permissions

    Risks and insecurities are everywhere, and sometimes they’re hard to spot. Learn how to avoid common pitfalls, then discover how you can safeguard your data with a secure file transfer solution like GoAnywhere MFT.

    Speaker’s Bio:

    Chris Wilson manages GoAnywhere partners in North America for HelpSystems. He has over 25 years of experience managing and developing business and technical integration partners. Chris conceived and enhanced numerous HelpSystems products in the application development, BI, and cybersecurity space and now works with ISVs, systems integrators, and MSPs to protect their customers’ sensitive data in transit via GoAnywhere.

    Session Four

    10:45 am - 11:15 am
    Josh Ray
    Account Executive

    Why attackers love email and what you can do about it

    Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?

    In this session, you’ll learn:

    • How your email can be used as an entry point for multiple types of attack
    • The damaging impact attacks have on organizations
    • Why your employees could be the weakest link in your email security
    • How to enhance your email security and thus your overall cyber resilience

    Speaker’s Bio:

    Josh Ray is a Commercial Sales Representative with over 5 years of security experience, and 12 years in the IT Industry. Josh is responsible for growing the Mimecast user base in the Minnesota, Wisconsin, and Dakotas region by increasing Cyber Resilience in email. Previous to Mimecast Josh spent several years working at Trend Micro, where he was exposed to security products across many different corporate layers. He also worked with IBM, Keynote Systems, and Triton Digital Media where he was exposed to many different types of IT organizations and types of software development.

    Josh graduated from Texas Tech University with a Bachelors in Communication Studies, Masters in Communication Studies, and an MBA. His Master’s thesis focused on online communication channels and social norms. Josh currently volunteers as the membership chair at The Conservancy on Oak Lawn Park in Dallas as well as with the Texas Tech Alumni Association of Dallas.

    Break

    11:15 am - 11:30 am
    Break / Vendor Booth Time

    Keynote Session / Seated Lunch

    11:30 am - 12:15 pm
    Special Agent Jamie Butcher
    FBI

    Join SA Jamie Butcher in her discussion regarding National Cybersecurity.

    Break

    12:15 pm - 12:30 pm

    Break / Vendor Booth Time

    Session Five

    12:30 pm - 1:00 pm
    Alex Crepas
    Security Engineer

    Cyber Exposure – The Next Frontier

    The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program. Join us for a discussion on how companies can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.

    Session Six

    1:00 pm - 1:30 pm
    David Coleman
    Senior Product Evangelist

    Autonomous Cyber Defense: AI and the Immune System Approach

    From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network – before they turn into a full-blown crisis.

    Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.

    Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.

    Break

    1:30 pm - 1:45 pm

    Break / Vendor Booth Time

    Session Seven

    1:45 pm - 2:15 pm
    David Coleman
    Senior Product Evangelist

    An Overview of WLAN Security

    As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.

    So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:

    • The 5 tenets of WLAN security
    • Choosing the proper authentication and encryption model that doesn’t force user workarounds
    • Utilizing Private PSK technology
    • Device and user access control
    • Future challenges for Wi-Fi security and WPA3

    Download the Presentation

    Session Eight

    2:15 am - 2:45 pm
    Sergio Avila
    Sales Engineer

    About Trend Micro

    250+ million endpoints. 500,000+ companies worldwide. One security software company.

    For nearly 30 years, Trend Micro’s unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats.

    The depth of our experience remains unmatched. From the endpoint to the network to the cloud, we’ve got you covered with a connected threat defense recognized by analysts, customers, and industry gurus of all kinds.

    Break

    2:45 pm - 3:00 pm

    Break / Vendor Booth Time

    Session Nine

    3:00 pm - 3:30 pm
    Steve Shelton

    How They Bypass Office 365 Security

    The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.

    During this session, we’ll demonstrate how to protect Office 365 from:

    • Email-based phishing, spoofing, and malware
    • Account takeover, insider threats, compromised Microsoft credentials
    • Loss of sensitive data from OneDrive, SharePoint and Office 365

    Session Ten

    3:30 pm - 4:00 pm
    Laurence Young
    Solutions Architect

    Security-centric Culture

    Instilling a security-first mindset that permeates across everything that you do within your organization is vitally important in today’s world. Delve into some fundamental techniques that can be employed to make security the norm rather than the exception.

    Session Eleven

    4:00 pm - 4:30 pm
    Robert Arandjelovic
    Director of Product Marketing

    Delivering Integrated Cyber Defense in the Cloud Generation

    Hackers are finding new ways to steal data and infiltrate organizations daily. Integrated Cyber Defense helps you improve security, reduce complexity, and lower cost. Robert Arandjelovic, Director of Product Marketing at Symantec, will discuss the inherent challenges affecting integrated cyber defense in the cloud generation including pressures of multiple environments, budget, traffic visibility, and cloud architecture.

    Key takeaway– Understand the blueprint for unifying cloud and on-premises security to provide advanced threat protection and information protection across all endpoints, networks, email, and cloud applications.

    Speaker’s Bio:

    Robert Arandjelovic is Symantec’s Americas Director of Product Marketing, responsible for aligning the company’s endpoint, network, messaging and cloud security solutions with the evolving business climate and threat landscape. Previously, Robert served as Symantec’s EMEA Director of Product Marketing since 2014. With over 18 years of experience in the industry, Robert has been a first-hand witness to the evolution of networking and cyber security technologies, as well as their rising strategic importance to businesses.

    Session Twelve

    4:30 pm - 5:00 pm
    Thomas Scott
    Solutions Consultant

    Protecting Your Data: What You Need to Know about Cloud Security and the Dark Web

    Effectively leveraging the cloud is not just about migrating data and applications. Security must travel into the cloud as well. When organizations fail to understand that security in the cloud is a shared responsibility, the consequences can be disastrous (and profitable for threat actors!). In this session, Armor will demonstrate the vulnerability of your unprotected data in the cloud via a real-world experiment using “honeypots” disguised as a healthcare web portal. You will learn:

    • The most likely attacks your organization will face
    • How active and dynamic security controls can mitigate risk
    • Simple steps you can take to prevent a breach
    • Why your data is so valuable on the Dark Web (findings from Armor’s Black Market Report)

    Speaker’s Bio:

    Thomas Scott serves as a Solutions Consultant at Armor. He is responsible for working with customers globally to build world-class server security and compliance for cloud, on-premise, and hybrid ecosystems. He previously worked as the Cybersecurity Operations Team Lead for Mary Kay where he was responsible for all aspects of monitoring and alerting in both on-premise and cloud environments. He graduated Cum Laude from Texas A&M University attaining his BBA in Management Information Systems.

  • Event Sponsors

    • Aerohive_Logo-e1498753202276
    • ArcticWolf-logo-rgb-e1496709698912
    • Area-1-e1533046341846
    • Armor-Defense-e1536941961842
    • Array
    • Avanan-1-e1531863424334
    • AxCel-e1498768508898
    • barkly-logo-rgb-e1500501140509
    • Circadence-e1533914602524
    • CSPi-e1529940446872
    • Cyberbit-e1518197411542
    • Cybereason
    • darktrace-logo-update-e1500326482975
    • DigiCorp-e1537538475111
    • Duo-e1532031393962
    • Entrust-Datacard-e1527184131321
    • ESET-logo-Compact-Colour-Dark-Turq-tag-RGB-e1517589386862
    • Gigamon-updated-logo-Orange-Box-Logo
    • HelpSystems-e1512662344630
    • IEEE-Milwaukee-Section
    • LogRhythm-updated-Logo-Web-e1492788834897
    • Menlo-Security-logo-menlo-security_2C_wtag_RGB-e1507752536987
    • Mimecast-logo-colored-no-UEM-e1493164102952
    • nexum1
    • Optiv-e1528126130994
    • Pluralsight-e1520269539884
    • rsa
    • secudrive
    • Sophos12
    • Symantec
    • TenableLogo-updated-4-17_FullColor_RGB-e1492788853166
    • Trend-Micro-e1513203712700
    • TrustArc-e1535989299259
    Become a sponsor
Contact Us
Privacy Policy
Media Kit
500 Chesterfield Center, Suite 320
Chesterfield MO 63017
636-778-9495
info@dataconnectors.com
Data Connectors Logo
Data Connectors - 2018