Loading Events

« All Events

Chicago (Cybersecurity)

May 3 @ 8:00 am - 5:00 pm

Event Navigation

Details

Date:
May 3
Time:
8:00 am - 5:00 pm
Event Category:

Venue

The Drake Hotel
140 East Walton Place
Chicago, IL 60611
United States
  + Google Map
Phone:
(312) 787-2200
Website:
http://www.thedrakehotel.com/explore

Overview

The Chicago Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cybersecurity issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

8:45am - 9:15amSession One
9:15am - 9:45amSession Two

Victor Marte

Making Networking Cloud Relevant

Download the Presentation

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Rob Pollock
Channel Sales

The Impact of DDoS Attacks – The Stakes Have Changed – Are You Prepared??

Distributed Denial of Service (DDoS) attacks have entered a new era!  Historically DDoS attacks have used a “brute force” approach to making an online services unavailable by overwhelming your company’s internet connection. The game has changed from the “brute force” approach to a more sophisticated, multi-vector attacks.  Your adversaries are patient, launching targeted attacks using deception & “smokescreen” tactics to take down your network.  The frequency of DDoS attacked has risen dramatically as well.  The emergence of IOT devices has led to larger, more destructive attacks from Lizard Stressor, to Mirai & now Memcache with a 1.7 tbps attack!

DDoS targets wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and presents a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about modern day DDoS attacks and best practices to protect your company against DDoS attacks while providing maximum network availability.  “Bandwidth saturation” will impact your business – an attack that exceeds your internet pipe is all it takes.  In this new world, “peace time” no longer exists so DDoS protection strategy is critical!

10:45am - 11:15amSession Four

Kelsey Barrasso
Account Executive

Win Big with IT Resilience

In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.

Download the Presentation

Speaker’s Bio:

Kelsey is an Account Executive at Zerto helping clients solve problems focused towards reducing risk and exposure to an organization’s treasured data sets with business continuity through Zerto’s platform.  Zerto’s award-winning solution provides enterprises with continuous data replication & recovery designed specifically for virtualized infrastructures and cloud environments.

Kelsey has 10 years of experience in information technology covering a wide range of solutions in this time and ultimately focuses towards helping her clients succeed.

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Steve Heaney
Account Executive

Why attackers love email and what you can do about it

Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?

In this session, you’ll learn:

  • How your email can be used as an entry point for multiple types of attack
  • The damaging impact attacks have on organizations
  • Why your employees could be the weakest link in your email security
  • How to enhance your email security and thus your overall cyber resilience
12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Philippe Duchamp 
Vice President, Sales

A “Friction-less” Future:  Prevent Cybersecurity Breach and Create a Better Experience for Users, CISOs, and Administrators

Protecting against unauthorized access and IT breach is complex. All too often, enterprises must choose between (1) security, (2) a better user experience or (3) a better operational experience. Our speaker will use case studies to illustrate how companies can achieve all three objectives.

You’ll learn about five keys to this “friction-less” future:

  • Authentication goes beyond the trusted identification of users. Machines and digital interactions must be genuine and trusted too.
  • Despite the rise of mobile credentials, no single credential fits all. A diverse population requires a mix of enterprise credentials.
  • Leveraging 3rd party credentials, such as government-issued driver licenses, is a cost-effective path to identity proofing.
  • Proper management of the credential lifecycle maintains the right levels of assurance and trust.
  • In order for a growing company to scale, a dedicated enterprise-ready PKI is critical. (P.S. PKI is not the problem. Managing it is.)

Download the Presentation

Speaker’s Bio:

Philippe leads all channel sales and sales enablement, such as training, field sales marketing and channel support. He is a seasoned sales and business strategy executive with extensive experience in Two-Tier Sales models and brings to Axiad IDS over 17 years of global experience in three continents and in various channel-supporting roles. Prior to joining Axiad IDS, Philippe led large sales and channel operations programs at Cisco, managed channel marketing at Force10 and led WW channel marketing for networking and converged platforms at Dell.

1:00pm - 1:30pmSession Seven

Alexander Crepas
Channel SE

Reducing Cyber Exposure for the Modern Attack Surface

Download the Presentation

Speaker’s Bio:

Alexander has been working in the information security space for over 20 years in technical roles at ISS, IBM, Q1 Labs, Qualys, Sourcefire, and Tenable. He is passionate about vulnerability management and going back to the fundamentals for measuring risk.

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

Michael Herring

Solved: Your Shared Responsibility for Security In the Cloud

While you moved your data to the cloud, your liability for its security did not go with it. Cloud vendors call it the “Shared Responsibility Model” and it describes where their Service Level Agreement stops and your responsibility starts. To make sure there are no gaps between their technology and yours, you need to deploy many of the same tools you would deploy in your own datacenter. You need to deploy them across all your SaaS and you need to manage them across all your cloud.

Avanan, The Cloud Security Platform, protects data in any SaaS. Partnering with the industry’s most trusted security vendors, it offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, insider threats and more. The cloud-based platform is completely out-of-band and can be deployed in one click.
It is the next generation of cloud security.

2:15pm - 2:45pmSession Nine
2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:30pmSession Ten

Rick Pither
Global Security Sales and OEM

AI/ML/NLP ENDPOINT PREVENTION: A Cognitive Approach to Prevent Execution of Never Seen Before Malware

Cybercrime is an exponentially growing threat to the world’s businesses, governments, and citizens. Attackers have been easily evading signature-based antivirus solutions for years. Making matters worse, the exponential growth in both connected devices and malware are overwhelming the capacity of enterprise security teams. Organizations are being asked to secure IT, Mobility, IoT, and OT assets all while staying on top of the latest zero-day and polymorphic threats. A new approach is needed to keep up with the evolving cybersecurity landscape.To that end, we’ve leveraged artificial intelligence to detect and prevent threats at machine scale, redefining how endpoint security protects an organization. We’ll be discussing how we built this cognitive engine, how it works, and how it could change the landscape of cybersecurity.

Speaker’s Bio:

Rick Pither runs global security sales for SparkCognition. In this role, he is responsible for driving sales of the cutting-edge AI-powered cybersecurity platform the company deploys.
Areas of specialty include IT cybersecurity, virtualization, hybrid cloud, protocol analysis and network management.
Prior to SparkCognition, Pither held various executive positions at McAfee, VMware, and Secureworks over his 24 year career. He has spoken at numerous conferences and summits, most recently at the Association of Anti-Money Laundering Specialists conference.
Pither earned his bachelor’s degree in management and marketing from Purdue University.

3:30pm - 4:00pmSession Eleven

Al Sterling
Solutions Engineer

Does Your Time to First Byte Bite?   

Download the Presentation

4:00pm - 4:30pmSession Twelve

The Top Wi-FI Security Mistakes

As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks. So how do different security models stand up to this new reality, and how secure is your connection? In this session, our speaker will cover:

  • The top 5 Wi-Fi security mistakes
  • Viewing exactly what’s happening on your network
  • Building an authentication and encryption model that doesn’t force user workarounds
  • Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
  • Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
4:30pm - 5:00pmSession Thirteen

Vitaliy Shtym
Sales Engineer

Data Center Attack: The Game

In this session we will put you in the shoes of a CISO at a hospital to see if you can go back in time to prevent a data center attack from holding critical patient data hostage. See if you have the knowledge it takes to stop a data center attack, and if not, learn what defenses you need to prevent one.

You will be prompted to make decisions that will impact your security posture. Wrong choices could result in ransomware hijacking your patient data and putting lives at risk. Right choices will show you what happens with DevOps and IT work together, will allow doctors to see patient data, and the hospital will run as expected.

After we finish the game, we will review the changing data center and threat landscape and measures you can take to prevent, detect, and respond to emerging cyber attacks.

Sponsors