Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session One8:45 am - 9:15 am
A Practical (low cost) Approach to Securing East-West Traffic & Critical Data
Despite best efforts organizations continue to struggle detecting and stopping attacks that lead to costly exposures of critical data.
Why is this? One reason is that organizations typically do not have a simple means to provide visibility to threat as they move East-West across their network. Leaving them blind to up to 80% of their threat surface.
Come learn how to leverage simple techniques to make your existing threat detection and investigation processes much more effective.
Learn also how to add layers of defense to protect your most critical assets.
Session Two9:15 am - 9:45 am
Improve security, productivity and user experience
So, there are somewhere between a million and a half and two million apps out there. Right now, the average corporate IT department lets users access maybe 35—because of all the security and admin stuff involved in setting them up.
So how do you make it easier for your company to adopt more great technology—without creating insane security risks. One example of this is using a single sign-on, where you can use one username and password to get into any app. Another example is something called multi-factor authentication, where your computer prompts you for a fingerprint or a special code, to prove it’s you who’s trying to log in.
Join this informative session and hear about different options now available to your company to secure one of your company’s most important asset, the network and give access to the applications that your users require to do their jobs. And you will see first-hand demonstrations of not only how these work, but also how easy it is to configure and manage. This is a don’t miss session.
Manish Raval is a Pre-Sales Engineer at Okta. At Okta, he’s responsible for working with prospects and customers to provide solutions to their Identity and Access Management challenges and journey. Prior to Okta, he spent over 11 years at Microsoft in different subsidiaries across North America and APAC. At Microsoft, he was part of the Product Support, Product Engineering, Consulting, and Account Management teams and worked on different technologies across Operating Systems and System Center suite of products.
Manish holds a master’s degree in Advanced Computer Applications from Saurashtra University, India. He enjoys traveling, reading, and cooking.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
Smart Buildings – Are they the next cybersecurity risk?
Could a cybercriminal hold a building heating system hostage and force an evacuation of the entire buildings occupants? Smart-building technology brings many benefits to overall building operations and is being transformed as lower cost devices cut down the expense of automating and connecting the very fabric of the building. The expense is also offset through energy and efficiency costs, but is it increasing risk and is it secure by design? The possibilities for a cybercriminal to launch a ransomware type of attack on a building are fast becoming a reality. In this presentation, Tony will discuss what smart building technology means, how it can benefit an organization, explore the current landscape and the possible threats and outcomes of a cyberattack on building infrastructure. And most importantly discuss some of the considerations needed to avoid the risk and how best to mitigate potential attacks.
Tony Anscombe is the Global Security Evangelist for ESET, an industry-leading IT security software and services company for businesses and consumers worldwide. With over 20 years of security industry experience, Anscombe is an established Author, Blogger and Speaker on the current threat landscape, security technologies and products, data protection, privacy and trust, and Internet safety. His speaking portfolio includes industry conferences RSA, CTIA, MEF, GlobSEC and Child Internet Safety (CIS). He has been quoted in security, technology and business media, including BBC, the Guardian, the Times and USA Today, with broadcast appearances on Bloomberg, BBC, CTV, KRON and CBS. Anscombe has served on the board of MEF and FOSI and holds an executive position with the Anti-Malware Testing Standards Organization (AMTSO).
Session Four10:45 am - 11:15 am
- Functions of SIEM
- Building a security incident response plan
- Reporting and alerting tips
- Important security events to track in your network
- Event correlation use cases
Lakshmanan is a Manager, Presales for ADSolutions team at ManageEngine, a division of Zoho Corp. He presents POCs, and takes care of implementation as well as product training for ADSolutions customers across the globe. He is also a regular speaker on the latest trends and best practices in Windows infrastructure management, in international seminars and user conferences conducted by ManageEngine.
Lunch11:15 am - 11:45 am
Break / Vendor Booth Time / Lunch
Keynote Session11:45 am - 12:30 pm
The Cybersecurity Mindset – Cybercrime Risk Assessment, Mitigation and Response
With Billions being spent globally on Cybersecurity each year, breaches of various magnitudes are still taking place at an alarming rate. From phishing scams to targeted attacks, cyber threats loom over us keeping, business, technology and industry professionals up at night. Effective action starts with the appropriate mindset, especially when it comes to determining your risk factors for becoming a victim of cybercrime. This presentation will examine cyber threat considerations, key components that should be in every cyber incident response plan and how law enforcement can use your mitigation efforts to assist with attribution and be your partner in the process.
Prior to joining the Toronto Police Service Kenrick spent twenty years working in the Information Technology industry primarily in the financial services sector. During this time, Kenrick spent twelve years working in Bermuda where he was a Senior Network Analyst for the Bank of Butterfield, then an IT Manager for Flag Telecom followed by a position as Senior Vice President of Information Technology for CAPITAL G Bank (now Clarien Bank) before returning to Canada in 2005.
Kenrick has been a member of the Toronto Police Service since April of 2006 and holds the rank of Detective Constable. He has worked in several areas of policing including: Primary Response, Community Response, The TAVIS Neighborhood Imitative Program, General Criminal Investigations, and Divisional Fraud Investigations.
In February of 2015 Kenrick joined the Computer Cyber Crime (C3) section of Intelligence Services where he currently works as a Cybercrime Investigator, and also instructs at the Toronto Police College on the Internet Facilitated Investigations course. Kenrick is an Associate Professor at George Brown College where he designed and instructs the Cybersecurity Fundamentals and Cyber incident Response & Recovery courses in the faculty of Safety, Security and Emergency Management.
Kenrick is a contributor to Canadian Security Magazine where he has written several columns on Cybersecurity including cyber bullying and threats to critical infrastructure.
Kenrick has been a keynote speaker and presenter on Cybersecurity at The Fraud & Breach Prevention Summit (Toronto, ON), The Niagara Counterfeit and Fraud Workshop (Niagara Falls, ON), The Axis Communications USA Partner Summit (Tucson, AZ) and several other public sector and private industry symposiums.
Kenrick has also written the chapter entitled ‘Dealing With Law Enforcement’ in the recently published book, Cybersecurity In Canada, A Guide to Best Practices, Planning and Management.
Kenrick’s background in Information Technology combined with his Law Enforcement experience has uniquely positioned him as an investigator, instructor and presenter on technology, information security and cyber investigations.
Break12:30 pm - 12:45 pm
Break / Vendor Booth Time
Session Six12:45 pm - 1:15 pm
The current Malware Threat Landscape – and Best Practices for Enterprise Grade Remediation
Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.
This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.
Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.
Session Seven1:15 pm - 1:45 pm
Defend beyond AntiVirus
During this session you will learn about adversary “breakout Time” the speed which adversaries accomplish lateral movement in their victim environment and how CrowdStrike can help provide instant visibility, protection and remediation across the enterprise
George Boulos is the Cybersecurity lead for CrowdStrike in Canada. With over 20 years of cybersecurity and technology experience, he has a diverse background that helps him solve security issues for Fortune 500 companies that leverage CrowdStrike’s technology and services. Prior to his role with CrowdStrike, George was the endpoint security technical sales lead for IBM Security worldwide. George is passionate about security and the need for organizations to think differently as we become increasingly reliant on technology and the digital landscape continues to shift.
Break1:45 pm - 2:00 pm
Break / Vendor Booth Time
Session Eight2:00 pm - 2:30 pm
5 Ways to Bypass PAM
Let’s learn about how unmanaged Credentials over the past 10+ years could still be accessible to insider and outsider threats and how to clean up a commonly ignored or even forgotten issue.
Jimmy Mills is a Senior Solutions Architect for SSH.COM and has worked with several large enterprises assisting and overseeing SSH Key Management remediation projects. He has 20+ years experience coming from Unix Engineering and Access Management roles before joining the thought leadership team at SSH.
Session Nine2:30 pm - 3:00 pm
Data Governance for Risk Reduction & Value Creation
In this session, we will explore how organizations can adopt a single data governance framework to discover and protect sensitive data while mitigating cyber risks, reducing storage costs and addressing global privacy regulations.
Neil is an information security and privacy risk leader with over 15 years of experience across a broad range of security/privacy risk areas and diverse industry segments.
Break3:00 pm - 3:15 pm
Break / Vendor Booth Time
Session Ten3:15 pm - 3:45 pm
The Risky Business of Online Collaboration
Protecting Sensitive Content in a Dangerously Connected World
The modern enterprise spends millions of dollars on cyber security, yet the modern CISO can’t say in any specific detail what IP, PII, PHI and other sensitive information is entering and leaving the firm at any given time.
- Doctors and patients exchange health records online
- Law firms share case information with clients
- Insurance companies provide claim details to agents and policy holders
- Government agencies and contractors share RFPs, contracts and plans
- R&D organizations send sensitive IP to foreign manufacturers
If you can’t see it, you can’t protect it. It only takes one leaked client folder to destroy an organization’s reputation or one malicious email attachment to destroy a network. Protecting IP, PII, and other sensitive enterprise data against the overwhelming need to share it with outside parties is a challenge every CISO faces.
Craig Pfister explores the current threat landscape of online collaboration and concrete solutions to protect your organization:
- Get total visibility to all IP, PII, and other sensitive content entering and leaving the organization
- Know and show where sensitive data is located to demonstrate regulatory compliance
- Spot anomalies in everyday workflows to eliminate potential threats
- Use AI-based dynamic governance to prevent breaches and attacks in real-time
To succeed in today’s hyper-connected world, CISOs must enable easy online collaboration across the extended enterprise. CISOs meet this challenge with complete visibility and control of all sensitive data.
Craig Pfister is a Senior Director of Sales Engineering who works with business executives to increase security, governance and transparency of their digital assets. Craig believes that in the digital age, a comprehensive security framework around an organizations digital assets is critical to any businesses overall strategy. After spending nearly a decade working as a VP in Financial Services focusing on Portfolio Analytics, Craig understands that data drives good business and investment decisions. Craig focuses on financial theory, risk management, security monitoring and secure collaboration as well as innovative security solutions for global corporations. Craig holds a Bachelor’s degree in Applied Mathematics from the University of Alabama.
Session Eleven3:45 pm - 4:15 pm
Eliminating The Existing Blind Spots and Provide Consistent Cloud On-Prem Pervasive Security Monitoring Coverage
Visibility gaps lead to security vulnerability. You can’t protect what you can’t see. Can the Networking team play a larger role as Public cloud usage matures? Join our session and find out the latest cloud-first networking strategies to help you protect your networks.
Tim Melvin leads the sales team for the Eastern Americas Region. He is one of the longest tenured people with Big Switch and is a veteran of networking, network security and monitoring. Tim’s past companies include; Gigamon, Juniper and NetScreen.
8:15 am - 5:00 pm370 King Street WestToronto, ON M5V 1J9416-343-1234