Data Connectors is proud to host the Florida-Southern Virtual Cybersecurity Summit.
Times for this Event are in Eastern Standard Time (EST)
The IoT storm … Will we survive the coming deluge?
IoT devices permeate the most intimate aspects of our everyday lives. Now more than ever we must address the risks associated with these always on, always connected devices!
Robert Falzon is currently the Head of Engineering within the office of the CTO for Check Point Software Technologies Inc., the worldwide leader in securing the Internet. His background includes over 20 years of experience in large-scale network security architecture, design, and deployment projects for government and business organizations spanning the globe. Currently leading a large team of the most talented cyber security engineers in the industry, Robert and his team are responsible for educating the market on the latest cyber security trends.
Other past responsibilities have included operational, management, and developmental duties for major accounts within EDS Canada’s network security team, and lead engineer for many major European Telco accounts with Alcatel in Paris France. While with Alcatel, Robert worked to assist those accounts in moving to emerging voice technologies while maintaining a focus on security.
After obtaining his CISSP certification, Robert went on to provide security process and audit/penetration testing training to major financial and energy customers within Europe and the Middle East, in addition to providing audit and penetration testing and consulting services to customers worldwide.
The Evolution of Ransomware:
One constant truth Sophos has found over our 30 years of creating effective defenses against ever-changing threats: there is no silver bullet in security. Solutions need to evolve and adapt to new and emerging threats all the time. When it comes to ransomware, the same rules apply. Bad actors are finding ways to exploit your organization’s weaknesses and their bag of tricks is continuously growing. You need an adaptive approach to keep up and defend your organization. Join our experts as they discuss ways you can navigate the dangerous waters where bad actors lurk.
Kris is seasoned engineer in the IT security industry, having previously spent time at MSPs and Cloud Service Providers before joining the Sophos team. He understands the complex challenges companies face to maintain security and compliance in an ever-evolving threat landscape, and he continually strives to help companies stay ahead of the bad guys.
Kris will bring his experience working with organizations all over the greater Arizona and Nevada area, and talk about how new developments will have impacted the way those firms interdict ransomware.
Get Rich Quick with Ransomware: A Lazy Hacker’s Perspective for Enterprises
Think Ransomware isn’t for you? In this enlightening talk, Gil Azrielant, co-founder of Axis Security, will quickly discuss the business opportunities, the technologies, the industry and the mechanics that attract hackers to ransomware. In the process Gil will reveal how some enterprises can use new technologies to defend themselves against attack.
Gil Azrielant is co-founder and CTO of Axis Security. Gil is responsible for technology strategy and the development of the company’s cloud-based zero-trust application access platform. Prior to joining Axis Security, Gil was co-founder & CTO of Cool Cousin, a cloud-based platform for travelers looking to unlock outstanding travel experiences.
Gil’s cybersecurity career began in the elite Unit 8200 of the Israeli Army Intelligence Corps, where he worked on advanced cyber security and code decryption. He served five years inside this elite unit, working as a researcher and team leader.
Gil holds a Bachelor of Science degree in Computer Science and graduated magna cum laude from IDC Herzliya, one of Israel’s leading academic institutions.
Automate or Die Trying: The New Cybersecurity Reality
As the nature of threats continue to evolve as well as the volume of threats increase, a new reality is setting upon cybersecurity teams – automation. Paired with human error and the insurmountable amount of data to manage, it is inevitable that a potential threat will slip through the cracks for businesses who rely too heavily on manual process.
Implementing automation could be vital in order to reliably protect your organization and ensure resilience through robust and repeatable processes.
Join our leading security and product development experts to learn:
With 10 years’ experience, Ryan Smith is Vice President of Product, responsible for bringing to market a world-class cloud security and compliance platform. In his current role, Ryan is responsible for the product vision and strategy, product delivery execution, and product culture at Armor. In previous roles, he served as the Director of Product Marketing for Armor, Director of Product for SandBox Commerce, and MuvData Product Manager for The New Office, Inc focused on bringing SaaS technologies to market for modern enterprises. Ryan holds a PhD in Mass Media and Communication Studies from European Graduate School.
Defense-in-Depth: 3rd Party Risk
Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations defending against inventive hackers penetrating their systems in 2020?
Building Cyber Resilience: Finding Factors not Fault
Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.
As a member of the LegalSec Council with the International Legal Technology Association (ILTA), Mark Sangster is a cybersecurity evangelist who has spent significant time researching and speaking to peripheral factors influencing the way that legal firms integrate cybersecurity into their day-to-day operations. In addition to his passion for cybersecurity, Mark’s 20-year sales and marketing career was established with industry giants like Intel Corporation, BlackBerry, and Cisco Systems. Mark’s experience unites a strong technical aptitude and an intuitive understanding of regulatory agencies. During his time at BlackBerry, Mark worked on the first secure devices for government agencies. Since then, he has continued to build mutually beneficial relationships with regulatory agencies in key sectors. Mark holds a Bachelor’s degree in Psychology from the University of Western Ontario and a Business Diploma from Humber College.
Lessons Learned from Real-life Ransomware Remediation Projects
Ransomware has organizations of all sizes and across all industries concerned that they may be the next to get attacked. Hackers have deployed wide-scale efforts to focus on known vulnerabilities, target users who are least prepared and may least expect it, and hone in on gaps in security with targeted exploits.
While helping to remediate active ransomware, the Dasher team has taken the time to pull together best practices and lessons learned from working with clients, with particular focus on the trends in attacks seen over the past few years.
In this presentation, Lead Solution Architect Kellen Christiensen will talk through this experience, sharing new information the team has learned. He will also make recommendations on what steps your organization should be taking in order to help prevent future Ransomware attacks.
Kellen has been with Dasher Technologies since 2016 and currently holds the title of Senior Solution Architect, Cybersecurity. Throughout his long career, Kellen has architected and implemented countless Cybersecurity and networking-related projects for organizations in manufacturing, hospitality and healthcare for both Small Businesses and Enterprises. Kellen is an expert in solutions from companies like Palo Alto Networks, Aruba, Cisco, Tenable, F5 and many many more in both the physical and cloud space.
Lunch / Solutions Showcase Open
Defending our Nation’s Critical Infrastructure in a time of Crisis
Klint will discuss the linkages between cyberspace and physical systems and best practices for reducing those vulnerabilities. Resilience is just as important as defense, and forming a relationship with CISA will help you as a security professional to stay up-to-date, and know how to report incidents to your local authorities.
He will provide an in-depth analysis of securing IT assets and maintaining operational capabilities. CISA works closely with industry leaders, technical experts, and academic leaders throughout the region. Today, they will share some insights and advice on best practices, policies and procedures, based on the guidance from The Department of Homeland Security – Cybersecurity and Infrastructure Security Agency (CISA).
Our Chief Strategy Officer, Michael Hiskey, will introduce him and wrap–up the presentation before we take a short break and continue with our afternoon educational sessions.
Klint Walker is the Cyber Security Advisor for Region IV which covers Alabama, Florida, Georgia, Kentucky, Mississippi, North Carolina, South Carolina, and Tennessee. As the CSA, Klint is the liaison between Federal services and State, Local, territorial and Tribal Governments, Critical Infrastructure and Private Industry. He serves as the focal point for communications to promote Cyber Preparedness, incident response, risk mitigation and situational awareness. He provides direct coordination, outreach, and regional support in order to protect cyber components essential to the sustainability, preparedness, and protection of the Nation’s Critical Infrastructure and Key Resources (CIKR) and State, Local, Territorial, and Tribal (SLTT) governments
Mr. Walker has previously held positions as an Information Systems Security Officer for the Department of Health and Human Services where he assisted in establishing the Computer Security Incident Response Center (CSIRC).
Mr. Walker also held the position of Chief Information Security Officer for the National Air and Space Intelligence Center (NASIC). In this role he was responsible for the operational resiliency of classified networks and facilities in adherence with DoD Standards and guidelines.
SecurityScorecard – CyberSecurity Ratings: Market Forces and Future Considerations
In this session, David will examine the most prevalent issues that attribute to third party breaches. He will review the challenges surfaced by the current work from home requirements, new COVID-19 risks, and additional concerns posed by the necessity for expanded collaboration.
He will explain what is a cybersecurity rating, and what are the major factors that comprise one. Comparing this with traditional Vendor Risk Management, he will revisit some of the challenges due to questionnaire exchange, manual processes, third-parties with access to sensitive data, and risk mitigation strategies.
David will explain the key elements included in a Cyber Risk Management solution, and contrast the drawbacks of point-in-time solutions that try to address these risks. Highlighting a recent case study, he discusses key requirements–such as automation, collaboration, centralized insights, prevention, and maximizing ROI–which led to multi-million dollar savings.
Looking to the future, David will share some cybersecurity rating predictions, discussing the major tailwinds in vendor risk management. He will explain how these solutions enable organizations to make more informed, less risky, and decisions faster.
David Ortiz is the Senior Director of Systems Engineering, Western United States and Asia territories, at SecurityScorecard.
With over 20 years in Network and Security industries, David has worked closely with Fortune 500 and SMB companies and partners to architect security solutions, including SaaS, Cloud, Mobile, and Security technologies. He has previously held management positions at HPE, Symantec, and Novell in strategic roles within Engineering, Business Development, Sales, and Services. In addition, he holds certifications from Cisco, Oracle, VMware, Fortinet, to name a few. He has trained hundreds of professionals in networking and security technologies. David holds an MBA from Santa Clara University.
The Anatomy of A Cyber Incident Response – Dissecting A Real-World Event & Critical Mitigation Steps
It’s the day IT leaders dread — Ransomware has taken control of your entire network. A few hours ago, everyone was working productively, and now the entire company has come to a screeching halt. The network, email, CRM, ERP, internal and customer databases are down. Could this have been prevented? The answer is almost always: Yes
With cybersecurity and network experience spanning more than two decades, Michael C. Sullivan is focused on keeping an organization’s data healthy and safe. Michael’s core capabilities include network security, routing, switching, wireless, and WAN optimization with an emphasis in cybersecurity. He is a CISSP and Certified Ethical Hacker along with 4011 and 4013 recognitions from the National Security Agency (NSA) and Committee on National Security Systems (CNSS). Under his leadership, the network and security teams provide in-depth consulting and implementation services to architect complex security and network solutions for government and private sector organizations.
Michael holds a BS in computer science from Framingham State University, in Framingham, MA and is a native of the Boston area.
Managing all Types of Risk in Today’s Cybersecurity Landscape
Risk comes from all angles in 2020 users, vendors, partners, systems. In this panel, we will discuss some of the many facets encountered by security leaders in organizations of all sizes, with particular focus to the threat landscape seen across the country.
Understanding and Combating Credential Stuffing Attacks
Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.
In credential stuffing attacks, threat actors use stolen credentials from one breach to take over users’ other accounts. This is effective because, according to Google, 65% of people reuse passwords across multiple accounts. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.
Join Auth0 to learn:
Chris Scott is a Senior Solutions Engineer at Auth0. Leveraging his past experience in both software development and enterprise sales, Chris provides education and guidance to security professionals looking to strengthen their identity strategy.
The Last Line of Defense: The Importance of having a robust and comprehensive Data Protection strategy
Data protection is experiencing a resurgence. Historically its been seen as an innovation backwater and as “insurance”, but with the growth of Ransomware and cybercrime, and increasing risk, organisations are having to modernize their data protection architectures and strategies to ensure that data can be recovered quickly to ensure that an Organisation can survive an attack. Join this session to learn about the latest innovations in the data protection space and how they can be deployed to provide a comprehensive last line of defence.
David joined Pure Storage in October 2018 as the Rapid Restore Solutions Director and is responsible for the Rapid Restore solutions roadmap, working with our Data Protection partners (Veritas, Veeam, CommVault & Rubrik) and making sure the Pure sales field have all the tools and enablement they need to be successful. Previously, David spent a year at Amazon Web Services building a competitive team to work directly with Amazon’s sellers and customers. Before that David spent 17 years at Veritas Technologies in a number of roles – SE, SE Manager and later was responsible for building a Competitive Intelligence team. He left Veritas as the Director of Competitive and Market Intelligence in 2017.
In case you have missed it, we’re in an election year. The storied 2016 DNC hack started with an email, like 90% of security breaches we all see in our own organizations – public and private. With so much focus on the election cycle on “fake news,” we often forget that the requirements to prevent election hacking are very much the same as the ones to prevent any kind of cyberthreat.
What have we learned from the focus on election security that could help us all on our day-day-day cyberthreat avoidance?
No politics, please!
Introduction to Proactive Prevention
Despite continued infosec investments, data breaches continue while companies contend with
complicated security architectures composed of disconnected technologies that produce mountains of non-actionable data. A renewed focus on prevention may hold the answer. Security architecture can be broken down into three main elements: Prevention, Detection and Remediation. Prevention should be considered the most strategically important defense element, as by default good true time zero prevention dramatically reduces latency, risks and operational costs of the security structure as a whole. As advanced threats evolve and data center transformation forces enterprise teams to consolidate security, the need for faster, easier and more deterministic threat prevention is essential, thus corporations need to consider a purpose-built stack of true prevention capabilities, that isn’t available in a singular off-the-shelf solution, and add Detection based tools, which by definition have a huge latency, false alerts and are cost prohibitive, where and when appropriate, but not as a prevention tool.
Netta Schmeidler, VP Product at Morphisec, has more than 25 years of experience delivering complex enterprise applications and managing global development groups and product teams. Her broad expertise includes all aspects of defining, building and successfully bringing solutions to market. Prior to Morphisec, Netta held senior product management and engineering roles at VMware (Digital Fuel), BMC, Identify Software, and Mercury. She received an MBA from Tel Aviv University, and a BSc in Computer Science from Hebrew University.