- This event has passed.
St. Louis (Cybersecurity)
October 4 @ 8:00 am - 5:00 pm
The St. Louis Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cybersecurity Strategies Conference
Evasion, the Hidden Risk
In the world of cyber security there is no time to waste. Unknown threats keep security professionals busy around the clock, and the sense of urgency never fades. Security professionals struggle with securing their network, deploying a vast array of cyber security tools. But, instead of relieving their stress, every new tool creates another constant stream of alerts, often wasting the security teams’ time and increasing their frustration.
Even worse, the whole time they are chasing these alerts, everywhere they turn, they are being told that a breach is inevitable. It’s no wonder security professionals always feel like they’re playing catch up, chasing after malware that has already infiltrated their systems, never knowing where or when the next attack will come. Something had to change.
Minerva is an innovative endpoint security solution provider that protects enterprises from today’s stealthiest attacks without the need to detect threats first, all before any damage has been done. Minerva Anti-Evasion Platform blocks unknown threats which evade existing defenses by deceiving the malware and controlling how it perceives its environment. Without relying on
signatures, models or behavioral patterns, Minerva’s solution deceives the malware and causes it to disarm itself, thwarting it before the need to engage costly security resources. Minerva boosts customers’ existing defenses without the need to embark upon a costly and risky overhaul of their entire endpoint security architecture.
Channel Sales Engineer
Fighting Back Against CryptoJacking
Cryptojacking has erupted onto the cybercrime scene, thanks to the surge in value of cryptocurrencies such as Bitcoin, Monero, and Ethereum. Use this campaign to start new security conversations, demonstrate your expertise, and create opportunities for Sophos solutions.
Crooks are aggressively targeting laptops, desktops, servers, and even mobile devices. From a single device to entire networks, they infect as many devices as they can to mine for cryptocurrency on, or while using, other people’s computers. Simply put, you do the work, pay for the electricity and hardware, and they pocket the rewards.
Join us to learn how to fight back! We’ll explore the differences between legitimate mining and cryptojacking; how cryptojacking works; the costs of cryptojacking to today’s organizations; and practical steps you can take to avoid being a victim of cryptojacking.
Director of Security Architecture
Applying Zero-Trust to Data Analytics
Zero-Trust is rapidly becoming a buzzword used throughout the security community with few actually applying it correctly. Originally developed for implementation towards users, where else can this disruptive ideology be applied?
With headcount shortage being the number 1 problem faced in security, many companies still rely on legacy analytic methods that often result in 100’s of 1000’s of false positives to be triaged by non-existent security team. In this talk, we’ll discuss the legacy model of security analytics, and an implementation of Zero-trust applied to events to solve the problem of high-efficacy event filtration.
Randy Watkins is passionate about security. A respected author and speaker on cybersecurity trends, Randy is well versed in how to apply security technologies in practical and meaningful ways to improve vulnerability management and security infrastructure. Randy holds numerous security certifications, including CEH (certified ethical hacker). He has a keen understanding of the complexities of system architecture, as well as how emerging technologies complement existing solutions. Randy holds a Bachelor’s Degree in Information Systems Security and an Associate Degree in Computer Networking Systems.
Central Region Channel Sales
The Changing Landscape of DDoS Attacks – Advanced DDoS Is Here – Are You Ready?
Distributed Denial of Service (DDoS) attacks have entered a new era! Historically DDoS attackers have used a “brute force” approach to making an online services unavailable by overwhelming your company’s internet connection. DDoS targets wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and presents a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Brute force attacks have morphed into more sophisticated, multi-vector attacks. Your adversaries are patient, launching targeted attacks using deception & “smokescreen” tactics to take down your network. The frequency of DDoS attacked has risen dramatically as well. The emergence of IOT devices has led to larger, more destructive attacks from Lizard Stressor, to Mirai & now Memcache. 2018 has seen the first DDoS exceeding I tbps! (1.3 tbps & 1.7 tbps attacks)
Arbor will discuss the misconceptions & facts about modern day DDoS attacks and best practices to protect your company against DDoS attacks while providing maximum network availability. “Bandwidth saturation” will impact your business – an attack that exceeds your internet pipe is all it takes. In this new world, “peace time” no longer exists so having a DDoS protection strategy is critical! With 30+% of DDOS attacks causing havoc at the Application Layer with potential data exfiltration, the stakes could not be higher.
James Hope, STL FBI
Supervisory Special Agent- Cyber Squad
Why attackers love email and what you can do about it
Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Andy Cotton is a Senior Account Executive for Mimecast, based out of Kansas City. Andy has been in the Cyber Security space for over 5 years and has a strong background in providing cyber security solutions for his customers. Andy spent 3 years at FireMon, a firewall management software company headquartered out of Overland Park, KS. Since making the move to Mimecast a year and a half ago, Andy has been instrumental in growing our Midwest Enterprise business.
Autonomous Cyber Defense: AI and the Immune System Approach
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network – before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
In this session, learn:
- How new machine learning and mathematics are automating advanced cyber defense
- Why full network visibility allows you to detect and autonomously respond to threats
- How smart prioritization and visualization of threats allows for better resource allocation and lower risk
Real-world examples of unknown threats detected by ‘immune system’ technology
Proactive Perimeter Deception & Tactics
As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader. Frank also is co-inventor of a patent issued for selectively regulating network traffic. Frank is an experienced network engineer and prior to PacketViper, held senior IT network management roles at Liberty USA, Partner and Director of Libcom Internet Services ISP, Sr Network/Systems Engineer and PM for business such as The Future Now, CompuCom, and Xerox Connect. Frank holds a BS in Technical Management from Embry-Riddle University and is a decorated veteran of the US Army.
A new approach to email security for Office 365
For hackers, Office 365 is the new black!
Because a simple set of Office 365 credentials can give you access to sensitive documents, applications and confidential business information, Office 365 is now the go-to place for cybercriminals looking to make a fast and high profit.
Each day these hackers implement new and always more creative phishing and spear-phishing attacks, that easily bypass the traditional email security solutions.
Discover what their techniques are, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Transforming Secure Access for Improved Identity Assurance
As identity theft and credential-based attacks continue to rise, organizations are left wondering what they can do differently to protect access to their critical resources and data. If you’re looking for a new approach – one that minimizes identity risk and enables your business to be open and agile – then you can’t afford to miss this presentation. Join Tony Karam of RSA to learn how to transform the way you secure access to the modern digital enterprise.
Tony Karam is currently a Senior Consultant for Identity Product Marketing at RSA. A big believer that security “takes a village”, Tony brings to his role more than 15 years of B2B information security experience – including previously leading RSA’s global authenticator strategy. Prior to his return to RSA, Tony held various senior-level marketing and product management roles at BeyondTrust, Positive Technologies and Wave Systems.
Regional Sales Director
TCVM: A New Approach to Targeting Risk with Context-Aware Vulnerability Management
Improve vulnerability prioritization by combining threat signatures and vulnerability data
Threat–centric vulnerability management (TCVM) takes a fundamentally new approach to significantly reduce the risk of attack on an organization. TCVM uses the context of a network, assets and business as well as current threat intelligence to accurately determine risk and focus remediation where it matters most. Vulnerability management is about more than scanning, severity levels and patching. To have a real impact on lowering your risk of cyberattack, you need to centralize and analyze data from your entire attack surface. This type of approach means using more data sources in vulnerability discovery, more context in prioritization, more options in remediation and more accountability in oversight.
Protecting Your Data: What You Need to Know about Cloud Security and the Dark Web
Effectively leveraging the cloud is not just about migrating data and applications. Security must travel into the cloud as well. When organizations fail to understand that security in the cloud is a shared responsibility, the consequences can be disastrous (and profitable for threat actors!). In this session, Armor will demonstrate the vulnerability of your unprotected data in the cloud via a real-world experiment using “honeypots” disguised as a healthcare web portal. You will learn:
- The most likely attacks your organization will face
- How active and dynamic security controls can mitigate risk
- Simple steps you can take to prevent a breach
- Why your data is so valuable on the Dark Web (findings from Armor’s Black Market Report)
Thomas Scott serves as a Solutions Consultant at Armor. He is responsible for working with customers globally to build world-class server security and compliance for cloud, on-premise, and hybrid ecosystems. He previously worked as the Cybersecurity Operations Team Lead for Mary Kay where he was responsible for all aspects of monitoring and alerting in both on-premise and cloud environments. He graduated Cum Laude from Texas A&M University attaining his BBA in Management Information Systems.