Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Session One9:00 am - 9:30 am
What is Robotic Decision Automation and Why Should I care?
Writing SIEM Rules and monitoring detection consoles is out. Not only do we not like it, it hasn’t proved to be particularly effective. The Respond Analyst is a new kind of analyst that increases capacity and improves the capability of any security team, regardless of size – without adding to the burden of an already overworked team. Powered by Robotic Decision Automation (RDA), the Respond Analyst is ideal for organizations that are collecting meaningful security data, but struggle with having the manpower and resources to properly analyze and triage security incidents.
Join us during this presentation to learn:
- Why traditional human-centric monitoring based on rules and queries has failed and leads to analyst fatigue.
- How the Respond Analyst uses RDA to eliminate concerns of ‘unattended alerts’ and missed clues by analyzing more security data – without filters or tuning.
- How the Respond Analyst integrates with your existing technologies and workflows to speed response, modernize, and automate security operations.
Mike is a Sales Engineer at Respond Software. He is focused on helping organizations of all sizes drive efficiencies across their security operations teams. Prior to Respond Software, Mike sold, architected, and deployed SIEM solutions across the globe for McAfee, NitroSecurity and LogMatrix. While at LogMatrix (aka OpenService) he helped to develop their risk-based correlation engine and helped the company pivot from systems management to SIEM. He has a B.S. in Computer Science, served in the United States Air Force, and has 25+ years experience in communications, networking, and security. He was once a firm believer in the power of correlation but has seen the light and is working to atone for the sins of his past.
Session Two9:30 am - 10:00 am
Secure Networking: Get HIP
Secure Networking does not have to be complex, complicated, nor should it take longer to deploy than it does to design. This session will discuss the history of networking, the mistakes we make, and how easy and secure it can be without significant changes to your network.
Cal Jeffrey has been in the Network and Cyber Security industry for nearly 30 years. He has worked for the most prominent companies in Network Security and been involved with global deployments at some of the largest international companies across numerous industries.
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
The Human Deception Problem: Understanding and Defending Against Social Engineering Attacks
The most successful method of cyber-attacks continues to be phishing. These attacks cost organizations millions of dollars each year and things are just getting worse. As these attacks intensify and become more refined, technology is failing to keep up and your users will continue to fall prey. To effectively defend yourself against this, you have to understand how the attacks work, including the psychological triggers and tricks the attackers are using. This session will explore the different levers that social engineers and scam artists pull to make your users more likely to do their bidding.
Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, as he provides fun and engaging examples of mental manipulation in everyday life: from the tactics used by common criminals, to sophisticated social engineering and online scams. Additionally, he’ll look at how you can ethically use the very same levers when educating your users.
- The Perception vs. Reality Dilemma
- Understanding the OODA (Observe, Orient, Decide, Act) Loop
- How social engineers and scam artists achieve their goals by subverting critical thinking steps
- How you can defend your organization and create your human firewall
Erich Kron, Security Awareness Advocate at KnowBe4, is a veteran information security professional with over 20 years’ experience in the medical, aerospace manufacturing and defense fields. He is the former security manager for the US Army’s 2nd Regional Cyber Center-Western Hemisphere and holds CISSP, CISSP-ISSAP, MCITP and ITIL v3 certifications, among others. Erich has worked with information security professionals around the world to provide the tools, training and educational opportunities to succeed in Information Security.
Session Four11:00 am - 11:30 am
Certificate Management Challenges and How to Overcome Them
Join Kyle Grueninger, Vice President of Sales, The SSL Store™ as he discusses the difficulties businesses face when managing SSL in this new era of data protection. “Certificate Management Challenges and How to Overcome Them” will highlight key factors contributing to the increase in SSL usage, recent real-life examples of certificate expirations and their business impact, common challenges companies must solve to efficiently manage SSL, operational consequences of SSL mis-management and what to look for in effective certificate management solutions.
For a copy of this presentation, please contact Kyle Grueninger @ kyle@theSSLstore.com.
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Keynote Session12:00 pm - 12:45 pm
Financial losses in cyber space are expected to exceed $2 trillion annually in 2019. Governments, militaries, businesses, academic institutions, and individuals are under constant cyber attack by sophisticated adversaries. “Threat Landscape” is designed to spark thinking about ways the audience can mitigate these threats in their cyber spheres.
Break12:45 pm - 1:15 pm
Break / Vendor Booth Time
Session Six1:15 pm - 1:45 pm
Cybercrime Tactics and Techniques Report
A significant uptick in threats aimed at businesses were reported in Q1 2019 from the same time last year. Companies need to take control against these increases in cyberthreats by remediating at scale, quickly mitigating attack impacts through isolation, and proactively hunting for threats before they execute.
- Significant increases in overall threats, Emotet, ransomware, and its impact on your enterprise
- How Mac, mobile malware, and especially adware are on the rise
- User concern about the safety of their personal information, and how organizations are failing to protect their data
- What it takes to create a resilient enterprise
Michael Hernandez has been in Network and Endpoint Security for over 20 years as a security engineer for vendors such as Check Point, McAfee, Juniper, Websense, Sourcefire, Cisco, Tanium. His current position as a customer success engineer is with Malwarebytes covering Global Accounts. For fun, he enjoys game development and programming.
Session Seven1:45 pm - 2:15 pm
A new approach to email security for Office 365
For hackers, Microsoft Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Trey King is a Solutions Architect with Vade Secure and has more than ten years in various aspects of security (systems, networking, software development, and email). He loves code, surfing, understanding things on a granular level to solve complex problems, and thinks he is funnier than he really is.
Break2:15 pm - 2:30 pm
Break / Vendor Booth Time
Session Eight2:30 pm - 3:00 pm
Are you ready for 5th generation cyber attacks?
Learn about the latest trends with current cybersecurity threats and how previously unprecedented levels of attacks played out as large-scale, multi-vector mega attacks that inflicted major damage on business and reputation over the last year. Attackers operate freely and can advance without hindrance. Meanwhile, businesses are held back by up-time requirements, change control, compliance controls, staffing shortages, budget restrictions – and best-of-breed security infrastructures. Adding more products to an already operationally heavy security infrastructure compounds the problem. The bottom line is that business cannot keep up. You will leave with a better understanding of how to protect against the current Gen-V.
Wes Belt has been in IT security for over 20 years with the bulk of that time in fortune 500 Enterprise IT organizations. His current position as engineering manager is with Check Point Software Technologies covering Florida. Wes has spent his IT career focused on process and technology across Security, Enterprise Architecture and Infrastructure Operations leadership roles. For fun, he enjoys dabbling in Python and C# development, playing with containers and investing in the stock market.
Session Nine3:00 pm - 3:20 pm
Exploitation of IT Vulnerabilities is Escalating
Endpoint Management is a challenge for businesses small to large. Knowing what is on your network, is seemingly the easiest first challenge. How easy is it, and what ways can you determine what devices are on your networks? What has recent publicly known infections have cost to remediate? How bad is the threat to your environment, and what are some of the decisions business leaders are making? What ways can you mitigate those risks?
Jason Morano is a solutions consultant for Quest Software, specializing in securing, managing, and inventorying of endpoints in business environments. Has acquired SANS Security certifications, along with Microsoft’s MCSE, working 10 years for a large financial institution as a security analyst, before consulting customers in best practices and acquiring the right tools for their environments. Follow him at: https://www.linkedin.com/in/jasonmorano/
CISO PANEL3:30 pm - 4:30 pm
Jerry is an IT Executive with 30 years of management experience, the last 19 years as the Chief Security Officer of a Fortune 500 Global Financial Services firm with over 45 global offices and spanning across 170 countries. He developed a world-class Cyber Security program, Technology Risk Management program with associated frameworks, and manage all IT Audit and Compliance programs for the firm.
His journey as Chief Security Officer has allowed him to participate in various different Cyber Security forums, one which was a private secure round table advisory session to President Obama at the US Department of Commerce in conversation with the Secretary of the DOL, high ranking officials of the NSA, and several counselors to the President, sharing thoughts and ideas about how to address and curtail bad actors on our networks, and who to hold accountable for bad traffic, as well as issues with the way U.S Cyber Security regulations are written.
8:30 am - 4:30 pm2900 Bayport DriveTampa, Florida 33607813 874 1234