Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Session One9:00 am - 9:30 am
Win Big with IT Resilience
In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you to manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.
Session Two9:30 am - 10:00 am
Visibility, Controls, Exposure, and Cloud Specific Threats
Our goal is to help you understand risk for Start-Ups Vs. Established Organizations and how both can confidently move to the cloud. Reluctance typically stems from uncertainty around visibility, controls, exposure, and cloud specific threats. Understanding how to tackle these four topics will help alleviate that uncertainty and give your clients the assurance they need to make the leap into “The Cloud”.
For a copy of this presentation, please contact Scott Avvento – firstname.lastname@example.org
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
For a copy of this presentation, please contact Michael Castricone – email@example.com
Session Four11:00 am - 11:30 am
A new approach to email security for Office 365
For hackers, Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
For a copy of this presentation, please contact Lynne Leonardi – Lynne.Leonardi@vadesecure.com
Romain Basset is a sales engineer at Vade Secure, where he helps SMB and enterprise organizations of all sizes keep their users from clicking on suspicious links or attachments.
He holds a Master’s Degree in Computer Engineering and has over 10 years of experience in IT security engineering and product management.
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Keynote Session12:00 pm - 1:00 pm
FBI Special Agent Cerena Coughlin is the Employment Recruiter for the Philadelphia Field Office and local Coordinator for InfraGard, a public/private partnership between the FBI and representatives of critical infrastructure. She was a member of the Los Angeles Innocent Images SAFE Team where she participated in investigations of child exploitation, and was assigned to Counterterrorism squads in LA and Baltimore, and Cyber in Philadelphia. She joined the FBI in March, 2001. SA Coughlin will be addressing the need for cyber subject matter expertise in FBI hiring and public sector partnerships.
Break1:00 pm - 1:30 pm
Break / Vendor Booth Time
Session Six1:30 pm - 2:00 pm
What you need to know: The intersection of cybersecurity and backup
In this interactive session, we will go over several recent case studies related to cyber intrusion and their root causes with the goal of learning from the mistakes and missteps taken by others. We will also discuss the benefits and need for simplification as well as how to prioritize and segregate data and applications to ensure appropriate strategies for security and recovery in the event of a breach.
For a copy of this presentation, please contact Whitney McCarty – firstname.lastname@example.org
Break2:00 pm - 2:30 pm
Break / Vendor Booth Time
Session Seven2:30 pm - 3:00 pm
Learn why enterprises are switching from VPN to Software-Defined Perimeter (SDP):
This session examines Software Defined Perimeter solutions as a compelling alternative to traditional VPNs. VPNs weren’t designed for the post-perimeter world – they expose a large attack surface and get complicated to manage at cloud scale. The next generation of secure remote access, SDPs offer zero-trust security, simple, cloud-delivered management, and a seamless user experience.
Session Eight3:00 pm - 3:20 pm
Protecting Your Digital Supply Chain
The Zero Trust Imperative of Third-Party Risk
It’s been estimated that more than 60% of the most severe breaches in recent years were a result of compromised third party suppliers, customers, and partners. The overwhelming need to share critical business information across the extended enterprise combined with a complete lack of control over third party security creates a fragmented and exponentially expanding threat surface that permeates the digital supply chain of every industry. In 2019, there is no such thing as a trusted third party. How do you protect your business, when you don’t know who you can trust?
For a copy of this presentation, please contact Kelly Colby – email@example.com
Mr. York joined Accellion in 2018 with 20 years of experience in cloud marketing, sales and product management. A seasoned executive and entrepreneur, Mr. York’s successes span growing startups to enterprise market leaders, such as Navis and SPSS. As CMO of Meltwater, he led worldwide product management, digital marketing, field marketing, and public relations. He spearheaded growth at Xignite as VP Sales and Marketing to lead the company from A to B round. Prior to Accellion, he founded Markodojo, an innovative marketing management SaaS.
Mr. York is also a thought leader in the cloud community, advisor, board member, speaker and author of the popular cloud blog Chaotic Flow.
Mr. York holds a BS in Physics from Caltech, an MS from Cornell, and an MBA from the University of Chicago.
CISO Panel3:30 pm - 4:30 pm
Secrets of Superstar CISO Success
CISOs aren’t born, they’re made. And tested. Constantly. With obligations like protecting employees and digital assets from data breaches, and demonstrating compliance with a daunting number of internal policies and industry regulations, CISOs have a lot on their plate. So, what’s the secret to CISO success? Similarly, what differentiates a strategic CISO from a tactical CISO?
This panel, “Secrets of Superstar CISO Success,” will seek to answer these questions with perspectives on:
- How to prepare today for the threats of tomorrow
- Charting a security strategy that protects and supports the business
- How to earn a seat at the executive table
- What you know now that you wish you knew then
We hope you’ll join us for this informative and enlightening panel.
8:30 am - 5:00 pm4200 City AvenuePhiladelphia PA 19131215-879-4000