Data Connectors is proud to host the Houston Cybersecurity Conference.
Data Connectors is proud to host the Houston Cybersecurity Conference.
Evading Death by a Silver Bullet
The world of cyber security is constantly evolving and as such security and privacy practitioners need to continue to adapt to protect their information assets. In this ever changing world it is crucial that companies employ effective strategies to improve their security posture. This session will look at the trends in cyber security, the evolving threats to organizations, and what some of the most effective strategies can be employed to reduce risk. In addition we will discuss the pitfalls that have plagued organizations efforts to prevent data breach and loss.
Michael Gutsche is a Security Strategist at Microfocus. In this role, Mr. Gutsche is responsible for driving strategic initiatives for the ESP Security Strategy group and providing thought leadership and insight regarding the ever changing global threat landscape. Mr. Gutsche has also held executive roles as CISO of Mercy Health and SVP of Operations at MasterCard. With over 20 years of experience building large enterprise security and operations programs, he understands the needs of the business and how to position Information Security as a Strategic Pillar for IT.
A Practical (low cost) Approach to Securing East-West Traffic & Critical Data
Despite best efforts organizations continue to struggle detecting and stopping attacks that lead to costly exposures of critical data.
Why is this? One reason is that organizations typically do not have a simple means to provide visibility to threat as they move East-West across their network. Leaving them blind to up to 80% of their threat surface.
Come learn how to leverage simple techniques to make your existing threat detection and investigation processes much more effective.
Learn also how to add layers of defense to protect your most critical assets.
Gary Southwell is the General Manager of ARIA Cybersecurity Solutions. With over 25 years in the security industry, he knows firsthand how and why current security tools and approaches are failing at stopping data breaches. Unique to the market, the ARIA SDS solutions are leading the charge in developing military-grade security-in-depth solutions to overcome the challenges to uncompromised enterprise-wide security: accelerating incident response, complying with data privacy regulations, and protecting an organization’s critical data no matter where it is stored, used, or accessed. Learn more about ARIA Cybersecurity Solutions products at: ARIACyberSecurity.com
Coffee Break / Vendor Exhibit Time
The Current Threat Landscape & Enterprise Remediation
The threat landscape is changing rapidly, we are moving away from consumer focused attacks and entering the age of heavy ransomware infection of organizational networks, such as businesses, hospitals, and municipal networks. To better understand this trend, we delve into the detections, trend lines and real world events that coincide with this surge of ransom threats, to better understand where they came from and where they are going.
In this presentation, we will be discussing numerous families of ransomware who have had serious change to how much we see of them over the years, specifically 2016 – 2019, including ransom families like Ryuk, GandCrab and Locky. In addition to this, we take a look at local detections of the top ten countries dealing with ransomware today and provide guidance on how to deal with today’s ransomware threat.
Attendees should expect to:
Adam is the Head of Malware Intelligence at Malwarebytes, with over 14 years of experience fighting malware behind the scenes and on the front lines. Adam has analyzed APT/state-sponsored threats, as well as threats to government and private industry. In addition to research and analysis, Adam has provided conference talks and developed technical courses on topics from basic malware analysis to malware evolution and threat intelligence. He has had articles published in SC Magazine, TechCrunch, and other notable tech publications and is frequently quoted on computer security matters by news organizations.
Real talk on ransomware
We all know what ransomware is – we know the stats, we’ve seen the headlines, we’re all in the mindset of “if, not when.” With all the fear, uncertainty and doubt constantly bombarding IT professionals, Arcserve dives into the realities of ransomware attacks and the real impacts on organizations. We offer participants an opportunity to “sound off” on ransomware and share experiences and challenges with your peers to better understand how prepared organizations are to defend against ransomware attacks.
Mark is currently Arcserve’s Director of Solution Strategy for North America, where he focuses on collaborating with the Arcserve sales team to provide their customers with a comprehensive data protection and disaster recovery solution that exactly fits their needs.
Mark has 25+ years of I.T. industry experience, with most of that time spent focusing on storage, data protection, business continuity and information governance.
The Cybersecurity and Infrastructure Security Agency (CISA) is the Nation’s risk advisor and at the heart of mobilizing a collective defense as we lead the Nation’s efforts to understand and manage risk to our critical infrastructure. Considering a large majority of our critical infrastructure is owned and operated by the private sector, collaboration is imperative to secure and allow us to address the systemic risks facing U.S. critical infrastructure. This talk discusses how CISA is working with partners to defend against today’s threats and collaborating to build a more secure and resilient infrastructure for the future.
George Reeves is a Cybersecurity Advisor with the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency.
Mr. Reeves works to foster collaboration and coordination on cyber preparedness, risk mitigation and incident response, and to provide cyber security resources, including training, exercises, and assessments, in support of the nation’s Critical Infrastructure Key Resource sectors and with state and local government.
Dessert and Coffee Break / Vendor Exhibit Time
The Paradox of Securing Workloads
Servers contain an organization’s most valuable assets and underpin its operational capabilities. These are the ultimate targets of many cybercriminals. Yet strategies for defending them often rely on client-grade technologies like AV and EDR. This exposes the enterprise at a time when many companies are migrating workloads to the cloud. Gartner’s model for Cloud Workload Protection Platforms offers insights on the must-haves and nice-to-haves of server protection, on-prem and in the cloud. It also points to ways of safeguarding them from unknown attacks by using deterministic technology like moving target defense.
Arthur has more than 25 years of executive management and sales leadership experience, including over a decade and a half in the data and cyber security industry. Before joining Morphisec, he was Vice President at Big Belly, leading their private sector expansion. Prior to Big Belly, he served as VP Strategic Accounts at CloudLock, a cloud cybersecurity company, where he focused on large enterprise customers. Prior to that, Arthur built the major accounts strategy and portfolio for Digital Guardian. Previously, he held executive-level roles at Escort Inc., ArchiText, Polaroid and AT&T. He serves in the advisory boards of GreatHorn and Jeenie, two startups, and is a co-founder of Language Line Services.
Automating Incident Response for SOC Survival
Today’s security operations centers (SOCs) do not have the time, energy, or resources to keep pace with the growing security skills gap and evolving threat landscape. Security operations need to be able to secure their organizations by doing more with less. This is where a security orchestration, automation, and response (SOAR) solution comes in.
Rather than being bogged down by arduous manual tasks, SOAR empowers your SOC by leveraging your existing people, processes, and technology to investigate and remediate threats at machine speeds. Swimlane’s Ric Lewis details how a SOAR solution works and demonstrates real-world use cases, including phishing, host alarms, and endpoint detection and response.
Ric Lewis focuses on strategic relationships and providing incredible support to his clients. He has worked with every major vertical from Oil and Gas, Finance, Federal Government, Managed Service Providers to and name a few on Security and Asset Management support.
Break / Vendor Exhibit Time
Protect Your Keys or Don’t Waste Your Time Encrypting Your Data
For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.
Brad Beutlich is an information security professional who has worked with numerous US based companies over the past 20 years, providing security solutions ranging from end-point, to data security. The last 11 years he has worked for Thales eSecurity providing security solutions that protect customer data, financial transactions and IoT device manufacturing. Brad holds a BS in Electrical Engineering Technology from Bradley University, and is an award-winning writer and speaker on numerous security topics. His passion as a historian is on brass-era (pre 1913) automobiles, of which he owns a 120-year-old car that runs on steam. As an avid skier, he hits the slopes on the weekends when possible. Brad resides with his wife and three children in Southern California.