Data Connectors is proud to host the Canada-West Virtual Cybersecurity Summit.
Data Connectors is proud to host the Canada-West Virtual Cybersecurity Summit.
Your CEO is Not Your CEO! How to defend against email fraud
Email fraud leads to two main threats- one is Business Email Compromise (BEC) where attackers pretend to be you; the other one is Email Account Compromise (EAC) where attackers actually become you. BEC/EAC scams have cost the victimized businesses over $26 billion since 2016. What they have in common is that they both target people. They both rely on social engineering and are designed to solicit fraudulent wire transfers or payment. Unlike malware attacks, BEC and EAC don’t typically include detectable malicious payload. These types of threats can be hard to recognize because to the target these business requests sent by the impostors seem very routine and reasonable.
Join our session and learn about:
Denis Ryan is Senior Director, Email Fraud for Proofpoint, Inc. Previously, Denis held management positions at several well-known high-tech companies including Nominum (now part of Akamai), Tellabs (now Coriant), Verizon and IBM. As a sales leader of the fastest growing business unit in Proofpoint, Denis oversaw the go to market sales and sales engineering strategy post the Return Path business unit acquisition. The diverse background of IT and security solutions allows Denis to overlay the Proofpoint sales efforts in multiple verticals, most notably Healthcare as Proofpoint has ramped this specialized team to improve email authentication practices. He resides in the Dallas-Fort Worth metroplex, mentors undergraduates for his alma mater (University of Dallas) and volunteers his time for various local charities.
How To Enable and Secure Your Remote Workforce
In times of crisis, good security practices are often the first thing to go. Organizations are being forced to revisit their “temporary” remote working policies and tools. An expanding remote workforce can increase your security risk, especially if your IT and Support employees use non-secure remote access tools as temporary measures. Are temporary remote access tools making your organization vulnerable to cyber-attacks?
In this session you will learn:
Key Use Cases for a successful secure remote access strategy
Christopher L. Hills has more than 15 years’ experience as a Senior Security and Architecture Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy and started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Technical Director within a Fortune 500 organization. In his current position, he has responsibilities as a Senior Solutions Architect consulting on PAM implementations and reports to the Office of the CTO as an acting Deputy CTO. In his free time, Chris enjoys spending time with his family on the water with their 32-foot speedboat in the summer and taking to the sand dunes and off-roading in the winter.
A Modern Approach to Deception
Modern threat deception does not rely upon signatures nor behavioral patterns. It flips the paradigm on the attacker to be perfect or be detected. History and experience have shown us that human attackers can bypass next-gen perimeter and endpoint controls. Threat deception provides early detection of external, insider, and 3rd party attackers – protecting against new types of Active Directory attacks, delivering actionable alerts, strengthening overall defensive posture, while being simple to deploy and maintain with a small staff. Whether your organization is a Fortune 10 or one with less than 1000 employees, organizations across the globe are deploying modern Attivo Deception both on-prem and the cloud as a proactive measure to combat cyber criminals.
Jonathan Randall, CISSP has been on the business side of Cyber Security for more than 20 years, working at large global technology vendors, and small US based startups.
He is an advocate of clear communication, and unique approaches to security problem solving.
Shifting PAM into High Gear with Zero Standing Privilege (ZSP)
Zero Standing Privilege (PAM) was a new term introduced in 2019 and might just be the best approach to shift your PAM strategy into high gear. In this short presentation, we’ll discuss how PAM projects were managed historically and highlight a new PAM approach to reduce the impact of compromised admin credentials.
Do you know what admin credentials exist today or even how they change over time in your organization? This is just one of several challenges we’ll discuss, offer a solution and discuss the need and value of frequent scanning of admin rights, reporting on current standing privileges and the adoption of a ZSP and Just-In-Time administration.
So, if you’re looking for quick wins in PAM, including removing local admin rights and support for DevOps+PAM use cases, join the discussion and learn how other organizations like yours have succeeded.
Paul Lanzi is the co-founder and COO of Remediant. Paul and Tim Keeler worked together in the IT departments of several biotechs including Genentech, Roche and Gilead Sciences before starting Remediant. At each of those organizations, they saw first-hand the drawback of the legacy approaches to PAM and were inspired to create something new. Paul’s previous corporate IT experience includes project and program management, corporate mobile app development team management and recruiting and managing full-stack web development teams. Paul has a passion for excellent user experience (UX) and project management, having held a PMP certification from the Project Management Institute since 2005. Paul also holds a BS with Honors in Computer Science from UC Davis.
IoT – Security at the Edge
The Internet of Things (IoT) poses entirely new challenges. With 35 billion IoT devices expected to be in operation by next year – weak passwords, insecure network services and a lack of secure update mechanisms concern every organization.
Public Safety – Cyber Resilience Assessment Team : Introduction to program and resilience assessments tools.
Since 2016, Public Safety Canada has been offering cyber resilience assessment reviews to critical infrastructure owners and operators throughout Canada. The Canadian Cyber Resilience Review (CCRR) has been deployed to over 120+ times since its inceptions into the Public Safety – Regional Resilience Assessment Program (RRAP). The RRAP offers both physical and cyber resilience assessment to critical infrastructure. A new tools has been added to address technical cyber resilience. The Network Security Resilience Analysis (NSRA) tools will be used to assess your network devices cyber hygiene, by analyzing its configurations against industry best practices and standards. Please join me while I explain each of Public Safety Canada’s CI Cyber Assessment tools
Hugo Desrochers is the Team Leader at Public Safety Canada’s Critical Infrastructure Cyber Resilience Assessment Team. After spending years in various technology roles inside the Canada’s federal government, Hugo now focuses on delivering cyber resilience assessments across Canada to owners & operators of critical infrastructure. Hugo’s ability to address both cyber security resilience and cyber hygiene requirements, has enabled him to become a trusted awareness advisor for critical infrastructure owners and operators across the 10 critical infrastructure sectors in Canada.
The EDR you need vs. the EDR you want
When evaluating and choosing an EDR solution, how can you be confident that the solution you want is the one you need?
Join us for this informative session and learn several ways on how you can answer this question, and make the most out of your investment in EDR.
10+ years in the IT/InfoSec space in a variety of roles(support, training, pre-sales, management) with cyber security at the core. Passionate about new technologies and the security opportunity they introduce.
Shift Left – Building Security into the Application Development Lifecycle
By building security into your application development lifecycle you not only help reduce your attack surface, but also save roughly 30% in costs associated to resolving the application security vulnerabilities afterwards… never mind the costs associated to a breach, such as shareholder value and brand tarnishing.
Rob Aragao is a Cyber Security Strategist for the Americas within the Enterprise Security business unit of Micro Focus (merger of Hewlett Packard Enterprise Software). In this role, Mr. Aragao is responsible for working with organizations collaboratively to drive strategic initiatives around cyber security and alignment with business objectives and desired outcomes. He also provides thought leadership and insight regarding the ever changing global threat landscape.
Prior to joining Micro Focus, Mr. Aragao served as Vice President of Security Strategy at ReliaQuest with responsibilities for driving strategy, innovation and execution of a portfolio of security service offerings focused on the Fortune 1000. Previously, he was with eIQnetworks where he led security operations and services. Prior to eIQnetworks, he was with Altiris (acquired by Symantec), where he led the Worldwide Security Management Division. He has also held leadership roles with Level 3/Genuity, Stream International and Siemens.
Mr. Aragao brings over 20 years of information security experience with an emphasis in security and cyber risk best practices, threat intelligence, security monitoring and regulatory compliance initiatives.
Mr. Aragao’s experience has provided him with key insights into the challenges and approaches to combat today’s cyber threats. He is a frequent speaker and panel member and has presented at security conferences such as the International Conference on Cyber Security, FBI InfraGuard, SC Congress, Cloud Expo, Harvard IT Summit and other national and regional security events. He earned a bachelor’s degree in Computer Information Systems and Business Management from Bryant University and is a Certified Information Systems Security Professional (CISSP).
Data-Driven Cyber Risk Management in 2020
This presentation will discuss some of the challenges faced by third-party risk practitioners, the inherent limitations of a questionnaire-only approach to TPRM as well as a strategy to follow as your mature your own programs. The presentation will also include discussion of how continuous monitoring tools can be utilized to build a more robust picture of the controls actually in place at your third parties.
Jonathan has been a third-party risk practitioner since 2004. He is co-founder and former president of the Third-Party Risk Association. He has deep experience building and running third-party risk programs in finance and healthcare. He started with RiskRecon in April, 2020.
A Centralized Identity Strategy Using Standards Helps Minimize Threats.
Modern architectures continue to become more distributed and fractured. How can developers can continue to develop and build what they understand without having to become identity experts? How can they do that and ensure that their applications remain secure? A centralized, standards based identity management system can provide a system that is easy to interact with without requiring expertise or a reduced security footprint.
Carlos Mostek is a Principal Solution Architect for Auth0. Carlos has more than 20 years experience working in software development and security. He loves challenging problems and enjoys dealing with the complexities of identity management. Previous to his time at Auth0, he held engineering and leadership roles at Cray, Thomson Reuters, and BAE Systems. He has a Masters in Software Engineering and undergrad degree in Aerospace Engineering. Identity isn’t rocket science, but it could be! For fun Carlos likes to juggle fire and play soccer, generally not at the same time.
Users as the Attack Vector – People and Security
Users, those carbon-based life forms usually roaming the halls of your buildings, are the last line of defense. Training, tools, and education help – but what are we doing to make sure they are not the weakest link?
Solution Showcase Open until 6:00 pm
Developing Your Identity Strategy
Remember when identity management meant creating new accounts and resetting user’s passwords? Over the years, digital identity has evolved into much, MUCH more. Your identity program now includes not just identity management, but also access management, privilege management, and even customer identity management, all of this falling under the umbrella of identity governance. More importantly, identity has shifted from being a basic operations function to the cornerstone for business enablement and digital transformation. In this presentation, Rob walks you through key considerations when developing your identity strategy to help you improve the current state of your program while building a solid foundation for the future of your identity program.
Rob is a veteran of the cybersecurity industry with over 20 years of experience. Throughout his career he has focused on Identity governance & access management, as well as APIs & microservices. Rob’s ability to address both business and technical requirements, and provide effective solutions has enabled him to become a trusted advisor for clients across multiple industries. Rob holds a Bachelor of Technology Management, a MSc in IT, and Advanced Certificates in Telecommunications Management and Enterprise Architecture. When not working with clients, he enjoys outdoor activities with family, gaming, and having lively conversations.
Risk Management – Insights in a World Gone Crazy
Join Phil Richards, CISO for Ivanti, as we discuss key concepts and strategies for Risk Management. A few of the questions to be addressed in this session include: Is risk always a bad thing? How do you categorize risk according to your company’s objectives? Do data breaches really impact the big companies? What are the steps to recognizing, assessing and managing risk? The answers to these and many other questions will be discussed in this very important and timely session.
Phil has both breadth and depth of security experience. He currently works as the Chief Information Security Officer for Ivanti. He has held other senior security positions including the head of operational security for a medical manufacturing corporation, Chief Security Officer for financial services technology (FinTech) company, and Engineering Director at a regional healthcare corporation. In his security leadership roles, he has created and implemented information security policies based on industry standards. He has led organizations to clean PCI DSS and HIPAA compliance attestations, implemented security awareness training, and established a comprehensive compliance security audit framework based on industry standards. He has led Ivanti through their most recent FedRAMP authorization process. He has implemented global privacy policies, including addressing privacy issues in the European Union. Transforming an organization requires focus on the objectives, clear communication, and constant coordination with executive leadership, which is exactly what Phil has focused on during his security career.
The IoT storm … Will we survive the coming deluge?
IoT devices permeate the most intimate aspects of our everyday lives. Now more than ever we must address the risks associated with these always on, always connected devices!
Robert Falzon is currently the Head of Engineering within the office of the CTO for Check Point Software Technologies Inc., the worldwide leader in securing the Internet. His background includes over 20 years of experience in large-scale network security architecture, design, and deployment projects for government and business organizations spanning the globe. Currently leading a large team of the most talented cyber security engineers in the industry, Robert and his team are responsible for educating the market on the latest cyber security trends.
Other past responsibilities have included operational, management, and developmental duties for major accounts within EDS Canada’s network security team, and lead engineer for many major European Telco accounts with Alcatel in Paris France. While with Alcatel, Robert worked to assist those accounts in moving to emerging voice technologies while maintaining a focus on security.
After obtaining his CISSP certification, Robert went on to provide security process and audit/penetration testing training to major financial and energy customers within Europe and the Middle East, in addition to providing audit and penetration testing and consulting services to customers worldwide.
Managing Digital Risk Amid Disruption
Digital transformation is not only changing how companies think about business. It is changing how we think about risk. We need to *act* on risk, not worry about it. We need to start and end with the basics. In this session we review several key areas of digital risk management to target as you are challenged to be a key contributor in your company’s digital journey.
Ben Smith is Field Chief Technology Officer (Field CTO – US) with RSA, a Dell Technologies business. With 25 years’ experience in the information security, networking and telecommunications industries, he regularly consults on RSA’s security and risk management solutions. His prior employers include UUNET, CSC, and the US Government, along with several technology-oriented startups. He holds industry certifications in information security (CISSP), risk management (CRISC), and privacy (CIPT), and has presented on RSA’s behalf internationally at cybersecurity events sponsored by Gartner, FS-ISAC, SANS, IANS, CERT/SEI, RSAC, ISSA, (ISC)2, ISACA, Infosecurity, IIA, RMA, BSides, ASIS, InfraGard, HTCIA, SecureWorld, MWCA, ICI and other organizations.
Ransomware – To Pay, or not to pay?
Ransomware has been a hot topic of 2020, as bad actors show there is no honor among thieves – as they target hospitals, health care organizations and other firms in the throws of COVID response. Moreover, sensitive data is put at risk, huge sums of money are in the balance, and organizations must struggle between expediency and the bottom line.
The talk provides insight on policing structure within Canada, and cyber initiatives being implemented at all levels. To dispel some myths within the community, time will be spent on how police respond to Cyber Security Incidents and some of the common myths associated with report to Law Enforcement. The BC Cyber Team has formulated a Provincial strategy for which a major component is supporting our frontline investigators and connecting our partners.
From the initial stages, Maleena Singh has been instrumental in the creation and deployment of the BC Cyber Team. Maleena’s primary roles are to develop and maintain strong partnerships as well as providing a coordination role for cybercrime related investigations within British Columbia. Relationships with Private Industry and Academia, as well as Government and Law Enforcement Agencies, are all equally important as we cannot fight cybercrime alone. These partnerships have continuously assisted in active investigations and identifying current cybercrime trends. Building on these cybercrime trends, Maleena is also responsible for identifying the needs and providing assistance to frontline law enforcement within BC using the limited resources available.
Cyber Resilience: Rethinking your data protection strategy in the age of ransomware.
Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!
Andy Fernandez is a Global Product Marketing Manager at Zerto. With a focus on product marketing and launches, he strives to translate technical innovation to business value. After spending years in various technology companies and entrepreneurship pursuits, Andy is focused on launching industry-leading products and accelerating their adoption.
Rise of the Machines: Best Practices for Securing Unmanaged and IoT devices
For many years now, enterprise networks have seen an explosive rise in devices that are challenging for security teams to secure. These include not only unmanaged devices, but also the extensive portfolio of Internet of Things (IoT) in enterprises such IP cameras, conference room TVs, smart building systems, manufacturing machines and medical devices.
Join Ordr CSO Jeff Horne in this webinar to learn:
– Risks and vulnerabilities associated with unmanaged and IoT devices
– Why traditional networking and security tools fall short
– Security best practices to protect these devices without impacting business operations
Jeff Horne is currently the CSO at Ordr where he is responsible for security direction both within Ordr products and internal security. Prior to Ordr Jeff was the VP of Information Security for Optiv where he was responsible for all Security Operations, Governance Risk and Compliance, Endpoint, Internal Incident Response, Physical Security, and Employee Security Awareness groups. Before Optiv Jeff was the Senior Director of Information Security for SpaceX where he was responsible for the overall security strategy of SpaceX and managing the Information Security, Compliance (ITAR), Security Operations, and Physical Security groups. Previous to SpaceX Jeff was the Vice President of R&D and Chief Architect for Accuvant LABS where he managed teams of researchers and consultants specializing in reverse engineering, malicious code, incident response, breach analysis, and vulnerability assessment. Prior to Accuvant Jeff was the Director of Threat Research at Webroot Software where he led several teams of malware researchers, reverse engineers, and a development organization specializing in creating anti-malware functionality and detection signatures for all Webroot products. Jeff began his career as a Vulnerability Researcher at Internet Security Systems where he was responsible for vulnerability discovery, exploit creation, IDS evasion research, and behavioral detection of malware. Jeff is well known for his insight in interviews for numerous news channels and publications, speaking roles at various security conferences, as well as authoring several vulnerability disclosures and patents.
Credential Harvesting As a Service: How this Darkweb Organization Steals Your Microsoft Credentials
In this presentation, we will analyze the attack methods of a single advanced persistent threat organization that guarantees its dark-web customers that their messages will bypass Microsoft security. We will review the software they use to send email from anywhere in the world, their techniques that take advantage of both short- and long-lived vulnerabilities and the infrastructure to harvest credentials and perform attacks almost instantaneously.
You will be surprised by the sophistication of the tools as well as their ease of use. Updated regularly with release notes and training videos, they are not ‘hackers’, so much as software developers with a very clear product offer: 100% access to your inbox. We will watch them over time and show how the tricks they use provide us with the indicators-of-attack we need to stop them.
Offensive AI vs. Defensive AI: Battle of the Algorithms
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against Offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.
In this session, learn about:
David Masson is Darktrace’s Director of Enterprise Security, and has over two decades of experience working in fast moving security and intelligence environments in the UK, Canada and worldwide. With skills developed in the civilian, military and diplomatic worlds, he has been influential in the efficient and effective resolution of various unique national security issues. David is an operational solutions expert and has a solid reputation across the UK and Canada for delivery tailored to customer needs. At Darktrace, David advises strategic customers across North America and is also a regular contributor to major media outlets in Canada where he is based, included CBC and The Globe and Mail. He holds a master’s degree from Edinburgh University.
Identity: the new perimeter?
The 2000’s view of “perimeter” in terms of security conjures up an analogy about castles and moats… but today, the question is, where is the moat? As we turbo-charged Work From Home this year, and BYOD is just a way of life – have your Identity and Access Management practices kept-up?
Confessions of a Rogue FBI Agent
1999 – the early days of cybercrime. Identity theft was a new idea, and the FBI birthed a new division to handle it. It had never been done before – but a few agents started it, flew by the seat of their pants, and traversed the federal law enforcement landscape to blaze a new path, fighting criminals that worked outside our boarders.
EJ Hilbert was there at the beginning. In this keynote presentation, he’ll talk about case studies from that time, and walk through the scintillating story of his own travelais, which led him to bring down the first major Russian CyberHacker, and later land him squarely in the crosshairs of an international spy thriller: corporate espionage, rouge agents, questionable officials and bad actors.
You’ll be excited and enlightened by the story, and in the process learn more about today’s threat landscape. Moreover, you’ll understand why the current cybersecurity environment goe beyond traditional law enforcement – requiring vigilance on the part of corporations and especially cybersecurity professionals.
E.J. Hilbert is the Managing Director of CNM’s Cyber and Privacy Practice. E.J. has over 25 years of experience in the Security, Privacy, Risk Mitigation and Compliance fields. E.J.’s primary expertise is in helping clients establish a compliant Cyber Security strategy and then executing on that plan, often beginning with Cyber Security Awareness and Privacy training.
Prior to CNM, E.J. has held executive roles in Cyber Security and Privacy at GDBA, PriceWaterhouse Coopers and Kroll (US and Europe). During which he has served as Practice Leader, Consultant, Educator and CISO for employers and clients.
E.J. is also a former FBI Special Agent who specialized in the fields of Cybercrime, White Collar Crime, and Counterterrorism.
Solutions Showcase open until 6:00 pm