- This event has passed.
September 20 @ 8:00 am - 5:00 pm
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Senior Network Engineer
Know Before You Go
Learn what the advantages are of having an IT strategy around public cloud; including “pets vs. cattle”, scaling up vs. scaling out, taking advantage of the economy of scale. We will cover:
- An introduction to cloud computing architectures
- Common pitfalls encountered in cloud migrations and how to avoid them
- How to architect high availability and security in an SDN environment
- Plan for a small equipment footprint to secure the ingress/egress of your cloud workloads
- How to make your journey to the cloud successful
Peter Scudamore is a Systems/Network Engineer with over 20 years’ experience in local and wide area network design and support; physical, virtualized and cloud-based systems/services architecture; UNIX/Linux and Windows systems’ architecture; PCI compliance; and network security and IS policy architecture. Pete is also focused on cloud technologies, bringing his years of experience with AWS to bear as Cloud and Hybrid Cloud architectures continue to become increasingly popular.
Central Region Channel Sales
The Changing Landscape of DDoS Attacks – Advanced DDoS Is Here – Are You Ready?
Distributed Denial of Service (DDoS) attacks have entered a new era! Historically DDoS attackers have used a “brute force” approach to making an online services unavailable by overwhelming your company’s internet connection. DDoS targets wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and presents a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Brute force attacks have morphed into more sophisticated, multi-vector attacks. Your adversaries are patient, launching targeted attacks using deception & “smokescreen” tactics to take down your network. The frequency of DDoS attacked has risen dramatically as well. The emergence of IOT devices has led to larger, more destructive attacks from Lizard Stressor, to Mirai & now Memcache. 2018 has seen the first DDoS exceeding I tbps! (1.3 tbps & 1.7 tbps attacks)
Arbor will discuss the misconceptions & facts about modern day DDoS attacks and best practices to protect your company against DDoS attacks while providing maximum network availability. “Bandwidth saturation” will impact your business – an attack that exceeds your internet pipe is all it takes. In this new world, “peace time” no longer exists so having a DDoS protection strategy is critical! With 30+% of DDOS attacks causing havoc at the Application Layer with potential data exfiltration, the stakes could not be higher.
Current Cyber Threat Trends and Actionable Next Steps that Make Business Sense
Hear about some of the current tools, methods, and motivations of malicious actors. In tandem, what are some effective responses that won’t leave your organization buying the proverbial $1,000 safe to protect a $100 bill.
Jason Malacko is the Director Architecture – Security at Logicalis where he is responsible for cybersecurity business and technical architecture. He is a certified information system security professional (CISSP) who combines two decades of experience in information security with an extensive background in network and systems infrastructure engineering.
Senior Solutions Architect
A New Security Reality: The Secure Breach
We all know that the operating paradigm in which business is conducted changes on almost a daily basis, yet the way we defend the sensitive data within our business has remained static for nearly 3 decades. Perimeter security is not enough, and that’s why we have introduced the concept of Securing the Breach.
Gain insight on how to prepare for the breach and protect what truly matters—your data.
Gina Scinta, a Senior Solutions Architect at Gemalto, has over 30 years of experience in the information technology profession encompassing pre/post sales engineering support for Commercial and Federal territories. For the past eight years, Gina has been working at Gemalto (formerly SafeNet) focusing on providing solutions for protecting data using world class encryption and key management for data at rest in data centers and cloud infrastructures for Commercial and Federal customers, Service Providers, Systems integrators and technology partners.
Mobility, it is not just a technology; it is a mindset and more and more a way of life today.
Mobility, mobile technology, our dependence and interdependence upon them is growing every single day, but we are ignoring the vulnerabilities and inherent security gaps that come with the race to something new and innovative. Many profess that the explosion of mobile device availability and use is one of the single most empowering aspects of technology to happen in the last three decades.
Then why are mobile devices so unsecure?
Why, do we simply accept that?
How did we get to this point?
Let us look at the brief history of the “mobility” mindset, where we are today, what we can expect in the future, and how we can better secure ourselves, and our enterprises.
Bob Riley’s experience in information technology and security started over 30 years ago in the United States Marine Corps, where he served for over 12 years on active duty as an electronics, communications, and surveillance maintenance chief, instructor and inspector for the Headquarters Marine Corps Inspector General. In his current position Bob serves as a Mobile Security Expert for Check Point Software Technologies, were he works closely with organizations to help them secure the mobile endpoint and implement “common sense” security best practices for mobile devices. To that position Bob brings over two decades of Fortune 500 experience doing the same through the evolutions of Mobile, Security, and IT itself. Bob holds several specific and several industry agnostic Information Security certifications to include the CISSP, CCSP, CRISC and the ITILv3F.
Stop the Data Breach – It’s all about the User
In an age where hackers have many different roads to take in undermining corporate infrastructures, none is more prevalent than exploiting the user. This session will focus on the trends that our occurring as it relates to end-user behavior and the “lowest hanging fruit” hackers have access to. The normal habits and trends of employees and consumer provide a target rich environment to conduct massive data breaches, and we explore why this occurs and what can be done about it.
Transforming Security Operations with Virtual Analysts
About Respond Software
Respond Software redefines Security Operations with the first security expert system, The Respond Analyst. Driven by its patent-pending Probabilistic Graphics Optimization (PGO) technology, Respond Analyst emulates the decision-making of an expert security analyst, effectively becoming a security team member that specializes in high-volume, low signal use cases while it applies, adapts and maintains an organization’s tribal knowledge 7x24x365. Respond Software was founded by security operations veterans and world class product technologists to serve its customers across multiple industries.
A new approach to email security for Office 365
For hackers, Office 365 is the new black!
Because a simple set of Office 365 credentials can give you access to sensitive documents, applications and confidential business information,
Office 365 is now the go-to place for cybercriminals looking to make a fast and high profit.
Each day these hackers implement new and always more creative phishing and spear-phishing attacks, that easily bypass the traditional email security solutions.
Discover what their techniques are, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Founder & President
Hackers at the Door
This will be an engaging talk about different types of cyber risks and the latest Cyber Security Trends in: Healthcare, Medical Devices, Internet of Things (IOT), and Internet of Bodies (IOB).
Sanjay Deo combines over 20 years of Cybersecurity and compliance experience. He holds a Masters degree in Computer Science from Texas A&M University, and is a Certified Information Systems Auditor (CISA) accredited by ISACA, Certified Information Systems Security Professional (CISSP) and Healthcare Information Security and Privacy Practitioner (HCISPP).
As President of 24By7Security, Sanjay is responsible for all aspects of corporate development, business development including execution of strategic business plans. The company focuses on Cybersecurity services – Risk Assessment, Policy & Procedures and Training including incident response across various industry lines.
He currently serves on the Board of the South Florida CIO Council, and also Co-Chairs the South Florida CISO Forum. Sanjay is part of the HIMSS’ Privacy and Security Committee focused on Risk Assessment in the Healthcare Industry. Sanjay is a frequent speaker on IT Governance and Cybersecurity at national conferences. Sanjay is a member of the South Florida InfraGard Alliance and Sector Chief for the Information Technology track.
Senior Sales Engineer
Improve security, productivity and user experience through the Okta Identity Cloud
So, there are somewhere between a million and a half and two million apps out there. Right now, the average corporate IT department lets users access maybe 35—because of all the security and admin stuff involved in setting them up.
So how do you make it easier for your company to adopt more great technology—without creating insane security risks. One example of this is using a single sign-on, where you can use one username and password to get into any app. Another example is something called multi-factor authentication, where your computer prompts you for a fingerprint or a special code, to prove it’s you who’s trying to log in.
Join this informative session and hear about different options now available to your company to secure one of your company’s most important asset, the network and give access to the applications that your users require to do their jobs. And you will see first-hand demonstrations of not only how these work, but also how easy it is to configure and manage. This is a don’t miss session.
Justin has worked in the Enterprise Identity and Access Management space since 2002. He began as a java developer on the IBM IAM suite and started an IAM implementation business in 2006. Justin joined Dell SecureWorks in 2011 as an IAM Security Sales Manager and transitioned to the the Quest IAM pre-sales team as a Principal SE in 2013 when Dell acquired Quest. Justin joined Okta in 2017.
Additional tidbits about Justin – He enjoys all things outdoor, baked goods, and small batch bourbons.
Cloud security spanning Private and Public Clouds
As companies begin to use the Cloud more, the pace of growth in malicious attacks, as well as the criticality of keeping an organization’s data protected, are each arguably higher than ever. The need for oversight, visibility, and control, of our apps and data is there, but at what cost.
The question then arises: how can these operational goals be achieved for the entire organization, given the different technology choices between my various private and public clouds? What about when I don’t have operational control of the physical infrastructure or hypervisor, as is the case with most public cloud environments? What can I do to bring these clouds under a single pane of glass?
Security in the World of IoT:
The Convergence of Network Access Control and IoT Security
Ponemon Institute research shows IoT devices are the most challenging technology to secure. With a Gartner estimate that 20 billion IoT devices will be connected by 2020, and projections that 25% of identifiable attacks will involve IoT devices, securing these devices is crucial. This is especially concerning since a recent Ponemon Institute study found 75% of organizations are not confident or have no confidence that they know all of the IoT applications in their network.
Hackers are constantly scanning networks for vulnerabilities, and IoT devices are an easy target. In this session, we’ll discuss how the convergence of networks access control and IoT security can close the security gap caused by these devices.
Juan is an experienced engineer with over 16 years focused in the security industry. His background includes work with the Department of Defense, enterprise consulting, and the last 9 years working on the vendor side. Juan is focused on the FortiNAC product line within Fortinet with over 5 years in the network access control market.