Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Session One9:00 am - 9:30 am
Zero Trust Networks Made Simple
It’s been 50 years since TCP/IP was born and the industry has spent much of the last two decades attempting to fix the symptoms without addressing the cause. We have spent large sums of time, money, and personnel layering a complex chain of technologies on top of IP networks only to add more complexity. We endure even slower provisioning times coordinating between network and security teams attempting to tighten security and we still get hacked.
Matt Senechal is a passionate technologist and director of sales at Tempered Networks. He has spent the last 4 years meeting with customers and partners about the benefits of HIP (Host Identity Protocol) and Identity Defined Networking (IDN). Matt has spent his entire life in the Seattle area and has worked for Networking and Security companies like F5 Networks and at Check Point before coming to Tempered Networks.
Session Two9:30 am - 10:00 am
Nyotron has turned the security paradigm upside down by focusing on the damage stage or the intended outcome behind the attack. Traditional as well as next-generation endpoint security technologies attempt to prevent attacker’s entry into the enterprise, whether at the perimeter or the endpoint, acting like gates that can be bypassed. We assume that given enough time targeted and unknown threats will bypass your existing security controls. Our engine has mapped legitimate operating system behavior, so when an attack attempts to delete, exfiltrate or encrypt files, we know the actions shouldn’t be allowed and stop the damage from executing.
Founded in 2012, Nyotron is headquartered in Santa Clara, CA with R&D in Israel. Nyotron has earned a top score of 5 stars from SC Magazine in its review of Endpoint Security Platforms, won GOLD in the 2017 IT World Awards for Endpoint Security and was designated as the 2017 HOT COMPANY in Endpoint Security by Cyber Defense Magazine.
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
We help organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products.
We help customers protect their businesses and meet compliance needs. And all our customers benefit from the expertise of our threat analysts located around the world. Their research is at the heart of everything we do. They quickly find the latest threats and update protection for our customers automatically. Plus, our support engineers are experts on all our products, and they’re available whenever you need them.
We make our products easy to install and use so you spend less time managing security. With Sophos you can focus on the needs of your business because we’re securing your entire organization.
Session Four11:00 am - 11:30 am
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Keynote Session12:00 pm - 12:45 pm
The Cyber Threat Landscape
SA Brennan will present an overview of current cyber threat actors and a summary of their intrusion techniques along with insight on working with the FBI during an intrusion.
FBI Special Agent Kevin Brennan is currently assigned to the Seattle Field Office to investigate computer intrusions. He is also an FBI cyber instructor, teaching about cybercrime investigations to local, state, federal, and international law enforcement agencies. Prior to joining the FBI in 2006, he worked for IBM Global Services.
Break12:45 pm - 1:15 pm
Break / Vendor Booth Time
Session Six1:15 pm - 1:45 pm
Cybercrime Tactics and Techniques Report
The Malwarebytes Labs research team showed a significant uptick in threats aimed at businesses in Q1 2019 from the same time last year. Companies need to take control against these increases in cyberthreats by remediating at scale, quickly mitigating attack impacts through isolation, and proactively hunting for threats before they execute.
– Significant increases in overall threats, Emotet, ransomware, and its impact on your enterprise
– How Mac, mobile malware, and especially adware are on the rise
– User concern about the safety of their personal information, and how organizations are failing to protect their data
– What it takes to create a resilient enterprise
Session Seven1:45 pm - 2:15 pm
Data as the New Perimeter
Data is essentially inert and passive, lacking an inherent ability to either control its own fate or mitigate risks while under process, as well as at rest and in transit. Data loss and theft is a result of the problem.
The safety of the data is wholly dependent on human behavior and infrastructure. In reality, the enterprise protects data indirectly through a static perimeter. Endpoints are managed, and trust assumed. This approach is not data-centric and has reached obsolescence.
This workshop will discuss merger and acquisition best practices and the ensuing vulnerabilities to corporations if security is not at the forefront of the process. It will highlight a paradigm that imbues data with self-governance, provenance and protection capabilities, to make it the new perimeter and a source to rethink deployments, workflows, and responsibilities.
David Barton, Chief Information Security Officer, is responsible for the day-to-day security operations of Stellar Cyber in addition to product strategy and direction. Prior to Stellar Cyber, Barton was the COO for 5Iron, a MSSP based in Nashville, TN.
Barton brings to Stellar Cyber more than 20 years of experience in security leadership roles across a variety of industries, including telecommunications, healthcare, software development, finance and government. Prior to 5Iron, he spent three years as Chief Information Security Officer for Forcepoint, responsible for securing the information and physical assets of Forcepoint on a global scale.
Barton spent three years building and leading the international security team at Hireright protecting their customer data and intellectual property. Prior to that, he spent almost eight years as director of information security at AT&T/Cingular, based in Atlanta, Georgia, where he led efforts to protect over 80 million wireless subscribers. As group manager of security operations and engineering at Sprint/Nextel, he managed all security activities for application development, database architecture and enterprise policy and audit compliance, in addition to building a world-class white-hat security team.
Barton holds an executive MBA from University of Missouri, Kansas City, a B.S. in management information systems from Simpson College and a CISSP certification.
Break2:15 pm - 2:30 pm
Break / Vendor Booth Time
Session Eight2:30 pm - 3:00 pm
The Vera Platform gives developers the power to build advanced data security and control into any business application, extending protections beyond the borders of an organization. Leverage our SDK and REST APIs to encrypt, track, and revoke access to files, and give your security team complete visibility over how confidential information is used, and the tools to manage access anywhere it travels.
CISO PANEL3:00 pm - 4:00 pm
8:15 am - 5:00 pm1415 Fifth AvenueSeattle, WA 98101(206) 971-8000