Data Connectors is proud to host the Cleveland Cybersecurity Conference.
Data Connectors is proud to host the Cleveland Cybersecurity Conference.
IoT and the role of cyber security.
We are on the verge of entering our 4th industrial revolution: the era of the Internet of Things (IoT). IoT is a broad term that comes to describe physical devices, embedded with electronics, software, sensors, actuators and network connectivity – all capable of collecting and exchanging data with other devices. The direct communications and data sharing between devices – among themselves or directly with various cloud services – are aimed to shorten development cycles, reduce energy consumption, enable precise view of a device status, and to streamline business process with higher efficiency.
This revolution has already impacted various industries including healthcare, automotive, industrial control systems, transportation and smart homes. Due to the wide variety of attacks on IoT, there is a need for a substantial granularity while managing the security policies of these devices. IoT delivers the promise of becoming the next industrial revolution, and driving the next generation of efficiency and productivity. But this revolution will not flourish unless cyber security becomes one of its corner stones.
Unicorns and Water Buffalos: How Security Transformation Should be Protecting Your Digital Transformation
Digital Transformation has been taking the IT industry by storm, but has your Security posture been able to keep pace? From Zero Trust to XaaS to SASE, how is your security organization adapting to the changing needs of digital transformation? This talk takes a high level look at the key elements of Security Transformation to protect Digital Transformations. It will cover specific efforts and what safeguards help protect them.
Allyn’s 20 years of experience span network engineering, content acceleration and delivery, digital signage systems, and professional services delivery, and include leading multiple high-profile projects for Fortune 500 clients. Allyn has worked on a variety of engagements from presales engineering to post-sales maintenance and everything in between. Prior to joining Nexum, Allyn provided engineering and technical services for the entire Asia-Pacific and Middle East region for a digital signage company. He also previously worked for a large public university and a biomedical testing company. Allyn has been responsible for almost the entire ecosystem of IT projects including customer-driven system design, global deployments, managed service customer network operations, and end systems support and troubleshooting.
One of Allyn’s largest career projects was project lead on a digital menu board rollout for a leading QSR chain. The deployment consisted of installing a single system in 13,000 different locations across the U.S. in under 6 months, and involved coordinating multiple install companies, logistics teams, site contacts, and system provisioning. Other projects have included zero downtime campus network conversions, wireless network deployments, datacenter migrations, and new location network turn-ups. Allyn enjoys learning new systems and how to fit them into the IT landscape. He has worked with Cisco, Bay/Nortel, Red Hat, VMware, Packeteer, Barracuda Networks, and Blackboard CampusWide, among others.
Allyn holds a Bachelor of Science degree with Honors in Computer Science and Psychology from Eastern Michigan University. He enjoys spending time with his family and running marathons.
Coffee Break / Vendor Exhibit Time
Rock the CASB – Top CASB Use Cases
As data has migrated to the cloud, we have lost visibility and control of our sensitive data. A CASB can help your organization to regain that visibility and control. Through a crawl, walk, run approach we can all begin to take the steps necessary to make sure our data is staying with the company. The cloud and BYOD is here to to stay, are you taking the actions necessary to make sure you have the visibility and control you need?
Caleb Mast has spent the last six years helping organizations to embrace digital change through mobility and the use of cloud services. Caleb’s main responsibilities at Bitglass include consulting and educating on best of breed cloud security practices.
Lunch / Vendor Exhibit Time
Dessert and Coffee Break / Vendor Exhibit Time
Public Cloud Visibility – Challenges and Solutions
Movement of workloads to public cloud services has increased dramatically over the last several years. Organizations select the public cloud for geographic efficiencies, deployment
speed, scalability and up-front investment costs. However, there are significant challenges and risks that need to be considered to keep data secure.
We will discuss the following:
-The shared responsibility model for public cloud security
-Key visibility challenges network professionals face when migrating workloads to the cloud
-Best practices of cloud traffic monitoring
-Cloud-native visibility solutions
Data Center Attack: The Game
In this session we will put you in the shoes of a CISO at a hospital to see if you can go back in time to prevent a data center attack from holding critical patient data hostage. See if you have the knowledge it takes to stop a data center attack, and if not, learn what defenses you need to prevent one.
You will be prompted to make decisions that will impact your security posture. Wrong choices could result in ransomware hijacking your patient data and putting lives at risk. Right choices will show you what happens with DevOps and IT work together, will allow doctors to see patient data, and the hospital will run as expected.
After we finish the game, we will review the changing data center and threat landscape and measures you can take to prevent, detect, and respond to emerging cyber attacks.
Eric has been working in the IT industry for over 20 years. As a Senior Sales Engineer he has helped educate customers on how to secure their journey to the cloud. This includes adopting security in a DevOps environment. Eric holds certifications with AWS and has spoken at various industry events. Eric attended The Ohio State University and resides in Cleveland.
Break / Vendor Exhibit Time
Continuous Vulnerability Management: Striving for a 14 Day SLA
The importance of having a continuous vulnerability management process as part of an overall security program such as that provided by the CIS controls framework.
Eric is a Senior Technical Architect for Ivanti specializing in Endpoint Management and Endpoint Security. 12+ years of experience in IT security with a Master of Science in Information Assurance.
Six Practices To Defend Attack Vectors for IT Execs to beat Hackers and Satisfy Regulators
This presentation will discuss with practical applications:
1. The new Digital Attack Vectors
2. De-Risk data in the Cloud
3. Incorporate cybersecurity into risk management
4. Identify and protect critical assets
5. Hunt hackers before they hunt you
5. 6 Practical Steps to beat Hackers and Satisfy Regulators
Tony Pietrocola is President of Agile1. Agile1 is an intelligence-driven SOC-as-a-Service protecting critical network infrastructures from cyber threats. Agile1’s SOC-as-a-Service technology is built on a proprietary Machine Learning engine, which analyzes end-point security data in real time allowing us to detect and respond to threats 24X7, before a breach proliferates.
Tony got his start as an Apple Systems Engineer from 1997-2000. For the next 19 years, he has helped technology companies grow in the SaaS, Fintech and CyberSecurity spaces. Tony has an excellent track record in developing global growth strategies, high performance and sustainable sales teams and building successful businesses. Tony has managed companies from early-stage to publicly traded with revenues ranging from pre-revenue to $100MM.
Tony serves on the board of EBO Group, Inc (acquired by Timken) and Metisentry and is a Board Member of Northern Ohio InfraGard Members Alliance. He holds a Bachelor of Science in Finance from the University of Toledo.
Allen Ingram is the Global Chief Information Officer with Langham Partnership managing all IT services, including voice and data telecommunications, application development, and technical computing functions. He has over 30 years of IT experience with an extensive background in aligning technology infrastructures with company business objectives. Allen served in leadership roles with Associated Estates, Home Shopping Network, Price Waterhouse Coopers (PWC), and Max-Wellness undertaking technology initiatives in IT, voice and data telecommunications, application development, and web e-commerce operations.