Loading Events

« All Events

Orlando (Cybersecurity)

November 8 @ 8:00 am - 5:00 pm

Event Navigation

Details

Date:
November 8
Time:
8:00 am - 5:00 pm
Event Category:

Venue

Doubletree Orlando Downtown
60 South Ivanhoe Boulevard
Orlando, FL 32804
United States
  + Google Map
Phone:
407-425-4455
Website:
http://doubletree3.hilton.com/en/hotels/florida/doubletree-by-hilton-hotel-orlando-downtown-MCOODDT/index.html

Overview

The Orlando Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

8:45am - 9:15amSession One
9:15am - 9:45amSession Two

Liz Leon
Solution Engineer

Cyber Exposure – The Next Frontier

The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program. Join our session to learn how CISOs can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.

Download the Presentation

Speaker’s Bio:

Liz Leon has been with Tenable for the four years, most recently serving as a solution engineer. Liz specializes in security implementations and solutions planning. Throughout her time in engineering, she has helped countless companies gain visibility over their cyber exposure using Tenable’s solutions.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amKeynote Session

Mauricio Angee, CISSP
Chief Information Security Officer, Director of IT Security

Mount Sinai Medical Center

Speaker’s Bio:

Mauricio Angée is a Certified Information Systems Security Professional (CISSP) with over 30
years of experience in healthcare, banking and financial services, hospitality, entertainment, and the government sector, with a strong background in cybersecurity, information assurance, privacy, regulatory compliance, and risk management.

Mauricio currently serves as Chief Information Security Officer (CISO) at Mount Sinai Medical
Center in Miami, Fl., where he is responsible for setting the roadmap and strategy for the
protection of information assets and patient information. Prior to joining Mount Sinai, he served as Vice President of Information Security at Mercantil Bank and was the acting Chief Information Security Officer at Universal Orlando Parks and Resorts (Universal Studios Florida). Mauricio also served as an Information Systems Security Officer (ISSO) at Harris Corporation supporting the Federal Aviation Administration (FAA) Telecommunications Infrastructure (FTI), and the US Census Bureau. In his ISSO role, he successfully coordinated the security certification and accreditation activities, and developed the incident response capabilities. Mr. Angée was the Computer Security Official (CSO) for Northrop-Grumman at the National Aeronautics and Space Administration (NASA) at the Kennedy Space Center, FL., where he supported the Kennedy Integrated Communications Services (KICS) contract.
Mauricio currently serves in the Board of Directors, and the FBI- Infragard information sharing
group of South Florida, and the South Florida CISO Council. Mauricio is one of the most influential security professionals in his field. With his leadership skills and extensive experience, he has made significant contributions to the information security community. He was nominated for the CISO of the Year Award by the EC Council in 2013.

Mauricio is currently pursuing his Doctorate degree in Business with concentration in Information Security at St. Thomas University. He received his master’s degree in computer and Information science with concentration in Information Security from Nova Southeastern University. He is currently an adjunct faculty at Florida International University and St. Thomas University.

10:45am - 11:15amSession Four
11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five
12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six
1:00pm - 1:45pmSession Seven

Rolando Panez
Cloud Architect

Another Cloud Discussion!?!?! – Security in Cloud Environments Exposed

This presentation is based on a whitepaper, The Importance of modern IT-Security in private and public Cloud Environments by Nils Schäfer, a Security Engineer at Check Point Software Technologies.  The author uses honeypot deployment in a cloud environment with basic cloud security controls enabled.  The data generated by the honeypot shows how vulnerable cloud environments can be.  We also discuss how the cyber kill chain applies to cloud environments.

Download the Presentation

Speaker’s Bio:

Rolando is a Cloud Architect at Check Point. He has seven years of experience as a Security Engineer covering large enterprise accounts in Florida.  He has advised customers on Check Point Software security solutions for a variety of platforms including endpoint, datacenter, cloud and mobility.

1:45pm - 2:00pmBreak/ Vendor Booth Time
2:00pm - 2:30pmSession Eight
2:30pm - 3:00pmSession Nine
3:00pm - 3:15pmBreak/ Vendor Booth Time
3:15pm - 4:00pmSession Ten
4:00pm - 4:30pmSession Eleven

Don Byrne

How They Bypass Office 365 Security

The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.

During this session, we’ll demonstrate how to protect Office 365 from:

  • Email-based phishing, spoofing, and malware
  • Account takeover, insider threats, compromised Microsoft credentials
  • Loss of sensitive data from OneDrive, SharePoint and Office 365

Sponsors