- This event has passed.
May 3 @ 8:00 am - 4:30 pm
The Chicago Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cybersecurity issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Senior Security Engineer
Notes from Successful SIEM Implementations
Your organization may have a SIEM product already in place or is considering a SIEM product to meet goals such as compliance or logging. Often these solutions are purchased and then partially implemented only to deliver little value and generate a lot of alarms until they become shelf ware. Brad Schaffer will be discussing some considerations of choosing a SIEM product, deploying it, and getting the most out of your organization’s investment. This presentation is vendor agnostic and focuses on the technology related and organizational challenges of deploying a SIEM successfully and what works well and what organizations struggle with.
Brad Schaffer is a Sr. Security Engineer with Nexum Inc in Chicago and has been working in the IT Security field since 2006. Brad’s primary focus is working with customers to deploy SIEM implementations and correct implementations gone wrong to deliver value to customers. Additionally, Brad works with endpoint security products across multiple vendors and is passionate about using automation alongside SIEM systems to ease delayed responses and manual processes when handling security incidents.
Making Networking Cloud Relevant
Channel Sales Engineer
The Impact of DDoS Attacks – The Stakes Have Changed – Are You Prepared??
Distributed Denial of Service (DDoS) attacks have entered a new era! Historically DDoS attacks have used a “brute force” approach to making an online services unavailable by overwhelming your company’s internet connection. The game has changed from the “brute force” approach to a more sophisticated, multi-vector attacks. Your adversaries are patient, launching targeted attacks using deception & “smokescreen” tactics to take down your network. The frequency of DDoS attacked has risen dramatically as well. The emergence of IOT devices has led to larger, more destructive attacks from Lizard Stressor, to Mirai & now Memcache with a 1.7 tbps attack!
DDoS targets wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and presents a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about modern day DDoS attacks and best practices to protect your company against DDoS attacks while providing maximum network availability. “Bandwidth saturation” will impact your business – an attack that exceeds your internet pipe is all it takes. In this new world, “peace time” no longer exists so DDoS protection strategy is critical!
Win Big with IT Resilience
In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.
Why attackers love email and what you can do about it
Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Vice President, Sales
A “Friction-less” Future: Prevent Cybersecurity Breach and Create a Better Experience for Users, CISOs, and Administrators
Protecting against unauthorized access and IT breach is complex. All too often, enterprises must choose between (1) security, (2) a better user experience or (3) a better operational experience. Our speaker will use case studies to illustrate how companies can achieve all three objectives.
You’ll learn about five keys to this “friction-less” future:
- Authentication goes beyond the trusted identification of users. Machines and digital interactions must be genuine and trusted too.
- Despite the rise of mobile credentials, no single credential fits all. A diverse population requires a mix of enterprise credentials.
- Leveraging 3rd party credentials, such as government-issued driver licenses, is a cost-effective path to identity proofing.
- Proper management of the credential lifecycle maintains the right levels of assurance and trust.
- In order for a growing company to scale, a dedicated enterprise-ready PKI is critical. (P.S. PKI is not the problem. Managing it is.)
Philippe leads all channel sales and sales enablement, such as training, field sales marketing and channel support. He is a seasoned sales and business strategy executive with extensive experience in Two-Tier Sales models and brings to Axiad IDS over 17 years of global experience in three continents and in various channel-supporting roles. Prior to joining Axiad IDS, Philippe led large sales and channel operations programs at Cisco, managed channel marketing at Force10 and led WW channel marketing for networking and converged platforms at Dell.
Reducing Cyber Exposure for the Modern Attack Surface
Alexander has been working in the information security space for over 20 years in technical roles at ISS, IBM, Q1 Labs, Qualys, Sourcefire, and Tenable. He is passionate about vulnerability management and going back to the fundamentals for measuring risk.
Solved: Your Shared Responsibility for Security In the Cloud
While you moved your data to the cloud, your liability for its security did not go with it. Cloud vendors call it the “Shared Responsibility Model” and it describes where their Service Level Agreement stops and your responsibility starts. To make sure there are no gaps between their technology and yours, you need to deploy many of the same tools you would deploy in your own datacenter. You need to deploy them across all your SaaS and you need to manage them across all your cloud.
Avanan, The Cloud Security Platform, protects data in any SaaS. Partnering with the industry’s most trusted security vendors, it offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, insider threats and more. The cloud-based platform is completely out-of-band and can be deployed in one click.
It is the next generation of cloud security.
Director of Product Management
AI/ML/NLP ENDPOINT PREVENTION: A Cognitive Approach to Prevent Execution of Never Seen Before Malware
Cybercrime is an exponentially growing threat to the world’s businesses, governments, and citizens. Attackers have been easily evading signature-based antivirus solutions for years. Making matters worse, the exponential growth in both connected devices and malware are overwhelming the capacity of enterprise security teams. Organizations are being asked to secure IT, Mobility, IoT, and OT assets all while staying on top of the latest zero-day and polymorphic threats. A new approach is needed to keep up with the evolving cybersecurity landscape.To that end, we’ve leveraged artificial intelligence to detect and prevent threats at machine scale, redefining how endpoint security protects an organization. We’ll be discussing how we built this cognitive engine, how it works, and how it could change the landscape of cybersecurity.
Bryan has 20 years of experience in enterprise technology with a focus on cloud computing, security and big data analytics. Currently, he leads the security products team at SparkCognition where we are leveraging the power of artificial intelligence to reinvent how enterprise and IoT devices are protected from global cyber threats.
Prior to SparkCognition, Bryan led the Advanced Product Planning and Innovation team at Dell Technologies and worked in the Global Technology Strategy Practice of Management Consulting firm Strategy&. He holds a B.S degree from Purdue University and an MBA from University of Texas – McCombs School of Business.
Does Your Time to First Byte Bite?
The Top Wi-FI Security Mistakes
As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks. So how do different security models stand up to this new reality, and how secure is your connection? In this session, our speaker will cover:
- The top 5 Wi-Fi security mistakes
- Viewing exactly what’s happening on your network
- Building an authentication and encryption model that doesn’t force user workarounds
- Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
- Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
Data Center Attack: The Game
In this session we will put you in the shoes of a CISO at a hospital to see if you can go back in time to prevent a data center attack from holding critical patient data hostage. See if you have the knowledge it takes to stop a data center attack, and if not, learn what defenses you need to prevent one.
You will be prompted to make decisions that will impact your security posture. Wrong choices could result in ransomware hijacking your patient data and putting lives at risk. Right choices will show you what happens with DevOps and IT work together, will allow doctors to see patient data, and the hospital will run as expected.
After we finish the game, we will review the changing data center and threat landscape and measures you can take to prevent, detect, and respond to emerging cyber attacks.