Welcome / Introductions8:30 am - 9:00 am
Data Connectors is proud to host the Atlanta Virtual Cybersecurity Summit.
Session One9:00 am - 9:30 am
The IoT storm … Will we survive the coming deluge?
IoT devices permeate the most intimate aspects of our everyday lives. Now more than ever we must address the risks associated with these always on, always connected devices!
Robert Falzon is currently the Head of Engineering within the office of the CTO for Check Point Software Technologies Inc., the worldwide leader in securing the Internet. His background includes over 20 years of experience in large-scale network security architecture, design, and deployment projects for government and business organizations spanning the globe. Currently leading a large team of the most talented cyber security engineers in the industry, Robert and his team are responsible for educating the market on the latest cyber security trends.
Other past responsibilities have included operational, management, and developmental duties for major accounts within EDS Canada’s network security team, and lead engineer for many major European Telco accounts with Alcatel in Paris France. While with Alcatel, Robert worked to assist those accounts in moving to emerging voice technologies while maintaining a focus on security.
After obtaining his CISSP certification, Robert went on to provide security process and audit/penetration testing training to major financial and energy customers within Europe and the Middle East, in addition to providing audit and penetration testing and consulting services to customers worldwide.
Session Two9:30 am - 10:00 am
Developing Your Identity Strategy
Remember when identity management meant creating new accounts and resetting user’s passwords? Over the years, digital identity has evolved into much, MUCH more. Your identity program now includes not just identity management, but also access management, privilege management, and even customer identity management, all of this falling under the umbrella of identity governance. More importantly, identity has shifted from being a basic operations function to the cornerstone for business enablement and digital transformation. In this presentation, Jerod walks you through key considerations when developing your identity strategy to help you improve the current state of your program while building a solid foundation for the future of your identity program.
By day, Jerod Brennen (@slandail) is a storyteller, teacher, speaker, advisor, and security architect.
By night, he’s a husband, father, writer, filmmaker, martial artist, musician, and gamer. It’s fair to say that he’s earned every gray hair in his beard, having spent his career fulfilling infosec roles in consulting, higher education, retail, and public utilities.
Jerod loves to share what he’s learned over the years every chance he gets: at local and regional professional meetings, at larger conferences, and online via blogs and podcasts. He has published multiple online information security courses with Pluralsight and LinkedIn Learning, and he also teaches courses in person, both domestically and internationally.
At the end of the day, Jerod just wants to help folks get one step closer to doing what they want to do securely
Session Three10:30 am - 11:00 am
TPRM 2.0: How to Reduce the Burden of Vendor Risk Assessments
You spend countless hours assessing your vendors, stuck in spreadsheets, trying to sift through last year’s emails to find the right vendor contact and the most up-to-date questionnaire. And when assessments are finally completed (which can take months), you still need to review and validate the answers, as well as mitigate any identified risks.
As your program evolves, the need to simplify the vendor risk assessment process becomes unavoidable. So, what can you do to streamline assessment completion and simplify vendor risk reviews? In this webinar, we’ll outline the latest vendor risk assessment tips and tactics that you can implement to build a more efficient third-party risk management practice.
- How you can save hours on vendor risk assessments
- How you can leverage inherent risks and tiered assessments
- How Cyber Risk Exchanges are reinventing the assessment process
Emily Couch serves as a Third-Party Risk Consultant for OneTrust Vendorpedia – a purpose-built software designed to operationalize third-party risk management. In her role, Couch advises companies throughout their third-party risk management implementations to help meet requirements relating to relevant standards, frameworks, and laws (e.g. ISO, NIST, SIG, GDPR and CCPA). Couch works with clients to centralize their third-party information across business units, assess risks and performance, and monitor threats throughout the entire third-party relationship, from onboarding to offboarding.
Session Four11:00 am - 11:30 am
Bitglass, the total data protection company, is a global cloud access security broker (CASB) and agentless mobile security company based in Silicon Valley. The company’s solutions enable real-time end-to-end data protection, from the cloud to the device. Bitglass is backed by Tier 1 investors and was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution.
Lunch11:30 am - 12:00 pm
Lunch / Solutions Showcase Open
Session Six1:15 pm - 1:45 pm
Cyber Resilience: Rethinking your data protection strategy in the age of ransomware.
Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!
Andy Fernandez is a Global Product Marketing Manager at Zerto. With a focus on product marketing and launches, he strives to translate technical innovation to business value. After spending years in various technology companies and entrepreneurship pursuits, Andy is focused on launching industry-leading products and accelerating their adoption.
Session Seven1:45 pm - 2:15 pm
The Fear Factor: Reducing Risk in Your Environment
Security is a top priority for organizations today. In this session, attendees will learn how to improve their organization’s security posture in the following ways:
- A clear understanding of the scare tactics organizations are facing from cyber criminals
- Threats and vulnerabilities that exist in their environment
- Steps organizations can take to minimize the risks of their organization’s employees
This session will help attendees to understand that fear should not be a factor in their approach to security.
Greg has 18 years’ experience as an IT Director for organizations in compliant environments including healthcare, medical device, and pharmaceuticals. He has an undergraduate degree in Computer Information Systems from Indiana University and an MBA from UNC-Wilmington. Greg is an ISACA Certified Information Systems Auditor, passing his exam in the 90th percentile. Greg’s initiative led to the creation of our Security Audit and Compliance team, which now focuses on framework-based assessments (NIST, HIPAA, ISO), Internal Audit as a Service (IAaaS), Penetration Testing and Virtual CISO offerings.
Session Eight2:30 pm - 3:00 pm
Session Details Coming Soon
Session Nine3:00 pm - 3:30 pm
Session Details Coming Soon
Closing Session + Prize Drawing
Solution Showcase Open Until 6:00 pm
Registration for this event is opening soon.
Click Here to be added to the Invitation List for a complimentary pass.