CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Data Connectors is proud to host the Chicago Cybersecurity Conference.
Session One9:00 am - 9:30 am
baramundi Software provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.
The baramundi Management Suite (bMS) combines all important features for Endpoint Management: Patch Management, Software Deployment, OS-Installation, Enterprise Mobility Management, Vulnerability Assessment, and more. bMS optimizes IT management processes by automating routine tasks and providing an extensive overview of the status of the network and endpoints. In doing so, it relieves pressure on IT administrators and ensures that users always have the necessary rights and applications on all platforms and form factors; whether on PCs, servers, notebooks, mobile devices or Macs. Over 3,000 customers around the world benefit from nearly two decades of experience and the easy-to-use software solution
Session Two9:30 am - 10:00 am
How Hackers Bypass Email Security: An Attack Guide for the Uninitiated
The scale of email migration to the cloud requires a strategic shift in security for collaboration suites. The Office 365 inbox and user credentials are the #1 target for hackers. 90% of breaches start with email and the security incident orchestration, automation and response workload drains resources from the SOC team. Sharing insights from research, Michael will demonstrate the techniques attackers use to bypass Microsoft’s defenses, fool filters, and launch attacks.
He will talk about how CISOs have started to adopt a continuous adaptive risk and trust assessment mindset to protect inboxes from the evolving threats including phishing, account takeover and business email compromise.
Break10:00 am - 10:30 am
Coffee Break / Vendor Exhibit Time
Session Three10:30 am - 11:00 am
About Check Point
Check Point Software Technologies Ltd. is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyber attacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises – from networks to mobile devices – in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.
Lunch11:30 am - 12:00 pm
Lunch / Vendor Exhibit Time
Keynote Session12:00 pm - 12:45 pm
Keynote Details Coming Soon
Networking / Happy Hour4:00 pm - 5:00 pm