• Home
  • Attend
  • Sponsor
  • Call for Speakers
  • Our Partners
  • News
  • Subscribe
Data Connectors Logo
  • Home
  • Attend
  • Sponsor
  • Call for Speakers
  • Our Partners
  • News
  • Subscribe

    Detroit Cybersecurity Conference
    March 14, 2019

    Includes Keynote Session and CISO Panel
    • Register Now

    CISO PANEL

    • Will Mangold
      President
      ISSA Motor City
    • Arun DeSouza
      Chief Information Security & Privacy Officer
      Nexteer Automotive Corporation
    • Tony Robinson
      Chief Information Security Officer & Chief Technology Officer
      Pioneer Technology
    • Doug Copley
      CIO & CISO
      Michigan Professional Insurance Exchange

    CHECK-IN AND OPENING INTRODUCTIONS

    8:15 am - 8:45 am

    Data Connectors is proud to host the Cybersecurity Strategies Conference.

    Session Two

    9:15 am - 9:45 am
    • Al Sterling
      Solutions Engineer

    The Bots are Coming!

    Actually, they are here. They now represent over 50 percent of internet traffic. But not all bots are bad. There are many good bots, such as chat bots and search engine bots, that we rely on in our day-to-day digital lives. You do need to know the difference and take control of your bot traffic—they cannot be ignored and you cannot just block them all. In this presentation, we will look at the growth of bots, good bots versus bad bots, what to look for in a bot mitigation solution and a few use cases.

    Download the Presentation

     

    Speaker’s Bio:

    Al Sterling has been in the network and application performance space for 20 years, with the last few years specializing in the DNS and Security space. His customer service experience includes working with over 3,000 Oracle Dyn customers – the top banks, social media companies, and ecommerce sites.

    Break

    9:45 am - 10:15 am

    Break / Vendor Booth Time

    Session Three

    10:15 am - 10:45 am
    • Brad Blodgett
      Systems Engineer

    Win Big with IT Resilience

    Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto is changing the way disaster recovery, data protection and cloud are managed. With enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds. Zerto is trusted by over 6,000 customers globally and is powering resiliency offerings for Microsoft Azure, IBM Cloud, AWS, Sungard and more than 350 cloud services providers

    Download the Presentation

     

    Session Four

    10:45 am - 11:15 am
    • Abhik Mitra

    Time is Up: Rethink DLP

    Legacy DLP has failed all of us in security! The promise of Data Loss Prevention has turned into an endless cycle of policy management, user blocking and blind spots–all while missing the key to the plot: protecting the *user’s* data. Join this session to hear why legacy DLP has pitfalls, interesting data around insider threat and leakage and how and why you should be thinking about protecting your users over preventing them from doing their work.

     

    Speaker’s Bio: 

    Abhik Mitra is a product marketing manager at Code42. With more than 10 years of experience in Enterprise Technology, Abhik is the strategic conduit between the customer and Product Management, Sales, and Marketing teams at Code42. Prior to Code42, he served as a global product manager for companies including Xiotech, Kroll Ontrack, and Imation.

    Lunch

    11:15 am - 11:45 am

    Break / Vendor Booth Time / Lunch

    Session Five

    11:45 am - 12:15 pm
    • Andy Mansfield
      Systems Engineer, Juniper Networks

    Enabling Dynamic, Adaptive, Multicloud Security

    Juniper’s Software-Defined Secure Network (SDSN) cyber security platform integrates, centralizes, and automates defense from today’s sophisticated threat landscape by automatically and dynamically detecting and responding to threats as a whole ecosystem rather than as an individual entity. This session will highlight how every element in an SDSN framework (physical, virtual, router, switch, firewall, edge) becomes an active participant in detecting and containing threats.

    Break

    12:15 pm - 12:45 pm

    Break / Vendor Booth Time

    Session Six

    12:45 pm - 1:15 pm
    • Jamie Duff
      Director of Corporate Markets

    A new approach to email security for Office 365

    For hackers, Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.

    Download the Presentation

    Keynote Session

    1:15 pm - 2:15 pm
    • SSA Benjamin Simon
      FBI Detroit Cyber Task Force

    Cybersecurity from the FBI’s perspective

    FBI Special Agent Benjamin Simon and FBI Intelligence Analyst Matthew Schwieger are members of the FBI Detroit Cyber Task Force. The Cyber Task Force is responsible for criminal and national security computer intrusion investigations in Michigan.

    Break

    2:15 pm - 2:40 pm

    Break / Vendor Booth Time

    Session Eight

    2:40 pm - 3:10 pm
    • Michael Landewe

    How They Bypass Office 365 Security

    The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.

    During this session, we’ll demonstrate how to protect Office 365 from:

    • Email-based phishing, spoofing, and malware
    • Account takeover, insider threats, compromised Microsoft credentials
    • Loss of sensitive data from OneDrive, SharePoint and Office 365

    Session Nine

    3:10 pm - 3:40 pm
    • Andy Crocker
      Regional Consulting Engineer, Fortinet

    How Do They (Cyber Criminals) Get In? How To Prevent a Breach.

     

    Speaker’s Bio:

    Andy Crocker is a Security Consulting Engineer for the Advanced Threat Protection organization within Fortinet, Inc..  Andy has been at Fortinet for over 3 years exclusively supporting our Advanced Threat Protection products.  Andy is NSE 7 certified.

    Andy has spent over 35 years in Information Technology.  16 of those years were at FedEx in Memphis, supporting all facets of the IT environment there, including networking and network engineering.  The last 20 years Andy has been a Sr Systems Engineer for several organizations providing technical support in a pre-sales role.  Technical training has been a large part of the various roles and responsibilities.

    Session Ten

    3:40 pm - 4:00 pm
    • Adam Goslin
      CEO

    8 Steps to Slay the Compliance Dragon

    If you don’t feel the compliance dragon breathing down your neck yet, you will soon. But you can slay that dragon. I’ve been where you are, and I know the frustrations, the chaos, the feeling of barely maintaining control. There is a way out. The annual compliance cycle doesn’t have to be a cluster storm of insane stress and chaos. More and more CISOs are discovering that their compliance activities can be smooth, efficient and trouble-free. Imagine running a compliance process that’s simply no big deal!

    The key to taking control of compliance is taking stock of your current situation and strategically gaining control over the moving pieces, one component at a time—then maintaining your compliance efforts with very doable rinse/repeat maintenance activities.

    This presentation shares the 8 critical steps you need to follow to slay the compliance dragon—for good. Tired of feeling beaten up by your annual compliance cycle? Then let’s slay that dragon!

    Speaker’s Bio:

    Adam started in compliance just like most Total Compliance Tracking users: in a corporate IT department, trying to figure out how to manage annual audits. After herding the compliance cats—first on the front line and then as a manager—Adam decided to help others in the security and compliance space make the process easier. Leveraging his background in systems development, Adam founded TCT with the mission to improve the compliance management universe.

    CISO PANEL

    4:00 pm - 5:00 pm
    • Will Mangold
      President
      ISSA Motor City
    • Arun DeSouza
      Chief Information Security & Privacy Officer
      Nexteer Automotive Corporation
    • Tony Robinson
      Chief Information Security Officer & Chief Technology Officer
      Pioneer Technology
    • Doug Copley
      CIO & CISO
      Michigan Professional Insurance Exchange
  • Sheraton Detroit Novi Hotel
    8:15 am - 5:00 pm
    21111 Haggerty Road
    Novi, MI 48375
    248-349-4000

    Event Sponsors

    • Acalvio
    • AppGuard
    • Arctic Wolf
    • Avanan-1-e1531863424334
    • BlackBerry-e1519318800435
    • Cadre
    • Change-Dynamix
    • Cirro-vertical-col-RGB
    • CI-Security-e1533139983491
    • Code42-e1525885926109
    • Darktrace
    • Data Partner Inc
    • Data Strategy
    • Duo-e1532031393962
    • Folco logo
    • Fortinet (1)
    • Garland-Technology-e1524860270152
    • Gemalto-e1528128061522
    • Gigamon-updated-logo-Orange-Box-Logo
    • Infoblox
    • ISSA_MotorCityChapter
    • Juniper
    • NET_fullcolor_stacked
    • Nexum
    • onelogin
    • Oracle Dyn
    • Okta
    • PacketViper-Logo-Horizontal-01-8-17-e1501599685373
    • PaloAlto
    • Quorum_Logo_wotag_110316
    • rapid7
    • secudrive
    • Siegel Gross & Tou
    • Silent Break
    • slashnext-seo-logo
    • Spirion-1-e1529592293282
    • Total Compliance Tracking
    • Teals-Microsoft-Philanthropies-e1522683235402
    • Tempered Networks
    • TenableLogo-updated-4-17_FullColor_RGB-e1492788853166
    • Trace3
    • VadeSecure
    • varonis-13
    • Velocloud VMware
    • Whitesource-e1503411956331
    • Yubico
    • Zerto
    Become a sponsor
Contact Us
Privacy Policy
Media Kit
500 Chesterfield Center, Suite 320
Chesterfield MO 63017
636-778-9495
[email protected]
Data Connectors Logo
Data Connectors - 2018