Data Connectors is proud to host the Cybersecurity Strategies Conference.
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Are You Ready for Autonomous Awareness Training?
Companies keep investing heavily in employee awareness training. Unfortunately, despite the significant IT overhead, the existing solutions fail to change employee behavior towards cyberattacks. We will present a different approach to awareness training, which leverages data science and advanced automation to deliver hassle-free, effective training. If you are frustrated with the amount of manual effort your current awareness program consumes, uncomfortable presenting mediocre progress to Management, and suspect there might be a better way to train your employees – please join us to learn about autonomous training!
In this session you will learn:
Shlomi Gian has more than 20 years’ experience in the technology industry, bringing a unique blend of product and business leadership expertise to CybeReady. As CEO, Shlomi is responsible for ramping up the company’s presence in the U.S and guiding overall growth for CybeReady worldwide. Over the past two decades, he has built disruptive technologies, developed high-value strategic partnerships and lead companies through major acquisitions. Shlomi served at the helm of numerous companies in the U.S. and abroad, including Cotendo, Akamai and PacketZoom – which was acquired by Roblox in 2018. He holds a B.S. degree in Computer Science and MBA degree from the University of San Francisco.
For a copy of this presentation, please contact Shlomi Gian – [email protected]
A new approach to email security for Office 365
For hackers, Microsoft Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions.
Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Romain Basset is the Head of Sales Engineers at Vade Secure, where he helps SMB and enterprise organizations of all sizes keep their users from clicking on suspicious links or attachments.
He holds a Master’s Degree in Computer Engineering and has over 10 years of experience in IT security engineering and product management.
For a copy of this presentation, please contact Lynne Leonardi – [email protected]
Coffee Break / Vendor Exhibit Time
Real talk on ransomware
We all know what ransomware is – we know the stats, we’ve seen the headlines, we’re all in the mindset of “if, not when.” With all the fear, uncertainty and doubt constantly bombarding IT professionals, we’ll dive into the realities of ransomware attacks and the real impacts on organizations. We offer participants an opportunity to “sound off” on ransomware and share experiences and challenges with your peers to better understand how prepared organizations are to defend against ransomware attacks.
Mark is currently Arcserve’s Director of Solution Strategy for North America, where he focuses on collaborating with the Arcserve sales team to provide their customers with a comprehensive data protection and disaster recovery solution that exactly fits their needs.
Mark has 25+ years of I.T. industry experience, with most of that time spent focusing on storage, data protection, business continuity and information governance.
For a copy of this presentation, please contact Nikki Shnyder – [email protected]
How Hackers Bypass Office 365 Security: An Guide for the Uninitiated
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
• Email-based phishing, spoofing, and malware
• Account takeover, insider threats, compromised Microsoft credentials
• Loss of sensitive data from OneDrive, SharePoint and Office 365
Jeff Raymond is a Seattle, WA based Cloud Security Engineer at Avanan. While working for companies ranging from security giants to start-ups, he has found his passion in protecting organizations from phishing attacks and securing their cloud applications. Outside of work, he can either be found snowboarding or wakeboarding (depending on the season) or geeking out in his home lab.
For the slides from the Avanan presentation, please go to www.avanan.com/dataconnectors
Lunch / Vendor Exhibit Time
DHS’ Cybersecurity and Infrastructure Security Agency (CISA) desires a strong and resilient cyber infrastructure and as a result has many free resources, programs, services, and assessments that our partners can proactively take advantage of to strengthen their cyber posture. These include things like penetration testing, vulnerability scanning, phishing exercises, programmatic & infrastructure cyber assessments, awareness training and cyber exercises.
Rich is a native Long Islander who served in the U.S. Navy from 1983 to 2003 and honorably retired as a Data Systems Technician Chief Petty Officer. After retiring from the Navy in 2003, Rich, his wife and his twin sons moved to Chesapeake, VA where he worked at the Naval Network Warfare Command as a Senior Cyber Security Engineer managing a team of cyber engineers and analysts that was responsible for the certification and accreditation of all Navy computer systems and networks. Most recently, Rich served as the Information Systems Security Manager (ISSM) with Northrop Grumman in Bethpage, NY where he was responsible for the IT governance, certification and accreditation, and cyber security regulatory compliance of 1200+ classified contractor, DoD, and government computers and networks. Desirous to return to government service, in July of 2016 Rich transitioned to the Department of Homeland Security and now the Cybersecurity and Infrastructure Security Agency (CISA) where he currently serves as the Cybersecurity Advisor supporting FEMA Region II (NY, NJ, Puerto Rico, and the US Virgin Islands).
Dessert and Coffee Break / Vendor Exhibit Time
CASB for Zero Trust Cloud Security
Cloud adoption is accelerating and an effective cloud security strategy is still in works at many organizations. Broad network access of the cloud, the freedom of BYOD and sophistication of attackers pose threats unseen before. Regulatory and compliance requirements continue to apply. A complete cloud governance practice inspired by CASB’s Zero-Trust framework is explored in this session. Cloud security challenges riddling organizations today and the solution space is presented as well.
Mahesh Rachakonda, CISSP is the Vice President of Products at CipherCloud. During the six years in his current position, he has worked extensively with organizations of all sizes and global presence – to help solve some serious cloud security challenges. He regularly interacts with the client InfoSec teams, industry experts and researchers. Prior to that, he was a security advocate, compliance expert and product/solutions developer, contributing to several industry verticals. He holds a Masters Degree in Computer Science and Bachelors in Engineering.
For a copy of this presentation, please contact Salah Nassar – [email protected]
RSA SecurID Access – Convenient and Secure Access for the Modern Workforce
Threats are multiplying. Users are changing. What are you doing?
Attackers are finding ways to compromise your users’ credentials every day. RSA SecurID Suite delivers the identity and access assurance you need to thwart them at every turn—while delivering an absolutely seamless access experience for your users.
RSA SecurID Suite goes beyond traditional identity and access management, using identity insights, threat intelligence and business context to provide secure access to all of your users, across all of your applications, from the ground to the cloud. It brings together multi-factor authentication, risk-based access management, identity governance and user lifecycle management in one powerful suite of solutions.
Michael Dalton is a Sr Identity Engineer at RSA, the Security Division of Dell. Over the past 30 years, his ideas and work as a security focused field engineer has provided a unique solutions for common challenges in Identity and Access Management.
He lives in West Hartford, CT with his phenomenal wife Kim, sons Ben and Clark and loves to go hiking!
For a copy of this presentation, please contact Diane Lawrence – [email protected]
Break / Vendor Exhibit Time
Using Machine Learning for Risk Based Authentication
The future of security revolves around security automation and machine learning. While this sounds nice at face value, building a strategy around identity and access management requires a plan. We’ll discuss a proven IAM Framework to provide Zero Trust Security. Continuous authentication is the gold standard of IAM however it only works when there is a balance between security and user productivity. During this session, we’ll dive into how risk-based decisions are used to create rock-solid MFA and SSO solutions along with a demo of real-life solutions in practice.
Brian helps partners and customers build global identity practices. This includes defining markets, building identity strategies tailored to industry segment needs and implementing a plan to manage the full lifecycle of a proper IAM project.
Powerful Security. Operationally Simple
Most breaches happen on the endpoint and advanced evasive threats pose the biggest risk, causing 80% of breaches. Antivirus can handle commodity malware but fileless attacks are 10x more likely to cause a breach. Moving Target Defense prevents the most dangerous endpoint attacks. It implements a strategy of non-heuristic and non-prescriptive prevention which increases protection and reduces the costs of detect & respond strategies, as well as the risks of relying on it. The technology is employeed on 4.5M endpoints and results are unparalleled.
Arthur Braunstein has more than 25 years of executive management and sales leadership experience, including over a decade and a half in the data and cyber security industry. Before joining Morphisec, he was Vice President at Big Belly, leading their private sector expansion. Prior to Big Belly, he served as VP Strategic Accounts at CloudLock, a cloud cybersecurity company, where he focused on large enterprise customers. Prior to that, Arthur built the major accounts strategy and portfolio for Digital Guardian. Previously, he held executive-level roles at Escort Inc., ArchiText, Polaroid and AT&T. He serves in the advisory boards of GreatHorn and Jeenie, two startups, and is a co-founder of Language Line Services.
For a copy of this presentation, please contact Nirit Efraty Nekave – [email protected]