CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Data Connectors is proud to host the Charlotte Cybersecurity Conference.
Session One9:00 am - 9:30 am
Axonius is the only cybersecurity asset management platform that provides organizations with complete visibility and automated policy validation on all assets, devices, and users. By seamlessly integrating with over 100 existing management and security technologies, the Axonius platform is deployed in minutes to enable organizations to embrace innovation and accelerate speed to value.
Session Two9:30 am - 10:00 am
PacketViper is deception technology which solves important cybersecurity problems for our clients and produces practical, real-world results, including dynamic network defense, relief of security related operational costs and burdens, and 3rd party risk monitoring with policy enforcement. PacketViper produces relevant intelligence that is automatically applied and supports real-time policy enforcement. Our customers are in both the public and private sectors and cover multiple industries.
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
Established in 1983, Arcserve is the world’s most experienced provider of business continuity and disaster recovery solutions. The company’s mission is to protect priceless digital assets and safeguard applications and systems in any location within multi-generational IT infrastructures, whether that’s on-premises or in the cloud. Organizations in over 150 countries around the world rely on Arcserve’s highly efficient, integrated technologies and expertise to eliminate the risk of data loss and extended downtime while reducing the cost and complexity of backing up and restoring data by up to 50 percent. Arcserve is headquartered in Minneapolis, Minnesota with locations around the world.
Session Four11:00 am - 11:30 am
How Hackers Bypass Email Security: An Attack Guide for the Uninitiated
The scale of email migration to the cloud requires a strategic shift in security for collaboration suites. The Office 365 inbox and user credentials are the #1 target for hackers. 90% of breaches start with email and the security incident orchestration, automation and response workload drains resources from the SOC team. Sharing insights from research, Michael will demonstrate the techniques attackers use to bypass Microsoft’s defenses, fool filters, and launch attacks.
He will talk about how CISOs have started to adopt a continuous adaptive risk and trust assessment mindset to protect inboxes from the evolving threats including phishing, account takeover and business email compromise.
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Keynote Session12:00 pm - 12:45 pm
Keynote Details Coming Soon
Networking / Happy Hour4:30 pm - 5:30 pm