Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session Two9:15 am - 9:45 am
Unleash the Power of Your YubiKey
Bassam Al-Khalidi, Co-CEO and Principal Consultant – Founder at Axiad IDS, will discuss some of the challenges enterprises face while deploying YubiKeys or other hardware tokens to protect their accounts, networks, and applications from credential theft and data breach. Organizations are increasingly looking for a solution that streamlines the deployment and management of devices without compromising security and employee agility.
Bassam will illustrate the challenges, using a real-life example, of a large manufacturer of control systems that recently deployed YubiKeys to improve their overall security posture and comply with NIST SP800-171 mandate.
To receive a copy of this presentation, please contact Axiad IDS – email@example.com
Bassam has over 15 years of experience in designing and deploying Identity and Access Management solutions across large government, enterprise and healthcare organizations. Bassam is a leading expert in CAC/PIV SmartCard and PKI deployment and has been involved in multiple enterprise-class ID badge deployments over the last several years. He has held a variety of management and senior technical roles for established industry leaders, including ActivIdentity.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
Time is Up: Rethink DLP
Legacy DLP has failed all of us in security! The promise of Data Loss Prevention has turned into an endless cycle of policy management, user blocking and blind spots–all while missing the key to the plot: protecting the *user’s* data. Join this session to hear why legacy DLP has pitfalls, interesting data around insider threat and leakage and how and why you should be thinking about protecting your users over preventing them from doing their work.
To receive a copy of this presentation, please contact Chelsea Contessa – firstname.lastname@example.org
Abhik Mitra is a product marketing manager at Code42. With more than 10 years of experience in Enterprise Technology, Abhik is the strategic conduit between the customer and Product Management, Sales, and Marketing teams at Code42. Prior to Code42, he served as a global product manager for companies including Xiotech, Kroll Ontrack, and Imation.
Session Four10:45 am - 11:30 am
Cybersecurity in the age of transformation.
Silver bullet solutions lure all organizations with quick fixes but address a fraction of the requirements, leaving organizations vulnerable to cyber breaches as they navigate digital transformations. The bad guys are counting on organizations building ecosystems that are siloed and not centrally monitored. Whether moving workloads to the cloud, building mobile applications or another initiative, all organizations need to drive a holistic approach to security. It’s critical to build a foundation focused on security and risk mitigation. Breaches are on the rise and featured almost daily in the news. How can organizations like yours leverage the opportunity to transform and improve the overall security posture? During this session, we’ll talk about ways to build a critical path that will maintain security throughout your transformation, and beyond.
To receive a copy of this presentation, please contact Carrie Hachtel – email@example.com
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Session Five12:00 pm - 12:30 pm
The Human Deception Problem: Understanding and Defending Against Social Engineering Attacks
The most successful method of cyber-attacks continues to be phishing. These attacks cost organizations millions of dollars each year and things are just getting worse. As these attacks intensify and become more refined, technology is failing to keep up and your users will continue to fall prey. To effectively defend yourself against this, you have to understand how the attacks work, including the psychological triggers and tricks the attackers are using. This session will explore the different levers that social engineers and scam artists pull to make your users more likely to do their bidding.
Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, as he provides fun and engaging examples of mental manipulation in everyday life: from the tactics used by common criminals, to sophisticated social engineering and online scams. Additionally, he’ll look at how you can ethically use the very same levers when educating your users.
- The Perception vs. Reality Dilemma
- Understanding the OODA (Observe, Orient, Decide, Act) Loop
- How social engineers and scam artists achieve their goals by subverting critical thinking steps
- How you can defend your organization and create your human firewall
To receive a copy of this presentation, please contact Courtney Lewis – firstname.lastname@example.org
Erich Kron, Security Awareness Advocate at KnowBe4, is a veteran information security professional with over 20 years’ experience in the medical, aerospace manufacturing and defense fields. He is the former security manager for the US Army’s 2nd Regional Cyber Center-Western Hemisphere and holds CISSP, CISSP-ISSAP, MCITP and ITIL v3 certifications, among others. Erich has worked with information security professionals around the world to provide the tools, training and educational opportunities to succeed in Information Security.
Break12:30 pm - 1:00 pm
Break / Vendor Booth Time
Session Six1:00 pm - 1:30 pm
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions. Over 5,150 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio trust Okta to securely connect their people and technology.
Session Seven1:30 pm - 2:00 pm
Serving in Silence: The Latest in Attacker Techniques and Defensive Mitigations
Are you interested in the techniques used by real-world attackers to covertly gain access to target networks? Do you find it challenging or near impossible to filter out the noise in the cybersecurity industry to identify the defensive controls or configurations that actually work? This presentation will discuss the latest in real-world offensive techniques, and corresponding defensive mitigations based on the results from attacking hundreds of different environments with a variety of products and countless configurations. Learn about the latest in initial access techniques, cloud infrastructure attacks, and covert C2 comms.
To receive a copy of this presentation, please contact Lillee Bloxham – email@example.com
Kaden Pieksma is the Director of Operations at Silent Break Security where he has worked for 3+ years. His current responsibilities include physical penetration tests, social engineering, sales, and management. Coming from a background in business management and sales, Kaden merges business strategy with his passion for information technology and security.
Break2:00 pm - 2:15 pm
Break / Vendor Booth Time
Session Eight2:15 pm - 2:45 pm
Cybercrime Tactics and Techniques Report
The Malwarebytes Labs research team showed a significant uptick in threats aimed at businesses in Q1 2019 from the same time last year. Companies need to take control against these increases in cyberthreats by remediating at scale, quickly mitigating attack impacts through isolation, and proactively hunting for threats before they execute.
- Significant increases in overall threats, Emotet, ransomware, and its impact on your enterprise
- How Mac, mobile malware, and especially adware are on the rise
- User concern about the safety of their personal information, and how organizations are failing to protect their data
- What it takes to create a resilient enterprise
With over 20 years of experience in the high-tech industry, Adam Gates serves as a senior technical member of Malwarebytes Field Sales Team providing support for customers in North America. Prior to Malwarebytes, Adam has held various senior system engineering positions and consulting roles at Dell, Microsoft, IBM, Atos, and Mimecast. Adam lives in Dallas, TX with his teenage son and a 9 month old golden retriever that thinks he is a squirrel.
Break2:45 pm - 3:00 pm
Break / Vendor Booth Time
CISO PANEL4:00 pm - 5:00 pm
8:30 am - 5:00 pm1300 Nicollet MallMinneapolis, MN 55403612 370 1234