CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Session Two9:15 am - 9:45 am
AV, EDR, NGAV…What’s Next in Endpoint Protection?
Antivirus has been around since the 1980s. How did it evolve in the past decade? What about hot, machine learning powered Next Generation Antivirus products promoted by well-funded startups? Or should we assume compromise and focus on the Endpoint Detection and Response (EDR) instead? What are the pros and cons of these approaches and where is endpoint security going next?
This interactive presentation will discuss the reasons behind the vulnerable state of endpoint security and include a demo of the infamous Rubber Ducky that remains practically unstoppable by today’s endpoint protection products.
You will leave this presentation with the following knowledge:
- Understand the current state of endpoint security and latest attacks
- Explore available endpoint protection tools, including Endpoint Detection and Response (EDR)
- Learn about benefits and shortcomings of modern endpoint protection tools and approaches
- See an advanced file-less attack in action
- Learn the latest best practices and approaches that promise to reduce threat surface and minimize breaches
Rene Kolga, CISSP, has over 15 years of cybersecurity experience in the areas of endpoint protection, insider threat, encryption and vulnerability management. Rene run Product teams at multiple Silicon Valley startups as well as Fortune 500 companies, including Symantec, Citrix, Altiris, ThinAir and Nyotron. Rene earned his Computer Science degree from Tallinn University of Technology. He frequently speaks on security topics at industry conferences like Black Hat, InfoSecurity and (ISC)2 Security Congress.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
Don’t Just Check The Box: Third-Party Security Best Practices
Join this session to learn how to enhance your risk-based third party security program. Todd will discuss how to quantify each vendor, what risks to access and how to look at the controls in place. Come with questions and ready to have a meaningful discussion around risk with vendors in your organization.
Session Four10:45 am - 11:15 am
Synchronized Security – Coordinating your defenses with shared threat intelligence
Security works better as a system. In this presentation, we will cover the threat landscape and emerging threats that we see across the globe, as well as a look into a coordinated defense against those threats. We will show a demo of how the coordination of security can help stop and isolate today’s complex threats.
Dan is the Channel Sales Engineer for the Rockies territory, and is based in Denver CO. He has worked in the CyberSecurity market for 15 years, and has been with Sophos for 2 years. Dan has an extensive background working in the Partner/Channel market including K12 and Higher Ed, as well as Enterprise. At Sophos, Dan helps customers and partners find the right fit of CyberSecurity solutions to help ensure their networks stay protected.
Lunch11:15 pm - 11:45 pm
Break / Vendor Booth Time / Lunch
Session Five11:45 pm - 12:30 pm
2019 Trends in Data-Centric Security and Privacy
For years, companies have tried to protect their data by locking down networks, securing applications, and restricting devices. Each of these methods expose security gaps, slow down access to critical information, and add complexity that impedes productivity. During this session, we will review a 2019 Virtru study conducted by Forrester that shows why organizations are adopting a data-centric-approach to data protection and share examples of how this approach facilitates the use of new cloud technologies, secure information sharing, and compliance with evolving regulations.
As Director of Solutions Engineering at Virtru, Brett brings more than 20 years of experience working with enterprise customers in information security, data management, and data privacy. Brett holds a BS in Computer Science from Kansas State University and is a perpetual student of technology.
Break12:30 pm - 12:45 pm
Break / Vendor Booth Time
Keynote Session12:45 pm - 1:30 pm
Understanding the cost of a data breach – separating fact from fiction
When it comes to the cost of data breaches there is a wealth of information and statistics – some real and some manufactured to create fear, uncertainty, and doubt. The program will focus on how to identify and quantify the various risks involved a data security breach across the organization including costs to infrastructure, business operations, reputation, and legal liabilities.
David Zetoony is an internationally recognized data privacy and security attorney that has been called a “Cybersecurity & Data Privacy Trailblazer,” and the top “Legal Influencer,” by legal sources such as the National Law Journal, Lexology, and JD Supra.
He is regularly called upon by some of the world’s most complex organizations to confront their most difficult United States and European privacy and security challenges. He has helped hundreds of clients design, or validate, their privacy programs against the GDPR and United States law, and has navigated complex data security incidents and security breaches on behalf of numerous clients. He has also successfully defended companies’ privacy and security practices before the Federal Trade Commission, and other regulatory agencies.
He leads the firm’s global data privacy and security practice. He is frequently asked to speak and write on issues of domestic and international data privacy and security law, and has authored the American Bar Association’s lead treatise on the European GDPR.
David’s book, The EU GDPR General Data Protection Regulation: Answers to the Most Frequently Asked Questions is available here.
Break1:30 pm - 1:45 pm
Break / Vendor Booth Time
Session Seven1:45 pm - 2:15 pm
The current Malware Threat Landscape – and Best Practices for Enterprise Grade Remediation
Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.
This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.
Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.
Session Eight2:15 pm - 2:45 pm
A new approach to email security for Office 365
For hackers, Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Break2:45 pm - 3:00 pm
Break / Vendor Booth Time
Session Nine3:00 pm - 3:30 pm
Segmentation Made Simple
Leveraging the Host Identity Protocol for Natively Secure Networking and Operational Efficiency
Robert Kern is a Regional Sales Director for Tempered Networks with nearly thirty years of experience providing network and security solutions for customers in multiple market verticals throughout the central United States as well as Mexico.
Robert has tenure with several notable and innovative companies, including SynOptics (Bay Networks) and F5 Networks. With his pioneering attitude and keen sense of business, Robert was instrumental in bringing their disruptive solutions to market.
Based in Dallas, Robert has cultivated long-standing relationships with Fortune 500 accounts, from oil and gas to global transportation companies, and is well-respected for his ability to map solutions to meet critical business challenges.
His other interests include a passion for restoring and collecting Pontiac muscle cars, raising funds for wounded veterans, and working on family ancestry.
Session Ten3:30 pm - 4:00 pm
The Evolution of IRM: Protecting Sensitive Data In Today’s Collaborative, Digital Economy
In order to do business today, organizations have to externally collaborate & share data. Traditional security has struggled with how to easily address this – whether with onprem or cloud collaboration repositories, such as OneDrive or Box.
IRM, or Information Rights Management, has evolved so business’ can easily secure, track & monitor their data anywhere it travels – and revoke it back in real-time! Learn how this space is changing to adapt to the collaborative, digital economy we do business in today – and why traditional security is only able to fulfill part of the requirement.
Registration has closed for this conference