Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session One8:45 am - 9:15 am
The Importance of Incident Response
Information Technology organizations spend most of their limited security resources defending themselves from security incidents. The disproportionate investment of resources typically results in a failure to adequately prepare for a response to the inevitable… that incident which was not anticipated and could not be avoided. This lack of preparation limits the organization’s ability for an effective reaction, amplifying the impact of the attack.
“IT Security and Incident Response” will help the audience understand that investment into a well designed and tested Incident Response Plan is just as important as that investment in the initial defense. Informed by recent real-world Incident Response efforts, the presenters will also share the elements critical to an operative Incident Response Plan and provide novel suggestions to ensure it is effective.
Greg has 18 years’ experience as an IT Director for organizations in compliant environments including healthcare, medical device, and pharmaceuticals. He has an undergraduate degree in Computer Information Systems from Indiana University and an MBA from UNC-Wilmington. Greg is an ISACA Certified Information Systems Auditor. In 2013, Greg created the Carolinas IT Security, Audit and Compliance team which is focused on reducing cyber security and compliance risk for over 300 customers in North Carolina and across the U.S. The Carolinas IT Security, Audit and Compliance team focuses on framework-based assessments (NIST, HIPAA, ISO), Internal Audit as a Service (IAaaS), Penetration Testing and Virtual Security Service offerings.
Session Two9:15 am - 9:45 am
What is Robotic Decision Automation and Why Should I care?
Writing SIEM Rules and monitoring detection consoles is out. Not only do we not like it, it hasn’t proved to be particularly effective. The Respond Analyst is a new kind of analyst that increases capacity and improves the capability of any security team, regardless of size – without adding to the burden of an already overworked team. Powered by Robotic Decision Automation (RDA), the Respond Analyst is ideal for organizations that are collecting meaningful security data, but struggle with having the manpower and resources to properly analyze and triage security incidents.
Join us during this presentation to learn:
- Why traditional human-centric monitoring based on rules and queries has failed and leads to analyst fatigue.
- How the Respond Analyst uses RDA to eliminate concerns of ‘unattended alerts’ and missed clues by analyzing more security data – without filters or tuning.
- How the Respond Analyst integrates with your existing technologies and workflows to speed response, modernize, and automate security operations.
Mike is a Sales Engineer at Respond Software. He is focused on helping organizations of all sizes drive efficiencies across their security operations teams. Prior to Respond Software, Mike sold, architected, and deployed SIEM solutions across the globe for McAfee, NitroSecurity and LogMatrix. While at LogMatrix (aka OpenService) he helped to develop their risk-based correlation engine and helped the company pivot from systems management to SIEM. He has a B.S. in Computer Science, served in the United States Air Force, and has 25+ years experience in communications, networking, and security. He was once a firm believer in the power of correlation but has seen the light and is working to atone for the sins of his past.
For a copy of this presentation, please contact Jane Dunne – Jane@respond-software.com
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
A New Era of Data Protection: Converged DR + Backup
A component of IT Transformation is IT resilience which is the ability accelerate your transformation by allowing you to adapt to change without disruption to the business
IT Resilience allows you to react quickly to unplanned disruptive events and protect during your planned disruptive events, effectively, accelerating data-oriented business initiatives. IT Resilience is the path to achieving continuous availability of business and IT.
For a copy of this presentation, please contact Rhonda Phelan – firstname.lastname@example.org
Session Four10:45 am - 11:15 am
Protection From Today’s Biggest Threats
In this session, we will cover some of today’s biggest threats, including Emotet and CryptoJacking. You’ll also learn how they attack, and what you can do to protect yourself. Many organizations already have the means to protect themselves, but are they using them properly? Are you doing the right things across your company?
Ryan Archer has been in the IT field for over 28 years with experience both as a customer and as a vendor. His experience ranges from a Satellite Communications Technician in the US Air Force, a position at The White House as a NOC technician, to a Senior Network Architect at a Fortune 100 Company, to the vendor side at two leading security companies for the last 12 years. Ryan is currently the East Region Sales Engineering Director for Sophos.
Lunch11:15 am - 11:45 am
Break / Vendor Booth Time / Lunch
Session Five11:45 am - 12:15 pm
Lightweight Deception. Heavyweight Results
• PacketViper Brief
• Cyber challenges to security
• Turning an attackers strength to a weakness
• Efficient and practical internal deception
• Using deception to turn the tides
• Our Mission
As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader. Frank also is co-inventor of a patent issued for selectively regulating network traffic. Francesco is an experienced network engineer and prior to PacketViper, held the Director of Information Security and Technology position at Liberty USA, Partner and Director of Libcom Internet Services ISP, Sr Network/Systems Engineer, Architect, and PM for nationally based technology businesses such as The Future Now, XLConnect, and MicroAge. Francesco holds a BS in Technical Management from Embry-Riddle University. Francesco is a decorated veteran that served twelve years in the US Army Assualt Helicopter Battalion at FT Drum, and Schoefield Barracks.
Break12:15 pm - 12:45 pm
Break / Vendor Booth Time
Break1:30 pm - 1:45 pm
Session Seven1:45 pm - 2:15 pm
How to Improve the Security & Resilience around your Email
Security breaches, data leaks, and email-based attacks are a real threat to your organization. Many organizations are focused on prevention and are too busy with day-to-day firefights to think about how to recover. When moving to the cloud and O365 does Microsoft provide everything needed from a security standpoint? How can you provide your organization with a defense in depth security strategy around email and O365 ?
Before joining Mimecast Aaron spent 5+ years in the healthcare information technology field. Aaron is responsible for maintaining and optimizing a global demo environment as well as meeting with customers of all sizes to find innovative ways in which their environments need protection against the ever-evolving cyber landscape. Email Security is Aaron’s passion and as the threat landscape evolves, he splits his time between understanding the anatomy of attacks and explaining to his family what the cloud really is.
For a copy of this presentation, please contact Kristy Pauloski – email@example.com
Session Eight2:15 pm - 2:45 pm
Certificate Management Challenges and How to Overcome Them
Join Kyle Grueninger, Vice President of Sales, The SSL Store™ as he discusses the difficulties businesses face when managing SSL in this new era of data protection. “Certificate Management Challenges and How to Overcome Them” will highlight key factors contributing to the increase in SSL usage, recent real-life examples of certificate expirations and their business impact, common challenges companies must solve to efficiently manage SSL, operational consequences of SSL mis-management and what to look for in effective certificate management solutions.
For a copy of this presentation, please contact Kyle Grueninger @ kyle@theSSLstore.com.
Break2:45 pm - 3:00 pm
Break / Vendor Booth Time
Session Nine3:00 pm - 3:30 pm
Sertainty enables you to build from a new foundation. Our technology makes it easy to configure and mix intelligence into ordinary data-files empowering its ability to act and react.
Sertainty shifts data control and risk mitigation from an indirect/re-active paradigm to a direct/active paradigm by driving governance, provenance and protection INTO YOUR DATA and technology solutions. We call this Data: Empowered.
Session Ten3:30 pm - 3:50 pm
Modern access management for hybrid and multi-cloud environments
Today’s dynamic cloud environment encompasses many different user types who need to access shifting target servers.
Cloud environments can be complex and dynamic, demanding unified and nimble management tools.
Modern methods for user authentication and authorization and rules enforcement enable access management to cloud environments.
Visibility into access management traffic help meet best practices and security standards.
Markku Rossi brings close to 25 years of software engineering and architecture experience to the company. He is responsible for R&D and directs the company’s technology strategy. Markku has extensive knowledge and experience with SSH Communications Security products, having served the company from 1998 through 2005 as Chief Engineer and a major contributor to the SSH software architecture. Prior to rejoining the company in 2015, he co-founded several companies such as Codento and ShopAdvisor and served as CTO at Navicore and Chief Architect at Nokia. He has a Master of Science degree in Computer Science from Aalto University.
For a copy of this presentation, please contact Bridget Bridgman – Bridget.Bridgman@ssh.com
CISO Panel4:00 pm - 5:00 pm
Brandon ChampionChief Information Security OfficerSyneos Health
Scott MathisChief Information Security OfficerRBC Bank US
Jerome SmithChief Information Security OfficerNorth Carolina Department of Revenue
Robert ReynoldsChief Information Security OfficerTown of Chapel Hill, North Carolina
Hema LakkarajuCEO and FounderHayag Corp
8:30 am - 5:00 pm201 Harrison Oaks BoulevardCary, North Carolina 27513919-677-1840