CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Session One9:00 am - 9:30 am
Real talk on ransomware
We all know what ransomware is – we know the stats, we’ve seen the headlines, we’re all in the mindset of “if, not when.” With all the fear, uncertainty and doubt constantly bombarding IT professionals, we’ll dive into the realities of ransomware attacks and the real impacts on organizations. We offer participants an opportunity to “sound off” on ransomware and share experiences and challenges with your peers to better understand how prepared organizations are to defend against ransomware attacks.
For over 20 years, Gary has helped with technical presales consulting for the NA Partner and Channel communities. Having joined Arcserve in 2007, his experience is vast in computer networking, data management, disaster recovery, cloud, security and storage technologies.
Gary excels at solution selling and educating our customers on the value of our solutions to their business. His areas of expertise include data protection, and disaster recovery, involving everything from tape, disk, cloud, virtual environment and physical infrastructures.
To request a copy of this presentation, please contact Nikki Shnyder – [email protected]
Session Two9:30 am - 10:00 am
The Data-Centric Security Paradigm
Data is inert, passive and lacks the direct ability to control its own fate. It cannot protect itself, or mitigate risks to it during processing, while at rest, or in transit. In reality, data is fully dependent on the enterprise for protection through the use of a complex environment of security products, processes, and procedures. These include discreet methods of encryption for at-rest and in-transit data, authentication, authorization, physical security tools and applications, user behavior policies and procedures, and event collection and management.
Ultimately, data security is contingent upon the correct and complete installation, configuration, and management of this complex security environment. Risk and the actual loss of data, through user error or bad actor theft, is often a direct result of mistakes made somewhere in the chain of protection.
Moreover, through the adoption of cloud services and storage and external trusted partnerships across the insecure landscape, the data perimeter has expanded well beyond the ability of the current protection schemes to protect the data.
The Information Security industry must recognize that the historical perimeter is obsolete and embrace the new, data-centric security paradigm. This workshop will emphasize a paradigm that infuses data with self-governance, provenance, and self-protection capabilities, to give data the ability to protect itself throughout its lifecycle.
Jim Minie is a Senior Solutions Engineer for Sertainty’s Commercial Accounts Team. Jim is a 30+ year veteran in the Information Technology and Information Security industries. He has extensive knowledge of cybersecurity technology companies and their solutions, with direct experience as both customer/user and vendor. Prior to Sertainty, Jim specialized in network design and implementation of security technologies, with emphasis on data collection, analysis, and security. His portfolio includes previous roles with Q1 Labs/IBM, RSA Security, Symantec, a Fortune 50 financial company, and the aerospace and brewing industries. Jim holds degrees in Management Information Systems/Management and Computer Science.
To request a copy of this presentation, please contact Rivers Nesler – [email protected]
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
It Wasn’t Me! How to Tackle the Misuse of Your Brand Online
It’s not easy to build a strong brand, but it’s far too easy to cause your brand serious and lasting damage. How do you identify when and where your brand is being exploited? And how do you stop it? Join this session to learn how to shine a light into the dark corners of the infinite web and help you proactively protect one of your most important assets – your brand.
Mike has over 15 years’ experience designing and implementing IT security solutions for major commercial organizations and he’s currently focused on making e-mail safer for businesses. He actively participates in combating existing cyber threats and researching new threats out of Mimecast’s global headquarters in Lexington, MA. Mike holds a degree in Computer Engineering from Valparaiso University and was born and raised on the south side of Chicago.
To request a copy of this presentation, please contact Kristy Pauloski – [email protected]
Session Four11:00 am - 11:30 am
Exploitation of IT vulnerabilities is escalating
Join Quest as we discuss managing and securing your assets.
Jillian began her career in the IT industry and has been with KACE/Quest Software for 12 years. Jillian was born, raised and currently resides in Pittsburgh, PA.
To request a copy of this presentation, please contact Malan Maw – [email protected]
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Keynote Session12:00 pm - 12:45 pm
How the DHS Can Help Protect Your Organization from Cybercrimes
Resilience is the ability to remain viable and sustainable during times of stress. Identification of organizational resilience are expressed in protection and sustainment requirements. The Department of Homeland Security will describe their cybersecurity resources used to support organizations in identifying, defining, and measuring resiliency capabilities.
Break12:45 pm - 1:15 pm
Break / Vendor Booth Time
Session Six1:15 pm - 1:45 pm
Using Machine Learning for Risk Based Authentication
The future of security revolves around security automation and machine learning. While this sounds nice at face value, building a strategy around identity and access management requires a plan. We’ll discuss a proven IAM Framework to provide Zero Trust Security. Continuous authentication is the gold standard of IAM however it only works when there is a balance between security and user productivity. During this session, we’ll dive into how risk-based decisions are used to create rock-solid MFA and SSO solutions along with a demo of real-life solutions in practice.
Brian helps partners and customers build global identity practices. This includes defining markets, building identity strategies tailored to industry segment needs and implementing a plan to manage the full lifecycle of a proper IAM project.
Session Seven1:45 pm - 2:15 pm
Cybercrime, Inc.: Exposing the Business of the Dark Web
The Dark Web is growing at an exponential rate, with hackers doubling down on cybercrime-as-a-service – allowing non-traditional and unskilled hackers to wreak havoc in ways previously impossible. Criminals don’t have to be skilled to get your data; they just have to hire someone who is.
The session aims to expose the inner workings and business of the cyber underground, focusing on the following: cryptocurrency, cybercrime-as-a-service, money laundering and money mules, and how businesses can protect themselves from all levels of cybercriminals
Rafal Los serves as the Vice President of Security at Armor. He’s responsible for leading the various technical functions associated with designing, developing and delivering next-generation cloud security-as-a-service solutions to our clients. Rafal is also the Founder & Producer of the Down the Security Rabbithole Podcast. He previously worked as the Managing Director, Solution & Program Insight at Optiv Inc.; Principal, Strategy Security Services at HP Enterprise Security Services; and Senior Security Strategist at HP Software. As an IT security professional, Rafal gained experience in some of the world’s most challenging business environments.
His responsibilities included budgets, risk analysis, process creating and adoption, internal audit and compliance strategies. His professional experience has taken him from budding “.com” companies, to a security boutique shop, to one of the world’s largest and most complex enterprises – always meeting challenges head-on and with a positive attitude. He has been the catalyst for change in many organizations, building bridges across enterprises and developing permanent successful strategies for growth and prosperity.
To request a copy of this presentation, please contact Rachel Chism – [email protected]
Break2:15 pm - 2:30 pm
Break / Vendor Booth Time
Session Eight2:30 pm - 3:00 pm
Finding Anomalous Pairs in Threat Hunting
Peanut butter and jelly, wine and cheese — some things just go together. But httpd.exe paired with cmd.exe? Not so much. This talk covers anomalous process relationships that might include a potential exploit, along with a specific hunting technique used to uncover these processes that don’t belong together. We’ll show you how to use the security tech you already own to enhance the data used in this hunting technique.
Mary is the Detection & Response Engineering Manager at Expel. She and her team develop rules and strategies to detect and respond to security events on network, endpoint, and cloud. Mary has 18 years of experience in information operations, intrusion detection and incident response.
To request a copy of this presentation, please contact Kim Ayers – [email protected]
Session Nine3:00 pm - 3:30 pm
Protection From Today’s Biggest Threats
In this session, we will cover some of today’s biggest threats, including Emotet and CryptoJacking. You’ll also learn how they attack, and what you can do to protect yourself. Many organizations already have the means to protect themselves, but are they using them properly? Are you doing the right things across your company?
Brendan has spent the last 15 years as a security engineer in the IT industry, having previously spent time at ISPs and Network Security providers before joining the Sophos team. He understands the complex challenges companies face to maintain security and compliance in an ever-evolving threat landscape, and he continually strives to help companies stay ahead of the bad guys. Currently Brendan serves as a Sr. Sales Engineer on the Illinois team, and has called Chicago home since the early 90s.
To request a copy of this presentation, please contact Leah Kavalchuk – [email protected]
Registration has closed for this conference
8:30 am - 4:30 pm3500 Midwest RoadOak Brook, IL 60523