Check-in and opening introductions8:15 am - 8:45 am
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
What Comes Next in Wi-Fi: 802.11ax, WPA3, & Why Increasing Speed Isn’t Enough
Optimizing user mobile experience requires more than just high speed Wi-Fi. IT professionals are facing challenges of capacity, flexibility, security, privacy, and visibility as they evaluate complex combinations of WLAN standards, management, and technology like OFDMA. This session covers 802.11ax, WPA3 & other security protocols, data analytics, and building robust wireless networks.
Alexandra Gates is a Principal Product Marketing Manager at Aerohive Networks, where she helps define market strategy and vision for the cloud and WLAN products. She is a CWNA with a comprehensive background in wireless technology, including capacity and management planning, RF design, network implementation, and general industry knowledge.
Session Four10:45 am - 11:15 am
Innovative Endpoint Management: Vulnerability Management, Patching, OS-Upgrades and Software Distribution
Windows Fall Anniversary Update, Office 365 Migration, Vulnerability and Patch Management: Are any of these three topics causing your blood pressure to rise? This session will show you how you can automate OS migrations, software deployment projects, and effective security exploit management all from one easy to use Endpoint Management Suite. No university degree or nerd glasses required—buckle up!
Jonathan Lange is sales manager for baramundi software USA, Inc. in the US market. Having advised customers in various countries from small businesses to global enterprises, he is well aware of the challenges IT departments face today in order to keep their infrastructure up-to-date, safe and efficient.
Keynote Session / Seated Lunch11:15 am - 12:15 pm
Keynote speaker Scott Love is a Special Agent with the Federal Bureau of Investigation in Ohio and has been investigating Cyber related crimes for approximately 8 years. His presentation will be on The FBI’s Role in Cyber Threats and Current Cyber Trends.
Session Six12:15 pm - 12:45 pm
Eliminate the existing blind spots and provide consistent cloud/on-perm pervasive security/monitoring coverage
Patrick Kane leads the sales team for the Eastern Americas Region. He is one of the longest tenured sales people with Big Switch and is a veteran to networking, network security and monitoring and his past companies include Gigamon, Juniper, and Cisco.
Break12:45 pm - 1:00 pm
Break / Vendor Booth Time
Session Seven1:00 pm - 1:30 pm
A new approach to email security for Office 365
For hackers, Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Jamie Duff is an experienced sales leader with nearly 20 years’ experiencing working in the information technology and managed services industry. In his current role at Vade Secure, Jamie is tasked with accelerating the growth of Vade Secure’s corporate sales business in North America, both by hiring and managing a team of talented sales professionals and by building channel of MSPs from the Microsoft partner ecosystem. He previously held sales and sales leadership positions with Retarus, Real Asset Management, John Galt Solutions, and Qwest. Jamie graduated with a Bachelor of Science (BS) degree in Finance from Providence College.
Session Eight1:30 pm - 2:00 pm
The Path to IAM Security
“Are we secure?” It’s the most dreaded question that information security and risk management professionals need to answer. Compliance is a useful starting point, but the number of “compliant” organizations who still suffered a data breach is proof positive that compliance simply isn’t enough. That’s where maturity models come into play. In this presentation, I’ll show you how to apply a capability maturity model (CMM)( to your identity and access management (IAM) program, using that model to assess where you are today. I’ll also share tools and techniques you can use to accelerate improvements to your program.
By day, Jerod Brennen(@slandail) is a Security Solutions Architect with One Identity.
By night, he’s a husband, father, writer, filmmaker, martial artist, musician, and gamer. I think it’s fair to say that he’s earned every gray hair in his beard, having spent his career fulfilling infosec roles in consulting, higher education, retail, and public utilities.
Jerod loves to share what he’s learned over the years every chance he gets: at local and regional information security professional organizations, at larger information security conferences, and online via blogs and podcasts. He also teaches online information security courses for Pluralsight and LinkedIn Learning, as well as in-person courses, both domestically and internationally.
At the end of the day, Jerod just wants to help folks get one step closer to doing what they want to do securely.
Break2:00 pm - 2:15 pm
Break / Vendor Booth Time
Session Nine2:15 pm - 2:45 pm
Hurricanes, Banditos, and Steam Baths – How I got my data back
Stories of recovery. You will learn how disaster doesn’t need to equal downtime.
Terry Creighton is a Solutions Architect with Quorum. With 10 years in the Backup and Disaster Recovery space, Terry has a Bachelors in Information Management, and has worked in the information technology field since 2001.
Break2:45 pm - 3:00 pm
Break / Vendor Booth Time
Session Ten3:00 pm - 3:30 pm
Dealing With the Tsunami of Unmanaged and IoT Devices
The explosive growth of “smart” devices – from printers to smart TVs to industrial devices and more – provides a new attack surface that can’t be managed or protected by legacy security tools. The risk is no longer theoretical, with the FBI and the DHS issuing multiple warnings. This session will explore the new threat landscape, providing several examples of attacks on these devices, and discuss new considerations of security architectures with a ‘Zero Trust’ philosophy to fill the gaps left by traditional security architectures.
Jesse leads solutions delivery at Armis Security, a new and innovative force in the IoT security space. Jesse has a rich track record with security technologies in tech startups and large organizations translating complex technology into highly effective solution scenarios. He has extensive experience across financial services, manufacturing, health care, hospitality and government verticals, especially around the operational and security challenges of innovation driven business transformation, including IoT. Among his favorite site visits: motorcycle manufacturer test track and automated baggage handling complex.
Session Eleven3:30 pm - 4:00 pm
Advanced Threat Prevention: How to stay one step ahead of cyber-attacks and ransomware.
Chris Morris is the Threat Prevention SME for Check Point’s Central United States region. He has been in the IT industry for over 20 years, whose experiences include perimeter and endpoint security, network virtualization, disaster recovery, and network design.
CISO PANEL4:00 pm - 5:00 pm8:15 am - 5:00 pm5605 Blazer ParkwayDublin, OH 43017614-791-1000