Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Session One9:00 am - 9:30 am
Network Security is a Team Sport
Now more than ever, protecting your network takes teamwork. So, who are the players? There are more than you think: It’s not just you and your staff. Your users and vendors are obviously on the team, but it goes a lot deeper than that, too. Through a handful of quick case studies, we’ll pull back the curtain on shared threat intelligence, open source software, outsourcing, and even social media to see how an emphasis on working together can help combat common issues like ransomware and malware.
Ted has worked with web and network security technologies for more than 20 years. He began his career in technology as a full-stack engineer in web development and design. As Chief Operating Officer, Ted guides the overall operations of Sentinel IPS, the CINS Active Threat Intelligence System, and all other supporting technologies. You may also find him presenting at an information security conference or trade show, spreading the word about shared threat intelligence.
One of Sentinel’s first employees, Ted is not afraid to get his hands dirty supporting Sentinel customers or lending a hand in Sentinel software development. Ted received his Bachelor of Business Administration from the University of Iowa (Go Hawks!) and his Master of Education (Secondary Mathematics) from the University of North Texas.
He resides in the DFW area with his wife and two sons, which keep him busy on seemingly every karate dojo and auditorium in the North Texas area. He can also be found swinging a hammer for Habitat for Humanity or riding his beloved bicycle for Team in Training.
For a copy of this presentation, please contact Denise Paruolo – firstname.lastname@example.org
Session Two9:30 am - 10:00 am
A New Era of Data Protection: Converged DR + Backup
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
Building Effective Cyber Defense Strategies Against Privileged Attack Vectors
The daily newsfeed continues to be littered with tales of new cyberattacks. Central to most of these stories is an element of privilege abuse or misuse. Based on strategies developed by BeyondTrust and presented in the book Privileged Attack Vectors, you will learn how privileges, passwords, and vulnerabilities are leveraged as attack vectors, and the steps you can take with Innovation Network Technologies to mitigate these threats.
Attendees will learn:
- What is privileged access management?
- Best practices for assessing, prioritizing and addressing privileged risks
- 12 key steps to mitigate the threats of unmanaged privileges
Shaun Pressley is a Sr. Solutions Engineer with BeyondTrust, and is based in Dallas, Texas. In his current role, he evangelizes how Privileged Access Management solutions can prevent data breaches and minimize risk, across a customer’s environment. With over twenty years of Enterprise Data Center infrastructure experience, he has worked both as a customer, for eight years with Charles Schwab, and as a technical consultant within the IT industry. Shaun has worked with customers in a variety of industries including Global Financial Services, Defense Contractors, Transportation, Retail, HealthCare, Communications and Energy.
For a copy of this presentation, please contact Allie Stevens – email@example.com
Session Four11:00 am - 11:30 am
Cyber Resilience for Email
As today’s attacks have become more sophisticated, we are focused on helping organizations to improve their Cyber Resilience for Email in the Cloud by providing a comprehensive solution that goes beyond a defense-only strategy. In this session, we will discuss how to better educate your users and develop a security posture to Protect, Maintain, and Recover critical corporate data held within your email environment.
An IT Professional for over 15 years, with more than half of that time dedicated to email, T.J. has worked in the university and financial sectors before coming to Mimecast. He engages with organizations of all sizes, all around the world, advocating enhanced cyber-resilience security postures for email.
For a copy of this presentation, please contact Kristy Pauloski – firstname.lastname@example.org
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Keynote Session12:00 pm - 1:00 pm
Special Agent Raymond Martinez has been with the FBI since 2009. He has a Bachelor’s of Business Administration in Information Systems from the University of Texas at San Antonio. Prior to joining the FBI he worked in the private sector as a Technical Coordinator. SA Martinez worked in the Los Angeles Field Office for over 8 years working Cyber investigations to include his assignment on the Los Angeles Electronic Crime Task Force. SA Martinez recently transferred to the San Antonio Field Office and is currently assigned to the Cyber Squad.
Break1:00 pm - 1:30 pm
Break / Vendor Booth Time
Session Six1:30 pm - 2:00 pm
Mobile Threat Landscape
Today’s modern operating systems, like iOS and Android, are designed for ubiquitous and wireless access from anywhere in the world, and have very different use cases and security requirements compared with traditional PCs and servers. Mobile devices are on and connected 24/7, and often owned and managed by individuals, dramatically increasing the attack surface relative to PCs. Malicious hackers have shifted much of their attention to these new operating systems that may provide a direct link into large companies with valuable assets worth stealing. Today, their methods are less focused on broad and annoying attacks on consumers and more on targeted attacks on specific individuals in specific organizations who have the right access levels to high-value assets. Well-researched social engineering exploits, combined with system vulnerabilities, make these attacks highly effective, even against smart and educated individuals. Solutions exist that protect companies from mobile cyber-attacks by securing mobile devices, whether owned by the company or the individual, from the entire landscape of mobile threats-including malware, network-based threats, vulnerability exploits and other targeted attacks, without changing the mobile user experience, compromising user privacy or adding extra burden to IT. Today we will discuss the Mobile Threat Landscape, show an example of what a Mobile Threat looks like, and discuss best practices to protect your Mobile Data.
Chris D. Rowlands is a Mobile Threat Defense expert who helps companies detect, mitigate, and secure their Smart Devices and Tablets against Mobile Threats. He believes that Mobile Devices are an easy way for hackers to gain access to your personal and professional data and is on a personal and professional mission to educate people on how to protect themselves. Chris has been in the Mobility Industry for over 20 years and began specializing in Enterprise Mobile Applications with AT&T in 2009. He has also had roles with MobileIron, Certes Networks, and Skycure (which was acquired by Symantec).
For a copy of this presentation, please contact Jillian Ackerly – email@example.com
Session Seven2:00 pm - 2:30 pm
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
Jeff Raymond is a Seattle, WA based Cloud Security Engineer at Avanan. While working for companies ranging from security giants to start-ups, he has found his passion in protecting organizations from phishing attacks and securing their cloud applications. Outside of work, he can either be found snowboarding or wakeboarding (depending on the season) or geeking out in his home lab.
For a copy of this presentation, please contact Nick Damiano – firstname.lastname@example.org
Break2:30 pm - 2:45 pm
Break / Vendor Booth Time
Session Eight2:45 pm - 3:15 pm
Top 9 Insider Threats and How to Spot Them
Insider threats are some of the most overlooked events in the modern data center. Insiders, who are considered trusted, are often overlooked as the source of data exfiltration whether it be because of a mal-configuration or intentional. Being able to identify these actions is imperative but, can also be tricky. We will investigate how to identify these insider threats.
Michael Lebeau is a 13 year employee of Quest as a Systems Engineer. Michael has a long history of different roles in corporate IT and software development in companies ranging from startups to major software authors. His experience spans roles from technical support through product management giving Michael a unique perspective to modern computing.
CISO PANEL3:15 pm - 4:30 pm
Roman Medina Jr., CISSPVP, Chief Information Security OfficerJefferson Bank
Abraham NúñezInformation Security Executive AdvisorDenim Group
John ByersRegional Chief Technology OfficerBluVector
Howard GordonVP, Information Security OfficerFarm Bureau Bank
Deborah MillsPrimary Information Security AssuranceDepartment of Defense
8:30 am - 4:30 pm3233 NW Loop 410San Antonio, TX 78213210-377-3900