- This event has passed.
June 21 @ 8:00 am - 4:30 pm
The Minneapolis Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cybersecurity Strategies Conference.
MITRE’s ATT&CK Framework: fusing security tools visualization and analytics capabilities to provide granular Cyber Situational Understanding
This presentation will examine a recent case study in the successful fusion of cyber security tools’ inputs that culminated in the indictment and arrest of a senior nation-state hacker using the Adversary Tactics, Techniques & Common Knowledge (ATT&CK) framework developed by MITRE Corporation.
Josh Williams is a cyber security executive with more than 35 years of strong technical and leadership experience, in both the public and private sectors. Vice President and Chief Security Officer for Alliance Technology Group, a global IT Infrastructure Solutions, Data Storage and Cloud Services firm headquartered in the Fort Meade, MD area. Josh conceived and is implementing the first-in-the-nation Cyber Security Apprenticeship Program. Most recently contributed to the successful indictment and apprehension of Yu Pingan, author of the cyber tool used in the Office of Personnel Management breach. His Federal career culminated with command of the lead element, tactical Scientific & Technical Intelligence (S&TI) community responsible for gaining access to and exploiting captured or acquired foreign systems.
Key Account Manager – North America
9 Pitfalls To Avoid When Implementing an IAM Solution
IAM implementations are fraught with both technical and career challenges and dangers. In this 30-minute briefing, we’ll review some of the most common pitfalls encountered by teams implementing IAM solutions and review the best practices in order to avoid them – and be a hero.
Demonstrating the power of the PLUS
Channel Sales Engineer, Arbor Networks
The Impact of DDoS Attacks – The Stakes Have Changed – Are You Prepared??
Distributed Denial of Service (DDoS) attacks have entered a new era! Historically DDoS attacks have used a “brute force” approach to making an online services unavailable by overwhelming your company’s internet connection. The game has changed from the “brute force” approach to a more sophisticated, multi-vector attacks. Your adversaries are patient, launching targeted attacks using deception & “smokescreen” tactics to take down your network. The frequency of DDoS attacked has risen dramatically as well. The emergence of IOT devices has led to larger, more destructive attacks from Lizard Stressor, to Mirai & now Memcache with a 1.7 tbps attack!
DDoS targets wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and presents a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about modern day DDoS attacks and best practices to protect your company against DDoS attacks while providing maximum network availability. “Bandwidth saturation” will impact your business – an attack that exceeds your internet pipe is all it takes. In this new world, “peace time” no longer exists so DDoS protection strategy is critical!
Why attackers love email and what you can do about it
Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Solved: Your Shared Responsibility for Security In the Cloud
When you moved your data to the cloud, your liability for its security did not go with it. Cloud vendors call it the “Shared Responsibility Model” and it describes where their Service Level Agreement stops and your responsibility starts. To make sure there are no gaps between their technology and yours, you need to deploy many of the same tools you would deploy in your own datacenter. You need to deploy them across all your SaaS and you need to manage them across all your cloud assets.
Avanan, The Cloud Security Platform, protects data in any SaaS or IaaS. Partnering with the industry’s most trusted security vendors, it offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, insider threats and more. The cloud-based platform is completely out-of-band and can be deployed in one click. It is the next generation of cloud security.
Director of Presales Engineering, North America
Lead Systems Engineer
The Top Wi-FI Security Mistakes
As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks. So how do different security models stand up to this new reality, and how secure is your connection? In this session, our speaker will cover:
- The top 5 Wi-Fi security mistakes
- Viewing exactly what’s happening on your network
- Building an authentication and encryption model that doesn’t force user workarounds
- Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
- Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional model
Senior Systems Engineer
RTO – Recovery Time Objective/Ransomware/Corruption Protection
Vic Heng has a passion for emergent technologies, with 25+ years of industry experience in a wide range of Enterprise Storage domains. He has worked with Fibre Channel, FICON, iFCP/FCIP, iSCSI, AoE-ATA over Ethernet, DeDuplication, and currently the only time machine for primary storage at Reduxio Systems.
Before joining Reduxio Systems as a Sr. Systems Engineer, Vic worked at global technology companies such as Ancor Communications/QLogic, Nishan Systems/Brocade Systems, Data Domain/Dell EMC, Coraid, Tintri, Qumulo, and Datrium primarily in Solution Engineer/Architect capacities.
Senior Director, North America
End-User Cybersecurity Behaviors: The Importance of Training Beyond the Phish
Phishing has long been a headline threat for infosec teams — but email is just one entry point for cybercriminals. Attendees will learn why it’s important to assess and train their end users about cybersecurity threats beyond email-based social engineering, and see how data insights from knowledge assessments and training activities differ from those related to simulated phishing attacks.
Julie is an infosec professional with over 30 years of experience in helping organizations improve processes and increase competitive advantage with product development, operational efficiency, data management and security. Today, Julie leads efforts in North America to help organizations mitigate cyber risk by implementing cyber security awareness programs that assess end user behavior, provide effective online training to change behavior, and reduce cyber threats.
Transforming Secure Access
As identity theft and credential-based attacks continue to rise, organizations wonder how this can be when they’re investing so much time and effort deploying identity and access management solutions. Unfortunately, despite their best efforts, Identity has become the most consequential attack vector to the modern enterprise. They are essentially outmatched by increasing identity risks. If you’re feeling the pressure, you can’t afford to miss this presentation. Join Murtaza Hafizji of RSA to learn how to transform the way you secure access in the modern enterprise. You’ll learn how identity intelligence, business context and threat intelligence work together to build a strong foundation for secure access and an overall high degree of identity assurance.