Data Connectors is proud to host the Columbus Cybersecurity Conference.
Data Connectors is proud to host the Columbus Cybersecurity Conference.
Zero Trust Network Access: The Key to a Complete Identity and Access Strategy
While the industry is moving towards an identity-centric access approach, the focus is often placed on managing authentication and often overlooking the underlying network access and excessive trust that is extended. In this session we’ll highlight the flaws in a Zero-Trust strategy that’s exclusively based on IAM and how it can become whole with Zero Trust Network Access.
Itay Nachum is a Cybersecurity professional and Safe-T’s Vice President of Customer Success. With more than 15 years in the Cybersecurity innovative technologies space, Itay helped enterprises of all sizes transform their security, identity, and access strategies to a true Zero-Trust model. He has vast experience with Identity and Access Management, least-privilege access, risk mitigation, access control and network security, and most recently Zero-Trust Network Access and Software-Defined Perimeter.
For a copy of this presentation, please contact Karin Tamir – [email protected]
How deception can be used to turn an attackers strength to a weakness.
Tim is responsible for the development and execution of company sales and strategic partnering strategies. Tim has over 20 years of technical sales and marketing experience with specific focus on cybersecurity solutions over the past 12 years. Tim specializes in global, enterprise and major account sales, channel strategies and new business development. Prior to joining PacketViper Tim had senior security sales responsibilities at Dimension Data and NTT Security (formerly Solutionary). Tim holds an MBA from Duquesne University concentrating in Marketing and Sales Management, and a Bachelor of Science degree in Business Administration and Finance from the University of Pittsburgh.
For a copy of this presentation, please contact Kim Trama – [email protected]
Coffee Break / Vendor Exhibit Time
Operationalizing Incident Response
Explore how and why key-business drivers shape your security operations. Go beyond the guidance provided by NIST and examine how risk management, threat intelligence, and incident response come together in a sensible, practical, and operational detect and respond model that will meaningfully impact your cyber risk strategy.
Shane Harsch is an Information Security professional with over 25 years of experience ranging from military to manufacturing to security consulting and professional services. He has managed and architected SOCs for the military and managed service providers and is a commissioned officer in the US Army, Military Intelligence. Shane holds degrees in business (MBA) and computational linguistics (BA), and maintains the following certifications: Intrusion Analyst (GCIA), Incident Handling (GCIH), Enterprise Defense (GCED), Information Security (CISSP), and Threat Intelligence Analyst (CTIA). In addition to his responsibilities as an Cyber Defense Solutions Specialist at RSA, Shane fosters new professionals to information security as a SANS Instructor.
For a copy of this presentation, please contact Bethe Tomasek – [email protected]
Rethinking Network Security: The Future and Why
In order to deliver cyber security with Cloud, IOT and all of the infrastructure diversity challenges we will continue to face, we need a new approach. In this session we will discuss how we arrived here and what direction we need to head in order to conquer the challenges of tomorrow.
Joel Hollenbeck is a Cyber Security Visionary with the Office of the CTO at Check Point Software Technologies Inc., the worldwide leader in securing the Internet. His background includes over 20 years of experience deploying application protection and network-based security. Mr. Hollenbeck has been securing networks and systems since 1994, including developing and executing on strategies to connect some of the most sensitive networks for the Federal Government and Financial Institutions to the Internet in the earliest days of commercial internet connectivity. Mr. Hollenbeck has served as a consulting Security Architect with Check Point Software Technologies advising a wide variety of clients across many verticals on Security Best Practices, Security Architecture, and deriving the maximum value from investments in security, prior to joining Check Point, Mr. Hollenbeck has held various security engineering, leadership and executive roles within organizations local to St Louis.
For a copy of this presentation, please contact Paxton Hayes – [email protected]
Break / Vendor Booth Time / Lunch
Homeland Security Perspectives for Building Cyber Security Capacity, Capability, & Resilience
Mr. Cappa is a Certified Information Systems Security Professional (CISSP) with over 30 years of experience in the Information and Communications Technology (ICT) industry, the majority of which dedicated to security—both in a cyber and physical environment. Mr. Cappa is highly skilled in recognizing potential security threats and assessing compliance with numerous security standards and regulations.
He has performed duties as team lead, supervisor and senior manager in both technical and non-technical delivery environments for multiple industries and sectors (e.g., Chief Information Security Officer for an intergovernmental organization and Director of Security Services in higher education among others).
Mr. Cappa has worked in the management, design, architecture and implementation of security solutions for customers in Americas, Asia, Europe, Africa and the Middle East, on multi-million-dollar projects. During his extensive career Mr. Cappa has delivered innovative solutions for the protection of information and assets
in general. He is also an active contributor to security professional organizations and working groups like the
International Information System Security Certification Consortium, or ISC2 and the National Institute of
Standards and Technology (NIST).
Dessert and Coffee Break / Vendor Exhibit Time
Concerned about Ransomware?
The Paradox of Securing Workloads
Servers contain an organization’s most valuable assets and underpin its operational capabilities. These are the ultimate targets of many cybercriminals. Yet strategies for defending them often rely on client-grade technologies like AV and EDR. This exposes the enterprise at a time when many companies are migrating workloads to the cloud. Gartner’s model for Cloud Workload Protection Platforms offers insights on the must-haves and nice-to-haves of server protection, on-prem and in the cloud. It also points to ways of safeguarding them from unknown attacks by using deterministic technology like moving target defense.
Arthur has more than 25 years of executive management and sales leadership experience, including over a decade and a half in the data and cyber security industry. Before joining Morphisec, he was Vice President at Big Belly, leading their private sector expansion. Prior to Big Belly, he served as VP Strategic Accounts at CloudLock, a cloud cybersecurity company, where he focused on large enterprise customers. Prior to that, Arthur built the major accounts strategy and portfolio for Digital Guardian. Previously, he held executive-level roles at Escort Inc., ArchiText, Polaroid and AT&T. He serves in the advisory boards of GreatHorn and Jeenie, two startups, and is a co-founder of Language Line Services.
Break / Vendor Exhibit Time
Multi-Layered Attack Techniques
Blended cyberattacks, once a page in the playbook of nation-state attackers, have now become regular practice for everyday cybercriminals. Learn about multi-layered defense techniques to defend against sophisticated blended cyberattacks through an interactive live attack demonstration.
Jason Shupp is a Director of Sales Engineering at Sophos and 20 year veteran in cybersecurity. Jason has been with Sophos since 2012 and is passionate about endpoint security technologies.