Data Connectors is proud to host the Charlotte Cybersecurity Conference.
Data Connectors is proud to host the Charlotte Cybersecurity Conference.
Why Does Asset Management Matter for Cybersecurity?
Today, security professionals encounter many cybersecurity asset management challenges, from aggregating disparate data sets to establishing real-time visibility in a fluid environment. Trends in emerging technologies, such as IoT deployments, and in workplace modernization, like BYOD, continue to complicate the situation. Enterprises have a wide range of security solutions at their disposal to help tackle security challenges, but few resources to manage them. In this session, you’ll discover 3 modern asset trends, learn from 5 real-life asset management challenges, and gain a 6-step checklist on how to successfully manage your company’s assets.
Drew is a technical team member who enjoys debating solutions and solving problems. He draws from his 30 years of technical and business experience where he’s worked for some of the largest network, data center, and MSSP providers. In that time he’s focused on a wide variety of security areas, including managed security services, DDoS protection, GRC (Governance, Risk & Compliance), threat intelligence platforms, and phishing defense services before moving to Axonius where he helps solve a foundational problem for every enterprise. Drew is a member of the Raleigh ISSA chapter and holds active CISSP and CISM credentials.
Lightweight Deception, Heavyweight Results
As Vice President of Sales and Business Development, Tim is responsible for the development and execution of company sales and strategic partnering strategies. Tim has over 20 years of technical sales and marketing experience with specific focus on cybersecurity solutions over the past 12 years. Tim specializes in global, enterprise and major account sales, channel strategies and new business development. Prior to joining PacketViper Tim had senior security sales responsibilities at Dimension Data and NTT Security (formerly Solutionary). Tim holds an MBA from Duquesne University concentrating in Marketing and Sales Management, and a Bachelor of Science degree in Business Administration and Finance from the University of Pittsburgh.
Break / Vendor Booth Time
Real talk on ransomware
We all know what ransomware is – we know the stats, we’ve seen the headlines, we’re all in the mindset of “if, not when.” With all the fear, uncertainty and doubt constantly bombarding IT professionals, we’ll dive into the realities of ransomware attacks and the real impacts on organizations. We offer participants an opportunity to “sound off” on ransomware and share experiences and challenges with your peers to better understand how prepared organizations are to defend against ransomware attacks.
Mark is currently Arcserve’s Director of Solution Strategy for North America, where he focuses on collaborating with the Arcserve sales team to provide their customers with a comprehensive data protection and disaster recovery solution that exactly fits their needs.
Mark has 25+ years of I.T. industry experience, with most of that time spent focusing on storage, data protection, business continuity and information governance.
How Hackers Bypass Office 365 Security: An Guide for the Uninitiated
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
• Email-based phishing, spoofing, and malware
• Account takeover, insider threats, compromised Microsoft credentials
• Loss of sensitive data from OneDrive, SharePoint and Office 365
Jeff Raymond is a Seattle, WA based Cloud Security Engineer at Avanan. While working for companies ranging from security giants to start-ups, he has found his passion in protecting organizations from phishing attacks and securing their cloud applications. Outside of work, he can either be found snowboarding or wakeboarding (depending on the season) or geeking out in his home lab.
Break / Vendor Booth Time / Lunch
Sean McCloskey is the Branch Chief for Stakeholder Risk Assessment and Mitigation within the Department of Homeland Security’s (DHS) Cyber and Infrastructure Security Agency (CISA). As Branch Chief, Sean manages the Cyber Security Advisor program that fields DHS cybersecurity professionals across the country to assist critical infrastructure owners and operators improve their cybersecurity posture.
Prior to joining DHS, Mr. McCloskey served as an information security consultant with over 18 years of experience supporting government clients. Mr. McCloskey has also served for over 23 years in the United States Marine Corps Reserve (USMCR) and is an active drilling reservist.
Mr. McCloskey holds a B.S. in Computer Science and a M.S. in Information Security and Assurance.
Dessert and Coffee Break / Vendor Exhibit Time
The Fear Factor: Reducing Risk in Your Environment
Security is a top priority for organizations today. In this session, attendees will learn how to improve their organization’s security posture in the following ways:
A clear understanding of the scare tactics organizations are facing from cyber criminals
Threats and vulnerabilities that exist in their environment
Steps organizations can take to minimize the risks of their organization’s employees
This session will help attendees to understand that fear should not be a factor in their approach to security.
Greg has 18 years’ experience as an IT Director for organizations in compliant environments including healthcare, medical device, and pharmaceuticals. He has an undergraduate degree in Computer Information Systems from Indiana University and an MBA from UNC-Wilmington. Greg is an ISACA Certified Information Systems Auditor, passing his exam in the 90th percentile. Greg’s initiative led to the creation of our Security Audit and Compliance team, which now focuses on framework-based assessments (NIST, HIPAA, ISO), Internal Audit as a Service (IAaaS), Penetration Testing and Virtual CISO offerings.
Protection From Today’s Biggest Threats
In this session, we will cover some of today’s biggest threats, including Emotet and CryptoJacking. You’ll also learn how they attack, and what you can do to protect yourself. Many organizations already have the means to protect themselves, but are they using them properly? Are you doing the right things across your company?
Anthony Iacobone better known as TJ Iacobone or that guy in the hat, given his affinity and propensity for wearing ballcaps when not presenting, has been with Sophos for nearly 2 decades. Over that span he has seen and combated a multitude of threats from Sircam and Nimda to the current deluge of ransomware like Wanna Cry and Sam Sam. Originally from Massachusetts he has lived in the Raleigh area for 5 years and covers the Carolinas for Sophos. When not busy selling and presenting TJ has 3 wonderful kids and an amazing wife that get the rest of his time away from work.
Break / Vendor Exhibit Time
How to Fight Modern Advanced Threats and Improve Your Cybersecurity Posture
In this presentation, learn how to fight modern advanced threats and improve your cybersecurity posture. Topics to be covered include current challenges facing IT departments, types of advanced threats, and how to detect and respond to those threats. When it comes to security, you must take a proactive approach to minimize the damage that can be done.
Tom Utley is currently with Arctic Wolf Networks based out of Charleston, South Carolina. Tom is a subject matter expert in Managed Detection & Response (MDR) and Managed Risk for mid-size enterprise organizations. Prior to Arctic Wolf, Tom held senior engineering positions at Sandvine as a sales engineer & solution architect.
Richard Moulton is with Cohesity based out of Charlotte, North Carolina. Richard has a security background in tenures with Palo Alto Networks and Cisco Systems helping build cyber security practices and teams. Richard is passionate about helping enterprises improve their security posture by reducing risk in areas of traditional mass data fragmentation: backups, file shares, object stores, and data used for dev/test and analytics.