Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session One8:45 am - 9:15 am
State of the Art Security Event Analysis
In this talk, we’ll discuss how new approaches and technology advances allow Security Operations teams of all sizes to finally have the capacity of Fortune 100 Companies. Your small team can analyze billions of incoming security events daily using state-of-the-art techniques such as AI, ML, Expert Systems, and probabilistic math. We’ll also discuss the pros and cons of each of these approaches.
Raj is currently part of the Respond team focused on helping organizations with automation of Security Operations. Prior to Respond, Raj held Field, Product management and Development roles at Fortify Software, WorkSoft, Rational Software, and Pure Software focusing on SDLC and security.
Session Two9:15 am - 9:45 am
We help organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products.
We help customers protect their businesses and meet compliance needs. And all our customers benefit from the expertise of our threat analysts located around the world. Their research is at the heart of everything we do. They quickly find the latest threats and update protection for our customers automatically. Plus, our support engineers are experts on all our products, and they’re available whenever you need them.
We make our products easy to install and use so you spend less time managing security. With Sophos you can focus on the needs of your business because we’re securing your entire organization.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions.
Over 5,150 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio trust Okta to securely connect their people and technology.
Session Four10:45 pm - 11:15 pm
Serving in Silence: The Latest in Attacker Techniques and Defensive Mitigations
Are you interested in the techniques used by real-world attackers to covertly gain access to target networks? Do you find it challenging or near impossible to filter out the noise in the cybersecurity industry to identify the defensive controls or configurations that actually work? This presentation will discuss the latest in real-world offensive techniques, and corresponding defensive mitigations based on the results from attacking hundreds of different environments with a variety of products and countless configurations. Learn about the latest in initial access techniques, cloud infrastructure attacks, and covert C2 comms.
Brady Bloxham is founder at Silent Break Security. His passion and drive have always been providing world-class security testing services and helping organizations defend against real-world threats. Previously, Brady worked for the NSA and DoD where he performed covert cyberoperations. Brady has started 2 other successful companies, one of which (PhishThreat), was acquired by Sophos in 2016.
Lunch11:15 am - 11:45 am
Break / Vendor Booth Time / Lunch
Keynote Session11:45 am - 12:30 pm
Mike Lettman is a recognized technology leader with over 30 years of experience in government information, security and technology. As the State Chief Information Security Officer (CISO), he provides strategic direction for information security to over 130 public agencies. With a focus on statewide enterprise and standardization efforts, Mike leads the Security, Privacy and Risk team for the Arizona Strategic Enterprise Technology (ASET) Office. With alignment to the State’s Strategic IT Plan, he ensures and enhances the State of Arizona’s security and safety.
Currently Mike is also the acting Chief Information Officer (CIO). Mike has stepped in to continue the incredible transformation and change that was started three years ago.
Mike’s responsibilities include identifying, developing, implementing and maintaining processes across the State to reduce IT risks. He is responsible for incident response, establishing appropriate standards and controls, and directing the establishment and implementation of policies and procedures. Mike is also instrumental in building relationships with a variety of partners including the MS-ISAC, Department of Homeland Security, and the FBI.
Prior to his work for the State of Arizona, Mike served as the Chief Information Security Officer (CISO) for the State of Wisconsin and previously as the Chief Technical Officer for the State of Wisconsin’s Department of Justice. In addition, he was the State of Wisconsin’s advocate for security awareness representing a variety of industry committees including Wisconsin’s Cyber Terrorism task force.
Mike holds a Bachelor of Science in Management and Computer Science from the University of Wisconsin and remains an active member of the Arizona Fusion Center and the co-chair of the Multi State Information Sharing and Analysis Center (MS-ISAC) SCADA work group.
Break12:30 pm - 1:00 pm
Break / Vendor Booth Time
Session Six1:00 pm - 1:30 pm
Stay ahead of the data privacy regulation landslide with good security practices
Data privacy is the new “black”… But unlike GDPR in the European Union, US citizens’ data is trending to be governed by various individual state legislation, which is going to become a real challenge for any company that may have/collect personal identifiable information (PII)… and by the way, the definition of PII is growing. This session will cover how you can get ahead of it now through foundational security controls.
Katie McCullough provides direct leadership over Information Security, Governance, Risk and Compliance (GRC). She is responsible for overseeing and driving strategic IT security planning and compliance efforts so the company can deliver custom IT solutions to customers.
As the CISO, Katie is accountable for ensuring OneNeck services are built and managed according to the foundational security principles of Confidentiality, Integrity and Availability (CIA). To achieve the CIA triad, she works closely with the OneNeck teams accountable for adhering and improving professional IT services based on key industry best practice frameworks such as ISO, ITIL and the National Institute of Standards and Technology (NIST) Cybersecurity Framework. In addition, she oversees the employees who work to minimize, identify and address information security risks. Under Katie’s guidance, these teams maintain a compliance and certification portfolio that is relevant to customers including: EU–U.S. Privacy Shield Framework, General Data Protection Regulation (GDPR), SSAE 18 examinations, PCI Data Security Standard validation, and HIPAA and HITECH examinations.
Prior to joining OneNeck in September 2011, Katie spent 13 years in various technical and management roles within a prominent managed IT security services provider in the Midwest.
Katie holds a Bachelor of Science in Computer Science from Southern Illinois University at Carbondale.
Session Seven1:30 pm - 2:00 pm
About Attivo Networks
Attivo Networks® is the leader in deception for cyber security defense. Founded in 2011, Attivo Networks provides a comprehensive deception platform that in real-time detects inside-the-network intrusions in networks, public and private data centers, and specialized environments such as Industrial Control System (ICS) SCADA, Internet of Things (IoT), and Point of Sale (POS) environments.
Founded on the premise that even the best security systems cannot prevent all attacks, Attivo provides the required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Unlike prevention systems, Attivo assumes the attacker is inside the network and uses high-interaction decoys and endpoint, server, and application deception lures placed ubiquitously across the network to deceive threat actors into revealing themselves.
Break2:00 pm - 2:15 pm
Break / Vendor Booth Time
Session Eight2:15 pm - 2:45 pm
The Vera Platform gives developers the power to build advanced data security and control into any business application, extending protections beyond the borders of an organization. Leverage our SDK and REST APIs to encrypt, track, and revoke access to files, and give your security team complete visibility over how confidential information is used, and the tools to manage access anywhere it travels.
Break2:45 pm - 3:00 pm
Break / Vendor Booth Time
Session Nine3:00 pm - 3:30 pm
Cybercrime Tactics and Techniques Report
A significant uptick in threats aimed at businesses were reported in Q1 2019 from the same time last year. Companies need to take control against these increases in cyberthreats by remediating at scale, quickly mitigating attack impacts through isolation, and proactively hunting for threats before they execute.
- Significant increases in overall threats, Emotet, ransomware, and its impact on your enterprise
- How Mac, mobile malware, and especially adware are on the rise
- User concern about the safety of their personal information, and how organizations are failing to protect their data
- What it takes to create a resilient enterprise
In the last 25 years, Aaron has held senior sales, engineering, technical marketing, and management positions with leading networking / security companies such as Network Associates, Sniffer, NetOptics, VSS Monitoring, Juniper Networks and Malwarebytes. Notable technological accomplishments included deploying the first 10GB network analyzers in history, as well as Alpha/Beta testing the first McAfee EPO and Infinistream (Netscout) products at Sandia National Laboratory in NM. Plus work with UK’s Foreign Office, GCHQ and other Intel groups. Aaron has always been involved in charity, creating EMSPTSD.org and GoodDeedExchange.org, plus coordinating the 25th Reunion of the Loma Prieta Earthquake Response Team in 2014 & 30th reunion on October 17, 2019 (1989earthquake.org). He spends his free time with Danish wife Konni Jensen Janssen, an author & award winning gallery artist and their new son, Hunter. He enjoys international friends, piloting helicopters, aerospace and following his father’s NASA deep space missions.
Session Ten3:30 pm - 4:00 pm
About Vade Secure
Vade Secure has developed a full set of security features against the most sophisticated email scams such as phishing and spear phishing, malware and ransomware. As a Global company, protecting more than 500 million mailboxes worldwide, we have an accurate vision on worldwide email flow. This allows us to provide the comprehensive solution against all email threats, ensuring a zero-day protection, even on targeted attacks. Our solutions are tailored to deal with a large amount of emails to help ISPs, OEMs, hosting companies and Enterprises.
CISO PANEL4:00 pm - 5:00 pm
8:15 am - 5:00 pm6333 North Scottsdale RoadScottsdale, AZ 85250(480) 948-7750