CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Session One9:00 am - 9:30 am
What is Robotic Decision Automation and Why Should I care?
Writing SIEM Rules and monitoring detection consoles is out. Not only do we not like it, it hasn’t proved to be particularly effective. The Respond Analyst is a new kind of analyst that increases capacity and improves the capability of any security team, regardless of size – without adding to the burden of an already overworked team. Powered by Robotic Decision Automation (RDA), the Respond Analyst is ideal for organizations that are collecting meaningful security data, but struggle with having the manpower and resources to properly analyze and triage security incidents.
Join us during this presentation to learn:
Why traditional human-centric monitoring based on rules and queries has failed and leads to analyst fatigue.
How the Respond Analyst uses RDA to eliminate concerns of ‘unattended alerts’ and missed clues by analyzing more security data – without filters or tuning.
How the Respond Analyst integrates with your existing technologies and workflows to speed response, modernize, and automate security operations.
Mike has over 25 years of experience in communications, networking, and security. He has sold, architected, and deployed SIEM solutions across the United States and around the world for companies like McAfee, NitroSecurity, and LogMatrix. Having spent many years helping security operations programs of all sizes design and implement security monitoring and log management solutions, Mike is expert in developing correlation rule sets and operationalizing processes and procedures to maximize efficiency. This expertise set the foundation for his belief in the value that automation can bring to cybersecurity. He shares that conviction each day as he helps Respond Software’s customers drive increased efficiency and explore how intelligent decision automation can transform their security programs. Mike’s academic background is in Computer Science, and he’s a veteran of the United States Air Force.
Session Two9:30 am - 10:00 am
About Tempered Networks
Our Proven Solution is Unlike Any Other
Originally developed for a global Fortune 50 manufacturer, our technology enabled the company to increase its competitive edge by modernizing their production network and increasing production output, while safeguarding them against cyber breaches. Today, IDN is available to the broader market and we’re uniquely positioned to help you overcome your thorniest networking challenges. We understand the significant burden created by complex, time-consuming, and costly work-arounds – not to mention the distressing security trade-offs.
Our identity-based solution leverages the IETF-ratified Host Identity Protocol (HIP), an industry breakthrough for secure communications. With HIP, your devices can be identified using strong cryptographic identities, rather than an IPv4 or IPv6 address. This means your networked devices can change location yet retain their strong ‘verifiable’ cryptographic identity.
Our simple to use policy-based orchestration means anyone can manage IDN overlays. Our point-and-click orchestration tool sets and distributes network policies, making manual and tedious IP address management a thing of the past. It’s time to say good-bye to antiquated addressed-defined networking and welcome identity defined networking.
Brian Skoglind has over 25 years of experience in technical solution sales in North America. He has represented some of the largest technology companies in the world. His sales experience spans over all verticals and technologies and is well versed in most solutions deployed in the customer enterprise today. His primary focus has always been on customer satisfaction.
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
Securing the Public Cloud: Seven Best Practices
Cybercriminals have been quick to exploit public cloud security gaps, resulting in major data breaches as well as CPU hijacking.
Join this session to find out the seven security best practices to follow when using Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP).
• How public cloud security differs from traditional on-premises protection
• What you are (and are not) responsible for when using AWS, Azure, and GCP
• Seven practical steps that will help you stay secure and compliant
While at Sophos, he has been working with partners and customers in securing their IT environments for over 7 years. The last few years, Koby has focused solely on assisting customer and partners understand the benefits and security risks of the public cloud. Koby has worked with customers of all sizes including SMB starting out their cloud journey to well established enterprise customers.
Session Four11:00 am - 11:30 am
Your Last Line of Defense: A Guide to Disaster-proof Data Backup and Restore
While the importance of data backup is well established, the backup plans most companies use are decades old. The explosion of data in last 20 years has been matched by ever increasing storage capacity, a combination that creates one huge problem: how do you restore this ocean of data quickly when disaster strikes? In this session you’ll learn the techniques and technologies that will get your business back up and running quickly in an emergency while maintaining your long-term archives.
Morten Westerberg is the CEO and founder of Nordic Backup with branches in Denmark, Norway and the United States. Morten, who has dual Danish and US citizenship, began his professional career working with Managed IT Services and Business Continuity Planning in the late 90’s, which lead him to found Nordic Backup in Denmark in 2003, Norway in 2006, and the United States in 2009.
With over 20 years of experience in Business Continuity and data backup methods, Morten is an expert in cloud backup with a customer-centric focus on service and business recovery. His motto is, “Anyone can do a backup, but few know how to restore.”
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Break12:45 pm - 1:15 pm
Break / Vendor Booth Time
Session Six1:15 pm - 1:45 pm
Deception Technology, Luxury Item or Lifeline?
A common deception technology misconception is that it is a luxury item meant only for companies with mature security operations or large budgets. This session will provide insight into how deception has evolved, its fit within the security stack, and why organizations both large and small are turning to deception for accurate detection, building predictive defenses, and accelerated incident response. Join in to hear about real-world deployments and top use cases. Attendees will leave with insight into the value and benefits that defenders have realized from adding deception into their security operations programs and why it is often a lifeline for defense against today’s advanced attackers.
Matt is the Area Vice President for the Southeast at Attivo Networks. Matt has been with Attivo for 3 and a half years since the company’s beginning, and has been a part of the inception and evolution of Deception for inside the network threat detection. Matt has worked with some of Attivo’s large customers helping to solve a wide range of use cases that range from insider threat, to detection of lateral movement, credential theft and enabling security in the cloud.
Session Seven1:45 pm - 2:15 pm
Email Security for Microsoft Office 365
Harvesting Office Microsoft 365 credentials is now the most profitable activity for cybercriminals. That’s why, in Q4, Microsoft was the most impersonated brand, with 2.3x more attacks than #2 Netflix. While credential phishing is a serious enough threat, it’s just the beginning. Hackers are increasingly using compromised legitimate Office 365 accounts to launch even more damaging spear phishing attacks.
Break2:15 pm - 2:30 pm
Break / Vendor Booth Time
Session Eight2:30 pm - 3:00 pm
Data Breach? Identify, Respond and Remediate.
Cybercriminals have become increasingly more sophisticated and targeted attacks on company data is on the rise. IT security is good at stopping most attacks, but what if a zero day threat gets through? Join Trend Micro at 3:00 PM on October 10th to learn how to identify, respond to and remediate a breach.
Russ Goldbach is a Senior Sales Engineer for Trend Micro. He is a Certified Security Compliance Specialist (CSCS) with experience in DLP, Encryption and Security in areas of Desktop, Datacenter and Network data protection. As a Senior Sales Engineer, Russ has worked with Federal, State, Local government, healthcare and higher education to advise and implement security tools that help keep organizations safe.
Networking / Happy Hour4:00 pm - 5:00 pm
Registration has closed for this conference
8:30 am - 4:30 pm225 East Coastline DriveJacksonville, FL 32202