Data Connectors is proud to host the Los Angeles Virtual Cybersecurity Conference.
Data Connectors is proud to host the Los Angeles Virtual Cybersecurity Conference.
Prevention in a Work from Home World
The recent shift towards work from home environments is met with a host of security challenges. The loss of enterprise network controls and the use of personal computers for business tasks are just a couple of examples of how this “new normal” is creating an increased security risk. A renewed focus on prevention may hold the answer. Endpoint security architecture can be broken down into three main elements: Prevention, Detection, and Remediation. Prevention should be considered the most strategically important defense element, as by default time zero prevention dramatically reduces latency, risks and operational costs of the security structure as a whole. As advanced threats evolve and data center transformation forces enterprise teams to consolidate security, the need for faster, easier and more deterministic threat prevention is essential. This is especially true in the work from the home world we live in, where we have to rely on endpoint controls and detection and remediation are even more challenging.
How Hackers Bypass Email Security: An Attack Guide for the Uninitiated
The scale of email migration to the cloud requires a strategic shift in security for collaboration suites. The Office 365 inbox and user credentials are the #1 target for hackers. 90% of breaches start with email and the security incident orchestration, automation and response workload drains resources from the SOC team. Sharing insights from research, Michael will demonstrate the techniques attackers use to bypass Microsoft’s defenses, fool filters, and launch attacks.
He will talk about how CISOs have started to adopt a continuous adaptive risk and trust assessment mindset to protect inboxes from the evolving threats including phishing, account takeover and business email compromise.
Risk Exchanges: The Key to Vendor Risk Management Efficiency
Your vendors often handle your most sensitive data. This presents significant challenges as security, procurement, sourcing, IT, and privacy teams struggle to vet and manage vendor risks in real time. So, how can organizations proactively monitor vendors to protect against emerging threats? Additionally, how can risk exchanges help organizations manage the third-party risk management lifecycle with more efficiency? In this session, we’ll answer these questions and breakdown how risk exchanges offer a mature approach to vendor risk monitoring.
— Understand third-party risk management trends and challenges
— Gain actionable insights on how to monitor third-party risks and performance
— Learn the benefits of a third-party risk exchange
— See how you can protect against third-party threats such as data breaches, etc
Randy Ferree serves as a Third-Party Risk Consultant for OneTrust VendorpediaTM– a purpose-built software designed to operationalize third-party risk management. In his role, Ferree advises companies throughout their third-party risk management implementations to help meet requirements relating to relevant standards, frameworks, and laws (e.g. ISO, NIST, SIG, GDPR and CCPA). Ferree works with clients to centralize their third-party information across business units, assess risks and performance, and monitor threats throughout the entire third-party relationship, from onboarding to offboarding
Protect Your Environment from Cyber Attacks with Advances in Network Analytics, ML, and AI
Despite their best efforts, organizations continue to struggle to detect and stop a wide range of cyber-attacks. These can include everything from ransomware attacks to intrusions that can lead to the costly exposure of critical data. Why is this? One reason is that organizations typically lack any visibility to these attacks as they move east-west across their network, which could leave them blind on up to 80% of their threat surface. Additionally, our industry built detection tools on the premise that detection tools should be “dumb,” and therefore, the people who use them must be experts – who are available 365×7 to use them properly. Shouldn’t it be the other way around, where the tools are smart and do the work of the experts? Let us show you how to make your threat detection and investigation simpler, faster, much more effective leveraging the latest advances in AI, ML and automation.
Convergence of Cyber and Physical Risks
How cyber risks impact traditional corporate security programs and the protection of employees
Michael Husnik currently heads Facebook’s Protective Intelligence team, specializing in intelligence lead risk mitigation and investigation of nefarious actors targeting Facebook leaders. Michael’s team mitigates the risk global leadership teams of Facebook, Instagram, WhatsApp, Messenger, Oculus and Calibra face; often originating from dangerous individuals, organizations and emerging threats.
Prior to joining the Facebook, Michael founded a security related start-up and held the position of CEO leading to +1m in AAR in 3 months, growth to 120+ employees in under one year. Michael gained his expertise through his role as Director of Operations and Executive Protection Services for AFIMAC, a global risk mitigation firm, where he oversaw 500+ Security operations, 50m+ of annual business and 350+ employees along with being an Adjunct Professor in Emergency Management, Investigations and Social Media Intelligence and Investigations at George Brown College – Toronto.
Michael was recently recognized by the Federal Minister of Public Safety Canada for his contributions in the field of Intelligence, National Security and Counter Terrorism with direct impact to the public safety of Canadians.
Michael is technology driven, specializing in developing, leading and delivering advance risk mitigation solutions from concept to market.
Real talk on ransomware
We all know what ransomware is – we know the stats, we’ve seen the headlines, we’re all in the mindset of “if, not when.” With all the fear, uncertainty and doubt constantly bombarding IT professionals, Arcserve dives into the realities of ransomware attacks and the real impacts on organizations. Join us for a unique perspective on how organizations can prepare for and defend against ransomware attacks.
Stacey Budd has been working with Arcserve solutions since 2007 and joined the company as a Presales Consultant back in 2014. Prior to that, he worked for TechData as a System Engineer supporting several IT products including Arcserve. He also served in the United States Air Force as a Nuclear Weapons Specialist.
When he isn’t educating the world about Arcserve Unified Data Protection, you can often find him fishing. Or Kayaking. Or preferably fishing while kayaking in the warm Florida sun.
The U.S. Secret Service’s role in defending our critical financial infrastructure. Also, we will discuss our role in responding to financial threats during the COVID 19 virus.
Michael D’Ambrosio is the Assistant Director of the Office of Investigations. In his current position, Mr. D’Ambrosio is the senior executive leading the 162 field offices of the Secret Service, which fights cybercrime and protects the U.S. financial system. Additionally, Mr. D’Ambrosio is responsible for the administration and resourcing of 40 Electronic Crime Task Forces (ECTF) and 46 Financial Crimes Task Forces (FCTF). Mr. D’Ambrosio began his Secret Service career in 1997, as a Special Agent assigned to the New York Field Office, after serving 5 years as an Infantry Officer in the United States Marine Corps. He received his Bachelor of Business Administration from Siena College, Albany, NY, and a Master of Science Degree in National Security Strategy from the National War College, and a Master of Science in Criminal Justice from the University of Cincinnati.
Securing Remote Workers: Scaling Remote Access and Security for All Employees
Working remotely is the new norm. But how can you keep remote workers secure when your security stack is still located in your data center? And how can remote access scale beyond the limitations of VPN appliances?
Attend this session about securing remote workers and you will learn:
– How the network inversion with more users, devices, apps, data outside than inside is forcing security teams to rethink their remote worker security strategy
– About the differences between various remote access architectures
– How to provide fast and secure access to cloud apps, websites, and private apps using the latest innovations in Secure Web Gateways and Zero Trust Network Access
Bob is the Chief Evangelist at Netskope, a market-leading cloud security firm. A prolific speaker and product demonstrator, Bob has reached live audiences in more than 45 countries over the past decade. His career spans more than 25 years in Silicon Valley, where he has held leadership roles in product management and marketing at various technology companies.
Before Netskope, Bob was the Chief Evangelist at Riverbed and was a member of the pioneering product team that launched Riverbed from a small start-up of fewer than ten employees to a market leader with more than 3,000 employees and $1B in annual revenue. Bob was first introduced to the world of cybersecurity as a teenager in the 80s when he hosted a popular (BBS) bulletin board system and had to develop security software to prevent hackers from infiltrating his site hosted from his parent’s home.
Stopping Attacker Movement Before They Reach Crown Jewels
During a normal workday, credentials and connections proliferate within a network. Once inside, attackers use Mimikatz and other attack tools to automate and accelerate credential harvesting, network discovery, and privilege escalation. Until now, defenders have lacked the ability to get ahead of this process. Identifying and removing excess, high-risk, and rogue connections has been a manual effort and impossible to scale. The giant, sudden transition by millions of employees to working from home has only made the attack surface even more volatile.
In this webinar, we examine the various ways to deprive attackers of what they need to move laterally in your network by identifying and removing the riskiest pathways that lead to your crown jewels including:
• How normal business activity creates dangerous opportunities for malicious lateral movement
• The cyber hygiene functions needed to harden the network against modern APT attacks
• How continuous visibility into your attack surface can augment other core security functions, such as privileged access management (PAM) and vulnerability management
Wade Lance has been productizing new technologies in education, healthcare and information security for over 20 years. He has diverse experience in solution design for global 1000 cyber security teams, with an extensive background in advanced cyber-attack detection, and a specialty in cyber deception methods and platforms
Prior to his career in information technology, Lance was a professional mountain guide. As Program Director at Appalachian Mountaineering he developed a new method for technical rock and ice climbing instruction that is still used today to teach advanced skills for the most dangerous environments.
What the CCPA Means For Your Security Program
This presentation describes the many cyber security requirements of the California Consumer Privacy Act and offers insights into effectively meeting them in advance of the July 1, 2020 deadline. Included is an analysis of additional requirements recently published by the California Attorney General.
Scott M. Giordano is an attorney with more than 20 years of legal, technology, and risk management consulting experience. An IAPP Fellow of Information Privacy and a Certified Information Security Systems Professional (CISSP), Scott serves as Spirion’s subject matter expert on multinational data protection and its intersection with technology, export compliance, internal investigations, information governance, and risk management. Prior to joining Spirion, he served as Director, Data Protection for Robert Half Legal and established the global privacy program for Esterline Technologies Corporation in Bellevue, WA.
During his career, Scott has held senior positions at several legal technology firms and is listed as co-inventor on Intelligent Searching of Electronically Stored Information, patent application no. 13/842,910. In addition, he taught the first law school course anywhere on electronic evidence and e-discovery.
Scott is a member of the bar in Washington state, California, and the District of Columbia.
Securing the Tsunami of Unmanaged and IOT Devices
There’s a virtual tidal wave of smart, connected devices sweeping across businesses in every industry. Whether they’re things you’re already aware of like smart TVs, patient infusion pumps, and manufacturing robotic arms, or ones flying under your radar like printers, smartwatches, and digital assistants, your traditional security products can’t see these devices, making them ideal targets for attacks. The threats are real and all over today’s news, as we’re seeing stories published all the time about the risks these devices pose as attackers have been focusing their efforts on these devices as an easy way to penetrate networks undetected. Join us as we explore the growth of unmanaged, un-agentable devices, including examples of real-world attacks, and issues you should consider to help fill the gaps left by traditional security architectures.
As Vice President of Product Marketing, Chris is responsible for Armis’ product marketing strategy and vision. He is a seasoned product and business development executive leading teams through development and marketing of exceptional products and cutting-edge technologies across enterprise and consumer market segments. Prior to Armis, Chris held executive management roles in product management, product marketing and business development at MobileIron, Cisco, Nokia, Ipsilon Networks and Kalpana. Chris’ journey to Silicon Valley started after leaving college early to pursue his passion for building great products.