Data Connectors is proud to host the Indianapolis Cybersecurity Conference.
Data Connectors is proud to host the Indianapolis Cybersecurity Conference.
Windows 10 Migrations and In-place upgrades – How to get it done right
Many Companies have been scrambling for a while now to beat the deadline and get their remaining Win 7 machines migrated to Windows 10.
Even after Microsoft discontinued Windows 7 on January 14th migrations are still in full swing. At the same time Win10 In-Place Upgrades to keep up with Microsoft’s rapid release program are posing a new, but very similar challenge already.
Start managing your endpoints properly and proactively. Avoid the inevitable long term implications of a stop-gap OS migration approach. A proper long term upgrade strategy makes it far easier to support and maintain your endpoints, enhances the overall consistency and leaves you less vulnerable to attacks.
In this presentation we outline the different migration approaches taken today. We also show how to overcome some common pitfalls and get migrations done quicker, chaeper and less intrusive. Get some valuable advise on how to properly manage the entire life-cycle of your PCs, Servers and Mobile Devices, where patch deployments, software updates, OS migrations and On-demand machine rebuilds simply become a routine task.
With the right toolset, migrations should no longer be considered large and resource consuming projects for IT to conquer frequently.
Holger is a seasoned UEM expert with over 20 years of experience in Endpoint Automation for company of all sizes.
He has designed and implemented UEM solutions for many large enterprises as well as SMB customers. As a former Product Manager in the UEM space he is also familiar with most company’s general challenges and common obstacles in achieving a secure, easy to manage and support, consistent user workspace.
OS Deployment and Upkeep Strategies
Real talk on ransomware
We all know what ransomware is – we know the stats, we’ve seen the headlines, we’re all in the mindset of “if, not when.” With all the fear, uncertainty and doubt constantly bombarding IT professionals, Arcserve dives into the realities of ransomware attacks and the real impacts on organizations. We offer participants an opportunity to “sound off” on ransomware and share experiences and challenges with your peers to better understand how prepared organizations are to defend against ransomware attacks.
25 + years in the Technology industry has given John a unique understanding of an organization’s needs in both the protection and archiving of critical data. He brings insights from long careers at Cheyenne Software, Mimosa Systems, Iron Mountain Digital, and Computer Associates as well as several years ‘experience consulting as a Backup Recovery expert.
Coffee Break / Vendor Exhibit Time
Utilizing the MITRE Att&ck Matrix
Utilizing the MITRE Att&ck Matrix to identify security risks, gaps and where you need to focus your organization’s security efforts.
Rich Comber, Head of Threat Prevention Engineering, Americas, has been in IT for over 30 years and in cyber security for over 20 years. He’s been with Check Point Software since 1999 and always served in technical roles, SE, SE Manager, Regional Specialist, part of Check Point’s Emerging Product group since its creation in 2015, Threat SME and most recently manager of all the Threat SMEs in the Americas.
The Paradox of Securing Workloads
Servers contain an organization’s most valuable assets and underpin its operational capabilities. These are the ultimate targets of many cybercriminals. Yet strategies for defending them often rely on client-grade technologies like AV and EDR. This exposes the enterprise at a time when many companies are migrating workloads to the cloud. Gartner’s model for Cloud Workload Protection Platforms offers insights on the must-haves and nice-to-haves of server protection, on-prem and in the cloud. It also points to ways of safeguarding them from unknown attacks by using deterministic technology like moving target defense.
Arthur has more than 25 years of executive management and sales leadership experience, including over a decade and a half in the data and cyber security industry. Before joining Morphisec, he was Vice President at Big Belly, leading their private sector expansion. Prior to Big Belly, he served as VP Strategic Accounts at CloudLock, a cloud cybersecurity company, where he focused on large enterprise customers. Prior to that, Arthur built the major accounts strategy and portfolio for Digital Guardian. Previously, he held executive-level roles at Escort Inc., ArchiText, Polaroid and AT&T. He serves in the advisory boards of GreatHorn and Jeenie, two startups, and is a co-founder of Language Line Services.
Lunch / Vendor Exhibit Time
The FBI is the lead federal agency for investigating cyber attacks by criminals, overseas adversaries, and terrorists. The threat is serious-and growing. Cyber intrusions are becoming more commonplace, more dangerous, and more sophisticated. This session will describe the FBI’s Cyber Program, and discuss the different types of cyber threats targeting internet users, as well as threats targeting our national security.
Michael Alford has been a Special Agent with the FBI in Indianapolis for over 12 years. He has a Master’s of Science in Digital Forensics from the University of Central Florida, and has over 17 years of experience in computer security and computer forensics. Michael routinely investigates complex computer intrusions, including national security intrusions and financial fraud.
Dessert and Coffee Break / Vendor Exhibit Time
Cybersecurity as a System
Organizations here in the US face a pretty immense challenge when it comes to cybersecurity. Doing more of the same is clearly not the answer. Instead we need to evolve our approach and move to cybersecurity as a system.
Mike Balatzis Sophos Senior Channel Account Executive. has been in the IT industry for 20 years. Experienced Cybersecurity expert, Microsoft enterprise solutions, including Azure and AWS Cloud Infrastructure. Focused on customer relationships, customer productivity, and most importantly helping create secure networks. Passionate about tackling security challenges with clarity and confidence
Deception Technology, Luxury Item or Lifeline?
A common deception technology misconception is that it is a luxury item meant only for companies with mature security operations or large budgets. This session will provide insight into how deception has evolved, its fit within the security stack, and why organizations both large and small are turning to deception for accurate detection, building predictive defenses, and accelerated incident response. Join in to hear about real-world deployments and top use cases. Attendees will leave with insight into the value and benefits that defenders have realized from adding deception into their security operations programs and why it is often a lifeline for defense against today’s advanced attackers.
GB has 3 decades of experience in I.T. ranging from network support, programming, application & network performance management to security architecture & cyber security across verticals such as airlines, government, healthcare, manufacturing and medical devices. GB has a BA in Computer Science, Mathematics and Physics and an MBA in MIS and Operations. GB has held numerous industry certifications and is a Certified Ethical Hacker (CEH) and Certified Information Systems Security Professional (CISSP). GB lives in Aurora, IL and is extensively involved in community service.
Break / Vendor Exhibit Time
What We Don’t Know
A discussion of the many things we don’t know that will hopefully enlighten and entertain you. Expect to learn something new in this discussion of the unknown and how it can affect our information technology lives. Learning something entirely new and surprising to you can be fun in some cases or a horrifying shock in others, and this session will attempt to provide you some of the former and help you avoid the latter.
For a copy of this presentation, please contact Bethe Tomasek – [email protected]
Advisory Systems Engineer Greg Austin has over twenty years of experience in the IT security industry, the last ten with RSA. After his planned career in fitness modeling failed due to his total lack of both fitness and good looks, Greg moved on to work in a variety of security practitioner roles and is interested in all facets of information, from the nitty gritty of cyber defense threat hunting to the critical management of governance, risk and compliance in IT organizations.