Day 1, Ciso Panel
Welcome / Introductions9:15 am - 9:20 am
Data Connectors is proud to host the Atlanta Virtual Cybersecurity Summit.
Day 1, Session One9:20 am - 9:40 am
The IoT storm … Will we survive the coming deluge?
IoT devices permeate the most intimate aspects of our everyday lives. Now more than ever we must address the risks associated with these always on, always connected devices!
Robert Falzon is currently the Head of Engineering within the office of the CTO for Check Point Software Technologies Inc., the worldwide leader in securing the Internet. His background includes over 20 years of experience in large-scale network security architecture, design, and deployment projects for government and business organizations spanning the globe. Currently leading a large team of the most talented cyber security engineers in the industry, Robert and his team are responsible for educating the market on the latest cyber security trends.
Other past responsibilities have included operational, management, and developmental duties for major accounts within EDS Canada’s network security team, and lead engineer for many major European Telco accounts with Alcatel in Paris France. While with Alcatel, Robert worked to assist those accounts in moving to emerging voice technologies while maintaining a focus on security.
After obtaining his CISSP certification, Robert went on to provide security process and audit/penetration testing training to major financial and energy customers within Europe and the Middle East, in addition to providing audit and penetration testing and consulting services to customers worldwide.
Day 1, Session three10:30 am - 10:50 am
TPRM 2.0: How to Reduce the Burden of Vendor Risk Assessments
You spend countless hours assessing your vendors, stuck in spreadsheets, trying to sift through last year’s emails to find the right vendor contact and the most up-to-date questionnaire. And when assessments are finally completed (which can take months), you still need to review and validate the answers, as well as mitigate any identified risks.
As your program evolves, the need to simplify the vendor risk assessment process becomes unavoidable. So, what can you do to streamline assessment completion and simplify vendor risk reviews? In this webinar, we’ll outline the latest vendor risk assessment tips and tactics that you can implement to build a more efficient third-party risk management practice.
- How you can save hours on vendor risk assessments
- How you can leverage inherent risks and tiered assessments
- How Cyber Risk Exchanges are reinventing the assessment process
Emily Couch serves as a Third-Party Risk Consultant for OneTrust Vendorpedia – a purpose-built software designed to operationalize third-party risk management. In her role, Couch advises companies throughout their third-party risk management implementations to help meet requirements relating to relevant standards, frameworks, and laws (e.g. ISO, NIST, SIG, GDPR and CCPA). Couch works with clients to centralize their third-party information across business units, assess risks and performance, and monitor threats throughout the entire third-party relationship, from onboarding to offboarding.
Day 1, Session Four10:50 am - 11:10 am
Bitglass, the total data protection company, is a global cloud access security broker (CASB) and agentless mobile security company based in Silicon Valley. The company’s solutions enable real-time end-to-end data protection, from the cloud to the device. Bitglass is backed by Tier 1 investors and was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution.
Panel Topic #111:10 am - 11:35 am
Lunch Break11:35 am - 12:10 pm
Lunch / Solutions Showcase Open
Day 1, Ciso Panel12:15 pm - 1:00 pm
day 1, Session Five1:05 pm - 1:25 pm
Developing Your Identity Strategy
Remember when identity management meant creating new accounts and resetting user’s passwords? Over the years, digital identity has evolved into much, MUCH more. Your identity program now includes not just identity management, but also access management, privilege management, and even customer identity management, all of this falling under the umbrella of identity governance. More importantly, identity has shifted from being a basic operations function to the cornerstone for business enablement and digital transformation. In this presentation, Rob walks you through key considerations when developing your identity strategy to help you improve the current state of your program while building a solid foundation for the future of your identity program.
Rob is a veteran of the cybersecurity industry with over 20 years of experience. Throughout his career he has focused on Identity governance & access management, as well as APIs & microservices. Rob’s ability to address both business and technical requirements, and provide effective solutions has enabled him to become a trusted advisor for clients across multiple industries. Rob holds a Bachelor of Technology Management, a MSc in IT, and Advanced Certificates in Telecommunications Management and Enterprise Architecture. When not working with clients, he enjoys outdoor activities with family, gaming, and having lively conversations.
Day 1, Session Six1:25 pm - 1:45 pm
Cyber Resilience: Rethinking your data protection strategy in the age of ransomware.
Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!
Andy Fernandez is a Global Product Marketing Manager at Zerto. With a focus on product marketing and launches, he strives to translate technical innovation to business value. After spending years in various technology companies and entrepreneurship pursuits, Andy is focused on launching industry-leading products and accelerating their adoption.
Day 1, Session Seven2:15 pm - 2:35 pm
The Fear Factor: Reducing Risk in Your Environment
Security is a top priority for organizations today. In this session, attendees will learn how to improve their organization’s security posture in the following ways:
- A clear understanding of the scare tactics organizations are facing from cyber criminals
- Threats and vulnerabilities that exist in their environment
- Steps organizations can take to minimize the risks of their organization’s employees
This session will help attendees to understand that fear should not be a factor in their approach to security.
Greg has 18 years’ experience as an IT Director for organizations in compliant environments including healthcare, medical device, and pharmaceuticals. He has an undergraduate degree in Computer Information Systems from Indiana University and an MBA from UNC-Wilmington. Greg is an ISACA Certified Information Systems Auditor, passing his exam in the 90th percentile. Greg’s initiative led to the creation of our Security Audit and Compliance team, which now focuses on framework-based assessments (NIST, HIPAA, ISO), Internal Audit as a Service (IAaaS), Penetration Testing and Virtual CISO offerings.
day 1, session eight2:35 pm - 2:55 pm
Rise of the Machines: Best Practices for Securing Unmanaged and IoT Devices
For many years now, enterprise networks have seen an explosive rise in devices that are challenging for security teams to secure. These include not only unmanaged devices, but also the extensive portfolio of Internet of Things (IoT) in enterprises such IP cameras, conference room TVs, smart building systems, manufacturing machines and medical devices.
Join Ordr CSO Jeff Horne in this webinar to learn:
- Risks and vulnerabilities associated with unmanaged and IoT devices
- Why traditional networking and security tools fall short
- Security best practices to protect these devices without impacting business operations
Panel Topic #22:55 pm - 3:25 pm
Day 1, Keynote
Day One Closing Session
Summary of Day one, what to expect tomorrow… And Remember the Solutions Showcase is Open until 6:00pm ET on Day One!
Day 2, Welcome / Introductions9:15 am - 9:20 am
Day 2, Session one9:20 am - 9:40 am
Identity and Access Management: Embracing the complexity
Admittedly, IAM can be intimidating. Ensuring company assets are being accessed only by those who are authorized is a crucial, non-trivial task but we should embrace the challenge. In this session we will discuss the complexities of IAM by reviewing what digital identity really is, and what challenges exist when implementing access management controls. We will discuss a typical IAM use-case and how we can embrace its complexities while avoiding the need for large architectural changes.
Hello! I’m Matt, a cybersecurity engineer with a desire to make our online world safer and more secure. In the years leading to Auth0, I have co-founded a Toronto based startup Jukebox, previously Booth & Bottle which has over 5000+ users, I’ve built a fully-functioning ticketing platform called xTickets, I have worked for a worldwide VPN company that was acquired (twice!) which led to my work in security at Symantec, and in my early years while in university, I managed the IT and infrastructure for numerous corporate organizations. If we haven’t met before you’ll likely find me in a local coffee shop reading security white papers, writing code, watching DEFCON videos, or on hackthebox.eu. If I’m not there I’ll be at your local gym pumping iron. Security Certifications: CISSP (In Progress), Penetration Testing with Kali Linux, Certified Ethical Hacker, ComTIA Security+.
Day 2, Session Two9:40 am - 10:00 am
Building Cyber Resilience: Finding Factors not Fault
Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.
As a member of the LegalSec Council with the International Legal Technology Association (ILTA), Mark Sangster is a cybersecurity evangelist who has spent significant time researching and speaking to peripheral factors influencing the way that legal firms integrate cybersecurity into their day-to-day operations. In addition to his passion for cybersecurity, Mark’s 20-year sales and marketing career was established with industry giants like Intel Corporation, BlackBerry, and Cisco Systems. Mark’s experience unites a strong technical aptitude and an intuitive understanding of regulatory agencies. During his time at BlackBerry, Mark worked on the first secure devices for government agencies. Since then, he has continued to build mutually beneficial relationships with regulatory agencies in key sectors. Mark holds a Bachelor’s degree in Psychology from the University of Western Ontario and a Business Diploma from Humber College.
Day 2, Session four10:50 am - 11:10 am
The Anatomy of A Cyber Incident Response – Dissecting A Real-World Event & Critical Mitigation Steps
It’s the day IT leaders dread — Ransomware has taken control of your entire network. A few hours ago, everyone was working productively, and now the entire company has come to a screeching halt. The network, email, CRM, ERP, internal and customer databases are down. Could this have been prevented? The answer is almost always: Yes
With cybersecurity and network experience spanning more than two decades, Michael C. Sullivan is focused on keeping an organization’s data healthy and safe. Michael’s core capabilities include network security, routing, switching, wireless, and WAN optimization with an emphasis in cybersecurity. He is a CISSP and Certified Ethical Hacker along with 4011 and 4013 recognitions from the National Security Agency (NSA) and Committee on National Security Systems (CNSS). Under his leadership, the network and security teams provide in-depth consulting and implementation services to architect complex security and network solutions for government and private sector organizations.
Michael holds a BS in computer science from Framingham State University, in Framingham, MA and is a native of the Boston area.
Panel Topic #311:10 am - 11:35 am
Lunch Break11:35 am - 12:10 pm
Lunch / Solutions Showcase Open
Day 2, Ciso Panel
Day 2, Session five1:05 pm - 1:25 pm
Reducing Friction and Managing Remote Work Environments
The business world has changed and many of those changes, like remote working, are here to stay. And keeping your teams safe during this period is a no-brainer—as is making sure their remote endpoints are managed and secure. But with these changes come a list of concerns and issues that many organizations just are not ready to address, sometimes highlighting legacy support policies and even out-of-standard technological needs. The friction of everyday management of the full enterprise has increased, putting a strain on the IT and support staff as well as the users.
During this presentation, I will address common areas of friction in endpoint management as well as ways to pinpoint friction in your environment, and finally ways to address the problems and setup your organization for scalability with endpoint management.
Richard Melick has spent over a decade advancing through the security industry with his considerable experience and considerable focus on the stories surrounding ransomware, hacking, and cyber attacks. He has been a security speaker on five continents and has even advised royalty on how to make and distribute ransomware.
Day 2, session six1:25 pm - 1:45 pm
Session Details Coming Soon
day 2, Session Seven2:15 pm - 2:35 pm
Introduction to Proactive Prevention
Despite continued infosec investments, data breaches continue while companies contend with complicated security architectures composed of disconnected technologies that produce mountains of non-actionable data. A renewed focus on prevention may hold the answer. Security architecture can be broken down into three main elements: Prevention, Detection and Remediation. Prevention should be considered the most strategically important defense element, as by default good true time zero prevention dramatically reduces latency, risks and operational costs of the security structure as a whole. As advanced threats evolve and data center transformation forces enterprise teams to consolidate security, the need for faster, easier and more deterministic threat prevention is essential, thus corporations need to consider a purpose-built stack of true prevention capabilities, that isn’t available in a singular off-the-shelf solution, and add Detection based tools, which by definition have a huge latency, false alerts and are cost prohibitive, where and when appropriate, but not as a prevention tool.
Netta Schmeidler, VP Product at Morphisec, has more than 25 years of experience delivering complex enterprise applications and managing global development groups and product teams. Her broad expertise includes all aspects of defining, building and successfully bringing solutions to market. Prior to Morphisec, Netta held senior product management and engineering roles at VMware (Digital Fuel), BMC, Identify Software, and Mercury. She received an MBA from Tel Aviv University, and a BSc in Computer Science from Hebrew University.
Day 2, Session Eight2:35 pm - 2:55 pm
Session Details Coming Soon
Panel Topic #42:55 pm - 3:25 pm
Session Details Coming Soon
Day 2, Keynote
SUMMIT FINAL CLOSING SESSION
Solutions Showcase is Open until 6:00pm ET
Registration for this event is opening soon.
Click Here to be added to the Invitation List for a complimentary pass.