- This event has passed.
San Antonio (Cybersecurity)
May 31 @ 8:00 am - 5:00 pm
The San Antonio Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cybersecurity Strategies Conference.
7 Security Mindsets to Adopt Today
It can be easy to get caught up in thinking if you just had that new shiny device, your network security burden would be lighter. The reality is that no one device can solve your problem, and these days it takes a completely new perspective to tackle security in the real world. In this presentation, we’ll discuss 7 security mindsets – some new, some old – and how they can help you make smarter, more practical decisions about protecting your network.
VP of Services
It’s undeniable, one of the easiest and most effective ways for attackers to gain access to your critical systems and sensitive data is simply to ask for it. In this presentation, I will discuss some steps that can be taken to help mitigate this risk through detection of credential theft, enforcing device & identity authentication and restricting lateral movement of attackers.
Ricky Allen is the VP of Services for Critical Start Inc. and President of the South Texas ISSA chapter. He holds certifications such as SABSA Security Architecture, CISSP, CISA, and Six Sigma. Ricky previously held roles at Accenture as an executive in their strategic information security consulting practice and at HP Enterprise Security Products as the practice lead for developing Security Operations programs for ArcSight SIEM products. Ricky was focused on retail and manufacturing industries while at PricewaterhouseCoopers where he performed penetration testing and risk assessments for companies across the US. Ricky has presented at conferences such as BSides, Black Hat, API Cybersecurity, HOU.SEC.CON, SANS, SecureWorld, and Data Connectors. Ricky is based in Houston, TX and has a degree in Management Information Systems from Texas A&M University.
Evolution of Security
Gone are the times where traditional perimeter security saved the day. In today’s fast paced IT environment, companies are discovering the traditional methods aren’t cutting it alone. Join Secure Data Solutions and Arctic Wolf Networks to discuss the challenges of managing a complex security environment and how to get actionable results.
Turtles, Trust, and the Future of Cybersecurity
Faith in our institutions is collapsing, and GDPR is at the door. What would cybersecurity look like if we started from scratch, right now, in our hybrid, interdependent world? It would focus relentlessly on data. Learn how a data-centric security approach can reduce risk, increase efficiency and re-engineer trust in a society where faith has been shaken by unstoppable breaches.
Sonya Wilcox brings over 15 years of IT industry experience to Varonis, a company specializing in Data Governance and User Behavior Analytics. As a Systems Engineer for Varonis’s public sector in the TOLA region, she works closely with organizations to understand the value of digital assets and the importance of data classification as part of an overall data security profile. Sonya’s past experience includes architecting and implementing secure, redundant messaging and Active Directory systems for large enterprises. Sonya will share commonsense insight into how organizations identify and solve the often overlooked challenges related to risk associated with manual process used to enforce data classification, user authentication, permissions access & authorization, and accountability controls.
Why attackers love email and what you can do about it
Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Mitch Chapman is a cyber security industry veteran with over 18 years of experience. As a Sales Engineer at Mimecast he works closely with customers to architect, demonstrate and deliver industry leading security, archiving and continuity cloud services to protect their business email. Email Security is Mitch’s passion and, as the threat landscape evolves, he spends his time understanding the anatomy of attacks. Mitch has been involved in cyber security initiatives encompassing endpoint, network, cloud, and email spanning across organizations from Fortune 1 to 500.
Tales from the Dark Side and How to Thwart Your Enemy
Building a fully secure Enterprise Grade network in 40 hours!?! You must be crazy! Highlights and adventures from an experienced hacker who secures the most malicious networks on the planet.
Steve’s focus is always on security and making networks more secure; the words “Open a Port on the Firewall” will make his temperature rise. Steve has excelled in the Information Security field with many hours spent in Research and Development to always keep up with the ever-changing threats to Information Systems and particularly sensitive data.
Steve’s technical know-how, practical experience hacking, pentesting, teaching and hands on approach to management is always admired by many in his profession, often being asked to mentor others and teach the methodologies he deploys in Network Security Architecture and Administration.
Steve also serves on the board for UtahSec, 801 Labs and DC801; Steve is heavily involved in the hacker community.
Steve is the Lead Network & Security Architect for the Black Hat Conference and has worked in the NOC at Black Hat and RSAC SOC defending the network against some of the most malicious traffic on the planet.
Steve recently joined RSA’s Threat Detection and Response division.
Nick Hensley, CISSP
Reducing Cyber Exposure for the Modern Attack Surface
Cybercrime Tactics and Techniques: The State of Malware.
With major outbreaks of ransomware like WannaCry and NotPetya, hackers have had a huge impact on businesses. Join Malwarebytes and take a deep dive into the threats that not only grabbed our attention but the world’s attention and hear what’s trending today.
AI/ML/NLP ENDPOINT PREVENTION: A Cognitive Approach to Prevent Execution of Never Seen Before Malware
Cybercrime is an exponentially growing threat to the world’s businesses, governments, and citizens. Attackers have been easily evading signature-based antivirus solutions for years. Making matters worse, the exponential growth in both connected devices and malware are overwhelming the capacity of enterprise security teams. Organizations are being asked to secure IT, Mobility, IoT, and OT assets all while staying on top of the latest zero-day and polymorphic threats. A new approach is needed to keep up with the evolving cybersecurity landscape.To that end, we’ve leveraged artificial intelligence to detect and prevent threats at machine scale, redefining how endpoint security protects an organization. We’ll be discussing how we built this cognitive engine, how it works, and how it could change the landscape of cybersecurity.
Rick Pither runs global security sales for SparkCognition. In this role, he is responsible for driving sales of the cutting-edge AI-powered cybersecurity platform the company deploys.
Areas of specialty include IT cybersecurity, virtualization, hybrid cloud, protocol analysis and network management.
Prior to SparkCognition, Pither held various executive positions at McAfee, VMware, and Secureworks over his 24 year career. He has spoken at numerous conferences and summits, most recently at the Association of Anti-Money Laundering Specialists conference.
Pither earned his bachelor’s degree in management and marketing from Purdue University.
How to Operationalize Big Data Security Analytics
Big-data security analytics is radically transforming data protection. Interset’s own, Roy Wilds, will delve into examples of how companies have successfully deployed security analytics. He will also address how to choose the correct technology, fit it into existing security operations, and define success metrics to measure results.
Roy is a Field Data Scientist with Interset, working with customers to identify new data sources that can be incorporated into Interset’s advanced security analytics software. He holds a PhD in Applied Mathematics from McGill University, and has been applying advanced statistical methods to analyze data for over 10 years: early on as a data miner, and more recently in the capacity of a data scientist.
Mobility, it is not just a technology; it is a mindset and more and more a way of life today.
Mobility, mobile technology, our dependence and interdependence upon them is growing every single day, but we are ignoring the vulnerabilities and inherent security gaps that come with the race to something new and innovative. Many profess that the explosion of mobile device availability and use is one of the single most empowering aspects of technology to happen in the last three decades.
Then why are mobile devices so unsecure?
Why, do we simply accept that?
How did we get to this point?
Let us look at the brief history of the “mobility” mindset, where we are today, what we can expect in the future, and how we can better secure ourselves, and our enterprises.
Bob Riley’s experience in information technology and security started over 30 years ago in the United States Marine Corps, where he served for over 12 years on active duty as an electronics, communications, and surveillance maintenance chief, instructor and inspector for the Headquarters Marine Corps Inspector General. In his current position Bob serves as a Mobile Security Expert for Check Point Software Technologies, were he works closely with organizations to help them secure the mobile endpoint and implement “common sense” security best practices for mobile devices. To that position Bob brings over two decades of Fortune 500 experience doing the same through the evolutions of Mobile, Security, and IT itself. Bob holds several specific and several industry agnostic Information Security certifications to include the CISSP, CCSP, CRISC and the ITILv3F.
Technical Product Development Manager
The Anatomy of a Phish
All it takes is a click, a single click, that could set off a hazardous chain reaction putting your company at risk. Phishing is the #1-way hackers install malware, ransomware, and perform unauthorized data exfiltration on your network. High-end technology will stop some phishing attempts from hitting your employee’s mailboxes, but what about the complex crafted emails that slip through?
In this presentation, Mariah Tree, Inspired eLearning’s Technical Product Development Manager, assumes the role of a bad-actor and dissects the thought process around building effective phishing mails. Armed with this knowledge, you will be better equipped to discuss with your employees about phishing scams, how to detect them, and ultimately how to build a security first strategy to protect your organization from being the next to fall victim to a cyberattack.