Ft. Lauderdale (Cybersecurity)
December 13 @ 8:00 am - 5:00 pm
The Ft. Lauderdale Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Cybersecurity Strategies Conference.
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
Segmentation Made Simple
Most networks are really good at making you feel overwhelmed, ill-equipped and exposed. Meanwhile, you’re being tasked with connecting virtually every ‘thing’, including machines and endpoints never intended to be networked. How can you securely connect such a wide array of distributed systems, devices, and equipment at scale?
The practical way forward is networking endpoints with provable identities using automated, policy-based orchestration for enterprise scale. Now, local and wide area micro-segmentation is not only possible, but simple.
As more machines require secure connectivity, networking seems to have become a black magic, since it’s impossible to give every device its own unique IP address. There’s an assortment of workarounds using multi-NAT environments, or Carrier Grade NAT, but it’s now virtually impossible to punch through and connect distributed systems. IP address limitations are prohibitive, making functions such as cloud peering between VPCs virtually impossible.
In this session, you’ll learn how to overcome previously impossible networking hurdles by giving your machines and endpoints a unique and provable identity. You can now easily and instantly provision, connect, disconnect, failover, or quarantine any connected resource using simple point-and-click orchestration for all your ‘things’ – on the ground, on the move, or in the cloud.