Data Connectors is proud to host the Cybersecurity Strategies Conference.
8:00 am - 5:00 pm2025 Rosa L. Parks BoulevardNashville, TN 37228615-259-4343
Check-In and Opening Introductions
Session Three10:15 am - 10:45 amMatt FarrSoutheast Sales Engineering Manager
Turtles, Trust, and the Future of Cybersecurity
Faith in our institutions is collapsing, and GDPR is at the door. What would cybersecurity look like if we started from scratch, right now, in our hybrid, interdependent world? It would focus relentlessly on data. Learn how a data-centric security approach can reduce risk, increase efficiency and re-engineer trust in a society where faith has been shaken by unstoppable breaches.
Download the Presentation
With over 15 years’ experience as a systems engineer, technical trainer, and team leader, Matthew Farr manages the southeast sales engineering team for Varonis Systems. Matt’s past experience includes training hundreds of IT professionals on various security software solutions and presenting at industry events across the nation. Matt will provide insight into the growing internal threat concern and how behavioral analytics can be invaluable in protecting organizations digital assets and reducing risk.
Session Six12:30 pm - 1:00 pmLiz LeonSecurity Engineer
Cyber Exposure – The Next Frontier
The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program. Join our session to learn how CISOs can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.
Liz Leon has been with Tenable for the four years, most recently serving as a solution engineer. Liz specializes in security implementations and solutions planning. Throughout her time in engineering, she has helped countless companies gain visibility over their cyber exposure using Tenable’s solutions.
Session Seven1:00 pm - 1:30 pmDon Byrne
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
Session Thirteen4:45 pm - 5:15 pmNir ShafrirVP Field Engineering & Customer Success
AV, EDR, NGAV…What’s Next in Endpoint Protection?
Antivirus has been around since the 1980s. How did it evolve in the past decade? What about hot machine learning-powered Next Generation Antivirus products promoted by well-funded startups? Or should we assume compromise and focus on the Endpoint Detection and Response (EDR) instead? What are the pros and cons of these approaches and where is endpoint security going next?
This interactive presentation will discuss the reasons behind the vulnerable state of endpoint security and include a demo of the infamous Rubber Ducky that remains practically unstoppable by today’s endpoint protection products.
You will leave the presentation with the following knowledge:
- Understand the current state of endpoint security and latest attacks
- Explore available endpoint protection tools, including Endpoint Detection and Response (EDR)
- Learn about benefits and shortcomings of modern endpoint protection tools and approaches
- See an advanced file-less attack in action
- Learn the latest best practices and solutions that promise to reduce threat surface and minimize breaches
Download the Presentation
Nir Shafrir leads field engineering and customer success for Nyotron. Shafrir has experience across endpoint and network security, starting from a small Israeli cybersecurity startup through larger companies like Trusteer (now an IBM company). He has deep understanding of both technical and business aspects of security focusing on the end to end customer value. Shafrir earned a bachelor’s degree in Computer Science from the Open University.