Loading Events

« All Events

Chicago Suburbs (Cybersecurity)

December 12 @ 8:00 am - 5:00 pm

Details

Date:
December 12
Time:
8:00 am - 5:00 pm
Event Category:

Venue

Hyatt Regency O’Hare
9300 Bryn Mawr Avenue
Rosemont, IL 60018
United States
  + Google Map
Phone:
847 696 1234
Website:
https://www.hyatt.com/en-US/hotel/illinois/hyatt-regency-ohare/chiro

Overview

The Chicago Suburbs Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cyber Security Strategies Conference.

8:45am - 9:15amSession One
9:15am - 9:45amSession Two
9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 11:00amSession Three
11:00am - 11:30amSession Four
11:30am - 12:00pmBreak / Vendor Booth Time / Lunch
12:00pm - 12:30pmSession Five

Steve Shelton  

How They Bypass Office 365 Security

The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.

During this session, we’ll demonstrate how to protect Office 365 from:

  • Email-based phishing, spoofing, and malware
  • Account takeover, insider threats, compromised Microsoft credentials
  • Loss of sensitive data from OneDrive, SharePoint and Office 365
12:30pm - 12:45pmBreak / Vendor Booth Time
12:45pm - 1:15pmSession Six

Thomas Scott
Solutions Consultant

Protecting Your Data: What You Need to Know about Cloud Security and the Dark Web

Effectively leveraging the cloud is not just about migrating data and applications. Security must travel into the cloud as well. When organizations fail to understand that security in the cloud is a shared responsibility, the consequences can be disastrous (and profitable for threat actors!). In this session, Armor will demonstrate the vulnerability of your unprotected data in the cloud via a real-world experiment using “honeypots” disguised as a healthcare web portal.

You will learn:

  • The most likely attacks your organization will face
  • How active and dynamic security controls can mitigate risk
  • Simple steps you can take to prevent a breach
  • Why your data is so valuable on the Dark Web (findings from Armor’s Black Market Report)
1:15pm - 1:45pmSession Seven
1:45pm - 2:00pmBreak / Vendor Booth Time
2:00pm - 2:45pKeynote Session

Reid Sawyer
Senior Vice President, JLT
Credit, Political, and Security Risks

Speaker’s Bio:

A nationally recognized expert, Reid joined JLT in 2015 as Senior Vice President, Credit, Political, and Security Risks and JLT’s Cyber Practice after a 22-year career in the U.S. Army. Reid actively advises numerous senior government and industry leaders, with particular emphasis on terrorism, geopolitical, and cyber security risks.

Most recently, he served as the senior intelligence strategist for the Middle East and South Asia at U.S. Central Command, leading the organization’s most elite analytical team, for which he received the Director of National Intelligence Meritorious Unit Citation.

Previously Reid was selected for a prestigious fellowship with the Federal Bureau of Investigation (FBI).  During his fellowship year, Reid authored the FBI’s public – private partnership strategy focusing on the intersection of cyber and organizational resiliency.  In this role he led the first summit on intellectual property theft through cyber means.

Having founded the nation’s premier counterterrorism research institute, The Combating Terrorism Center at West Point, he led influential national counterterrorism policy reviews and testified before a bicameral Congressional committee hearing. During his career, he deployed to Iraq, Afghanistan, Africa, and Latin America while serving in Special Operations Forces. Reid is also a member of the New York City Fire Department’s Terrorism Task Force, providing subject matter expertise on resiliency, preparedness, and cyber issues for senior leaders in New York City.

The editor of two books on transnational threats and author of numerous articles, Reid was a professor at the United States Military Academy and an adjunct professor at Columbia University’s graduate School of International and Public Affairs for eight years. Lieutenant Colonel (Retired) Sawyer holds a Bachelor of Science degree from the United States Military Academy and a Master of Public Administration from Columbia University.

Sponsors