Data Connectors is proud to host the Virtual Hartford Cybersecurity Summit.
Managing Digital Risk in Transformative Times
Digital transformation is not only changing how companies think about business. It is changing how we think about risk. We need to *act* on risk, not worry about it. We need to start and end with the basics. In this session we review several key areas of digital risk management to target as you are challenged to be a key contributor in your company’s digital journey.
Ben Smith is Field Chief Technology Officer (Field CTO – US) with RSA, a Dell Technologies business. With 25 years’ experience in the information security, networking and telecommunications industries, he regularly consults on RSA’s security and risk management solutions. His prior employers include UUNET, CSC, and the US Government, along with several technology-oriented startups. He holds industry certifications in information security (CISSP), risk management (CRISC), and privacy (CIPT), and has presented on RSA’s behalf internationally at cybersecurity events sponsored by Gartner, FS-ISAC, SANS, IANS, CERT/SEI, RSAC, ISSA, (ISC)2, ISACA, Infosecurity, IIA, RMA, BSides, ASIS, InfraGard, HTCIA, SecureWorld, MWCA, ICI and other organizations.
Improving Security for Remote Working – 13 Key Recommendations
Many organizations are in the middle of a work from home (WFH) trial by fire. What are the security implications of this abrupt change? What are some key security best practices that have become clear during this time? Even after this current pandemic recedes it is fair to assume that WFH is now firmly part of the business continuity new normal. In rapid fire form, this session will provide 13 key recommendations that you can apply now and into the future to improve the security of your WFH program.
Matthew Gardiner is a Principal Security Strategist at Mimecast and is currently focused on evangelizing cybersecurity both inside and outside of Mimecast. With more than 20 years focused in security, Matthew’s expertise in various roles includes email security, threat detection & response, network monitoring, SIEM, endpoint threat detection, threat intelligence, identity & access management, Web access management, identity federation, cloud security, and IT compliance at RSA, Netegrity, CA Technologies, and Mimecast. Previously he was President and a member of the board of trustees of the security industry non-profit, the Kantara Initiative. Matthew has a BS in Electrical Engineering from the University of Pennsylvania and an SM in Management from MIT’s Sloan School of Management.
Cyber Resilience: Rethinking your data protection strategy in the age of ransomware.
Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!
Andy Fernandez is a Global Product Marketing Manager at Zerto. With a focus on product marketing and launches, he strives to translate technical innovation to business value. After spending years in various technology companies and entrepreneurship pursuits, Andy is focused on launching industry-leading products and accelerating their adoption.
Best Practices: PAM Security and Data Privacy
The world of IT is changing and evolving exponentially, and our customers are telling us that the expansion of the perimeter is making it harder to secure and keep track of privileged credentials. In many organizations exist tens of thousands of privileged accounts across thousands of devices. Understanding your organizations unique risk appetite and tolerance can help guide decisions made to secure privileged accounts. Gartner lists Privileged Access Management (PAM) as the #1 security project for CISO’s in 2020.
Christopher L. Hills has more than 15 years’ experience as a Senior Security and Architecture Engineer operating in highly sensitive environments. Chris is a military veteran of the United States Navy and started with BeyondTrust after his most recent role leading a Privileged Access Management (PAM) team as a Technical Director within a Fortune 500 organization. In his current position, he has responsibilities as an acting Deputy CTO. In his free time, Chris enjoys spending time with his family on the water with their 32-foot speedboat in the summer and taking to the sand dunes and off-roading in the winter.
The Evolution of Zero Trust in a New Age of Security
As we shift our focus from the data center to the cloud and containers, it is important to keep the Zero-Trust security model in mind. Hear how to make sure the new frontier of cloud, SaaS applications, and serverless functions are staying just as secure as your Datacenter with Check Point.
Cory Pellegren is a Security Engineer for Check Point Software Technologies for the past 5 years. In his role, he is making sure that all Check Point customers around New England are secure everywhere – in the datacenter, cloud environments, mobile and endpoint devices, as well as IOT. Previous to joining Check Point, Cory worked for a large MSSP, maintaining some of the world’s largest companies security infrastructure.
Creating Your Defense Plan Against IoT Security Threats
Over the past decade, the Internet of Things (IoT) has exploded in size, surpassing 22 billion internet-connected devices in early 2020. While IoT devices can provide a new level of convenience and efficiency across an organization, they also create opportunities for hackers to compromise the security of your network and gain access to critical data.
In this webinar, we’ll identify the top cybersecurity risks associated with IoT devices and effective ways to mitigate common vulnerabilities linked to: port forwarding, VPN, credential management, data encryption, firmware signing, and firmware upgrades.
Ryan Malley is a Solutions Engineer working with Verkada to educate businesses across the country about the benefits of cloud managed services. Ryan has been working in the IT world for almost 10 years and was one of the founding members of Verkada’s SE team. He’s been active in the startup space for several years, working in physical, IT, and cloud security for a variety of up and coming players in the industry. In his current role, Ryan has built a series of technical seminars to educate new employees and potential customers on the exciting new world of cloud infrastructure.
Security without Compromise – A Key Requirement for the Modern Security Architecture
Companies are moving to cloud architectures to simplify network management.
For network administrators, securing web, email, and data access is a major concern – 92% of attacks come from email and 6% of attacks from web browsing. No organization is immune and the cost of remediation averages $4M per incident.
Admins often try a myriad of solutions to prevent network attacks, such as firewalls, sandboxing, or anti-virus scanners. Unfortunately, these solutions either severely restrict web access which lowers worker productivity or rely on detecting threats that have already entered the network.
Cloud-based isolation helps network administrators provide the advantages of moving their network to a cloud architecture without compromising safety. Cloud-based isolation technology prevents malware and phishing attacks through web and email while also improving SaaS apps usage and end-user browsing.
James Locus is a Product Evangelist for Menlo Security. Prior to Menlo Security, he worked with Cisco Meraki for Enterprise Switches as a Product Marketing Manager. Recreationally, he enjoys Latin dancing and international travel.