Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session One8:45 am - 9:15 am
Achieving “Always On” IT Resilience
It’s time to revolutionize your data protection strategy. Protecting and transforming your digital business for exceptional customer experiences requires an “always on” platform for disaster recovery, backup and cloud mobility. An IT Resilience Platform allows you to cost-effectively and swiftly manage both unplanned disruptions, including outages, ransomware attacks, and natural disasters, as well as planned events, such as moving to the cloud or data center consolidations.
Chris is a Systems Engineer at Zerto. Delivering IT Resilience and assisting our clients realize the true potential of multi-cloud and hybrid cloud architectures by providing the ability to migrate and protect application workloads to, from, or between on-premises, public, private, and managed clouds.
With 20 years as a customer-focused technology strategist and solutions provider, Chris combines an astute business perspective with outstanding practical, hands-on experience, to deliver exceptional results for our clients.
Session Two9:15 am - 9:45 am
Founded in 2002 and headquartered in Chicago, Nexum® takes a comprehensive approach to security. Nexum approaches business with one simple statement: “Do what’s right for the customer and success will follow.”
Nexum helps you mitigate risks, protect your data, increase business continuity and meet your unique business objectives by:
Detecting and preventing network threats, intrusions and disruptions
Equipping you with the information, tools, training and resources you need to effectively manage IT risk
Nexum, Latin for an arrangement by which one pledged one’s very liberty as security, Nexum is committed to ensuring your security. At Nexum, We Mean Security®.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
Cybercrime Tactics and Techniques Report
Research showed a significant uptick in threats aimed at businesses in Q1 2019 from the same time last year. Companies need to take control against these increases in cyberthreats by remediating at scale, quickly mitigating attack impacts through isolation, and proactively hunting for threats before they execute.
- Significant increases in overall threats, Emotet, ransomware, and its impact on your enterprise
- How Mac, mobile malware, and especially adware are on the rise
- User concern about the safety of their personal information, and how organizations are failing to protect their data
- What it takes to create a resilient enterprise
Krishnan Natarajan is Senior Director for Malwarebytes, based in Santa Clara California. He has experience with multiple areas of information security: web application security, user and entity behavior analytics, insider threat, data loss prevention, and endpoint security. Prior to Malwarebytes, Krishnan has held leadership roles at several S.F. Bay Area companies including Whitehat Security, Dtex Systems, and Hewlett-Packard.Krishnan is alsoactive in the security community as the manger in the 400,000 member Information Security Community on LinkedIn. He holds undergraduate and graduate degrees from M.I.T.
Session Four10:45 am - 11:15 am
A new approach to email security for Office 365
For hackers, Microsoft Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Romain Basset is a sales engineer at Vade Secure, where he helps SMB and enterprise organizations of all sizes keep their users from clicking on suspicious links or attachments.
He holds a Master’s Degree in Computer Engineering and has over 10 years of experience in IT security engineering and product management.
Lunch11:15 am - 11:45 am
Break / Vendor Booth Time / Lunch
Keynote Session11:45 am - 12:30 pm
Assistant Special Agent in Charge Chris Stoddard will be discussing the Electronic Crimes Task Force and the latest trends in cyber-crime.
Special Agent Stoddard began his career in the United States Secret Service in 1998, after serving as an officer in the United States Marine Corps. Special Agent Stoddard was initially assigned to the Richmond Field Office as a criminal investigator. Special Agent Stoddard began his cyber-crimes experience after graduating from Basic Computer Evidence Recovery Training, at the Federal Law Enforcement Training Center, Glynco, GA in May 2001. He served as the computer forensics laboratory supervisor in both the Chicago and Miami Electronic Crimes Task Forces. Special Agent Stoddard has actively participated in the U. S. Secret Service’s, Critical Systems Protection Program since its inception and participated in multiple National Special Security Events in this capacity. Following his assignment in Miami, he was reassigned to Criminal Investigative Division as the Program Manager/Section Supervisor for National Cyber-Forensics & Training Alliance, and the CERT Liaison Program, Carnegie Mellon University in Pittsburgh, PA. Special Agent Stoddard is currently assigned to the Pittsburgh Field Office, as the Assistant Special Agent in Charge, and supervisor for the Pittsburgh Financial Electronic Crimes Task Force.
Break12:30 pm - 1:00 pm
Break / Vendor Booth Time
Session Six1:00 pm - 1:30 pm
More than 30,000 customers worldwide—including nearly half the global Fortune 500—rely on RSA’s business-driven security™ strategy for cyber threat detection and response, identity and access management, online fraud prevention, and governance, risk and compliance solutions. Armed with the industry’s most powerful tools, enterprises can better focus on growth, innovation and transformation in today’s volatile business environment.
RSA is a part of the Dell Technologies family of brands. Dell Technologies is a unique family of businesses that provides the essential infrastructure for organizations to build their digital future, transform IT and protect their most important asset: information. The company services customers of all sizes across 180 countries – ranging from 98 percent of the Fortune 500 to individual consumers – with the industry’s most comprehensive and innovative portfolio from the edge to the core to the cloud.
Session Seven1:30 pm - 2:00 pm
About The Teneo Group
We believe that safeguarding your network and your data is the most important work.
The Teneo Group’s sole focus is IT security engineering. Without that critical security perspective, any project, big or small, can open an organization to at best more risk, and at worst catastrophic.
Teneo is uniquely qualified to support all areas of the information technology life cycle. We have the technical engineering skills needed to successfully complete the projects at hand and we always consider security first.
About Check Point
Check Point Software Technologies Ltd. is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyber attacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises – from networks to mobile devices – in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.
Break2:00 pm - 2:15 pm
Break / Vendor Booth Time
Session Eight2:15 pm - 2:45 pm
Morphisec is transforming endpoint security with our pioneering Moving Target Defense. Our solutions deliver operationally simple, proactive prevention unbound by the limits of detection and prediction. We protect businesses around the globe from the most dangerous and sophisticated cyberattacks immediately, efficiently and absolutely.
Session Nine2:45 pm - 3:15 pm
About Sherpa Software
Sherpa Software is the cost-effective solution for information security, data governance, GDPR/California Consumer Privacy Act (CCPA), and eDiscovery compliance. Our SaaS platform, Altitude IG, is the first step in cybersecurity: it is scalable, affordable data governance and eDiscovery software that provides complete transparency and visibility into your unstructured data, including on all local workstations.
Session Ten3:15 pm - 3:35 pm
Lightweight Deception. Heavyweight Results
• Cyber challenges to security
• Turning an attackers strength to a weakness
• Efficient and practical internal deception
• Using deception to turn the tides
• Our Mission
As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader. Frank also is co-inventor of a patent issued for selectively regulating network traffic. Francesco is an experienced network engineer and prior to PacketViper, held the Director of Information Security and Technology position at Liberty USA, Partner and Director of Libcom Internet Services ISP, Sr Network/Systems Engineer, Architect, and PM for nationally based technology businesses such as The Future Now, XLConnect, and MicroAge. Francesco holds a BS in Technical Management from Embry-Riddle University. Francesco is a decorated veteran that served twelve years in the US Army Assualt Helicopter Battalion at FT Drum, and Schoefield Barracks.
8:15 am - 4:45 pm910 Sheraton DriveMars, PA 16046724-776-6900