Chicago Suburbs (Cybersecurity)
December 12 @ 8:00 am - 5:00 pm
The Chicago Suburbs Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cyber Security Strategies Conference.
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
Protecting Your Data: What You Need to Know about Cloud Security and the Dark Web
Effectively leveraging the cloud is not just about migrating data and applications. Security must travel into the cloud as well. When organizations fail to understand that security in the cloud is a shared responsibility, the consequences can be disastrous (and profitable for threat actors!). In this session, Armor will demonstrate the vulnerability of your unprotected data in the cloud via a real-world experiment using “honeypots” disguised as a healthcare web portal.
You will learn:
- The most likely attacks your organization will face
- How active and dynamic security controls can mitigate risk
- Simple steps you can take to prevent a breach
- Why your data is so valuable on the Dark Web (findings from Armor’s Black Market Report)
Senior Vice President, JLT
Credit, Political, and Security Risks
A nationally recognized expert, Reid joined JLT in 2015 as Senior Vice President, Credit, Political, and Security Risks and JLT’s Cyber Practice after a 22-year career in the U.S. Army. Reid actively advises numerous senior government and industry leaders, with particular emphasis on terrorism, geopolitical, and cyber security risks.
Most recently, he served as the senior intelligence strategist for the Middle East and South Asia at U.S. Central Command, leading the organization’s most elite analytical team, for which he received the Director of National Intelligence Meritorious Unit Citation.
Previously Reid was selected for a prestigious fellowship with the Federal Bureau of Investigation (FBI). During his fellowship year, Reid authored the FBI’s public – private partnership strategy focusing on the intersection of cyber and organizational resiliency. In this role he led the first summit on intellectual property theft through cyber means.
Having founded the nation’s premier counterterrorism research institute, The Combating Terrorism Center at West Point, he led influential national counterterrorism policy reviews and testified before a bicameral Congressional committee hearing. During his career, he deployed to Iraq, Afghanistan, Africa, and Latin America while serving in Special Operations Forces. Reid is also a member of the New York City Fire Department’s Terrorism Task Force, providing subject matter expertise on resiliency, preparedness, and cyber issues for senior leaders in New York City.
The editor of two books on transnational threats and author of numerous articles, Reid was a professor at the United States Military Academy and an adjunct professor at Columbia University’s graduate School of International and Public Affairs for eight years. Lieutenant Colonel (Retired) Sawyer holds a Bachelor of Science degree from the United States Military Academy and a Master of Public Administration from Columbia University.