CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Data Connectors is proud to host the Chicago Cybersecurity Conference.
Session One9:00 am - 9:30 am
baramundi Software provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.
The baramundi Management Suite (bMS) combines all important features for Endpoint Management: Patch Management, Software Deployment, OS-Installation, Enterprise Mobility Management, Vulnerability Assessment, and more. bMS optimizes IT management processes by automating routine tasks and providing an extensive overview of the status of the network and endpoints. In doing so, it relieves pressure on IT administrators and ensures that users always have the necessary rights and applications on all platforms and form factors; whether on PCs, servers, notebooks, mobile devices or Macs. Over 3,000 customers around the world benefit from nearly two decades of experience and the easy-to-use software solution
Session Two9:30 am - 10:00 am
How Hackers Bypass Email Security: An Attack Guide for the Uninitiated
The scale of email migration to the cloud requires a strategic shift in security for collaboration suites. The Office 365 inbox and user credentials are the #1 target for hackers. 90% of breaches start with email and the security incident orchestration, automation and response workload drains resources from the SOC team. Sharing insights from research, Michael will demonstrate the techniques attackers use to bypass Microsoft’s defenses, fool filters, and launch attacks.
He will talk about how CISOs have started to adopt a continuous adaptive risk and trust assessment mindset to protect inboxes from the evolving threats including phishing, account takeover and business email compromise.
Break10:00 am - 10:30 am
Coffee Break / Vendor Exhibit Time
Session Three10:30 am - 11:00 am
About Check Point
Check Point Software Technologies Ltd. is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyber attacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises – from networks to mobile devices – in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.
Session Four11:00 am - 11:30 am
About Critical Start
CRITICALSTART is leading the way in Managed Detection and Response (MDR) services. As the MDR experts that leave nothing to chance, the company developed the industry’s only cloud-based Security Orchestration, Automation and Response (SOAR) platform that resolves 99% of security events to eliminate compromise and stop breaches. Visit www.criticalstart.com for more information.
Lunch11:30 am - 12:00 pm
Lunch / Vendor Exhibit Time
Keynote Session12:00 pm - 12:45 pm
Keynote Details Coming Soon
Break12:45 pm - 1:15 pm
Dessert and Coffee Break / Vendor Exhibit Time
Session Six1:15 pm - 1:45 pm
Session Details Coming Soon
Session Seven1:45 pm - 2:15 pm
About Respond Software
About Respond SoftwareRespond Software delivers instant ROI to organizations in their battle against cyber crime. With its patented intelligent decision engine, PGO, Respond Software’s product uniquely combines the best of human expert judgement with the scale, thoroughness, and consistency of software. This quick-to-implement, cyber-security decision automation software delivers the equivalent of a virtual, best-of-breed analyst team that dramatically increases capacity and improves monitoring and triage capabilities at a fraction of the cost.
Respond Software was founded in 2016 by security and software industry veterans.
Break2:15 pm - 2:30 pm
Break / Vendor Exhibit Time
Session Eight2:30 pm - 3:00 pm
Armor provides managed security solutions that take the complexity out of cloud security. Armor protects companies’ critical data across public, private and hybrid cloud environments from current and emerging cyber threats by combining cutting-edge technology, audit-ready compliance controls and real-time intelligence from its security experts. With Armor, clients can focus on their core business with the peace of mind that their data is secure. To learn more, visit www.armor.com.
Session Nine3:00 pm - 3:30 pm
Session Details Coming Soon