Data Connectors is proud to host the Cybersecurity Strategies Conference.
Data Connectors is proud to host the Cybersecurity Strategies Conference.
What is Robotic Decision Automation and Why Should I care?
Writing SIEM Rules and monitoring detection consoles is out. Not only do we not like it, it hasn’t proved to be particularly effective. The Respond Analyst is a new kind of analyst that increases capacity and improves the capability of any security team, regardless of size – without adding to the burden of an already overworked team. Powered by Robotic Decision Automation (RDA), the Respond Analyst is ideal for organizations that are collecting meaningful security data, but struggle with having the manpower and resources to properly analyze and triage security incidents.
Join us during this presentation to learn:
Mike is a Sales Engineer at Respond Software. He is focused on helping organizations of all sizes drive efficiencies across their security operations teams. Prior to Respond Software, Mike sold, architected, and deployed SIEM solutions across the globe for McAfee, NitroSecurity and LogMatrix. While at LogMatrix (aka OpenService) he helped to develop their risk-based correlation engine and helped the company pivot from systems management to SIEM. He has a B.S. in Computer Science, served in the United States Air Force, and has 25+ years experience in communications, networking, and security. He was once a firm believer in the power of correlation but has seen the light and is working to atone for the sins of his past.
Ransomware And How It Evades Your Defenses
Ransomware has long been a menace for organizations and consumers. Global damage cost estimates reach about 10 billion USD per year. After all these years, why does ransomware continue to be so good at being so bad?
In this talk we will review security industry’s history of largely ineffective responses to ransomware, including common ransomware detection methods with their pros and cons. You will see how ransomware developers use simple techniques to bypass each of those methods. This session will also highlight some of the latest attacks including Norsk Hydro and ransomware pretending to donate your Bitcoins to children charity.
After examining the bad, we will provide you with a no-nonsense defense strategy for hardening your defenses against ransomware.
Rene Kolga, CISSP, has over 15 years of cybersecurity experience in the areas of endpoint protection, insider threat, encryption and vulnerability management. He worked for both Fortune 500 companies and Silicon Valley startups, including Symantec, Citrix, Altiris and Nyotron. Rene earned his Computer Science degree from Tallinn University of Technology. He frequently speaks on security topics at industry conferences like Black Hat, BSides, InfoSecurity and (ISC)2 Security Congress.
Coffee Break / Vendor Exhibit Time
Power of asynchronous learning
Empowering your staff with a new approach to technical cyber training is crucial. The presentation discusses the academic research behind on demand learning and how current attacks could have been prevented with more effective, simulated learning environments.
Gordon has 18 years of experience in the security sector with a focus on SaaS optimization and global enterprise business development from global companies such as ReversingLabs, Cofense (formerly PhishMe) and Pictometry. As a naval officer, Gordon conducted operational deployments to the Arabian Gulf and the Horn of Africa as well as assignments with the Defense Intelligence Agency, U.S. Marine Corps, and Special Operations Command. He is a graduate of the U.S. Naval Academy and holds an MBA from George Washington University.
Break / Vendor Booth Time / Lunch
Dessert and Coffee Break / Vendor Exhibit Time
The Current Threat Landscape & Enterprise Remediation
The threat landscape is changing rapidly, we are moving away from consumer focused attacks and entering the age of heavy ransomware infection of organizational networks, such as businesses, hospitals, and municipal networks. To better understand this trend, we delve into the detections, trend lines and real world events that coincide with this surge of ransom threats, to better understand where they came from and where they are going. In this presentation, we will be discussing numerous families of ransomware who have had serious change to how much we see of them over the years, specifically 2016 – 2019, including ransom families like Ryuk, GandCrab and Locky. In addition to this, we take a look at local detections of the top ten countries dealing with ransomware today and provide guidance on how to deal with today’s ransomware threat.
Attendees should expect to:
Lightweight Deception, Heavyweight Results
As Chief Executive Officer and Founder, Francesco is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader. Frank also is co-inventor of a patent issued for selectively regulating network traffic. Francesco is an experienced network engineer and prior to PacketViper, held the Director of Information Security and Technology position at Liberty USA, Partner and Director of Libcom Internet Services ISP, Sr Network/Systems Engineer, Architect, and PM for nationally based technology businesses such as The Future Now, XLConnect, and MicroAge. Francesco holds a BS in Technical Management from Embry-Riddle University. Francesco is a decorated veteran that served twelve years in the US Army Assualt Helicopter Battalion at FT Drum, and Schoefield Barracks.
Break / Vendor Exhibit Time
Data Empowered Music City – New Solutions for Data Centric Cybersecurity
Nashville is evolving into a Data Technology Epicenter! Music City is now home to International companies creating data centric solutions across all industries.
The true asset is DATA. Every day companies are constantly being attacked by internal and external cyber-criminals who steal and or hold ransom their valuable data assets.
Moreover, through the adoption of cloud services, storage and external trusted partnerships across the insecure landscape, the data perimeter has expanded well beyond the ability of the current protection schemes to protect the data.
Data Empowered Technology with Blockchain and Cryptocurrency is evolving in the Music Industry to assist artists with royalty payments, promoting their business and increasing cybersecurity of their valuable data assets. Other industries are incorporating these new evolving solutions.
The Information Security Industry must recognize that the historical perimeter is obsolete and embrace the new, data-centric security paradigm.
This workshop will emphasize a paradigm that infuses data with self-governance, provenance, and self-protection capabilities, to give data the ability to protect itself throughout its lifecycle. Local companies incorporating this technology will be discussed.
Fred Mindermann is a Senior Sales & Business Development Manager for Sertainty. Fred is a 30+ year veteran in Healthcare, Software, and Information Technology industries. He has extensive knowledge of data technology companies and their solutions, with direct experience as both customer/user and vendor. He holds International Patents in cloud based healthcare platforms that communicate with wireless sensors incorporating ICD-10 care protocols. Prior to Sertainty, his portfolio includes previous roles as CEO, COO and VP level positions with International companies (Siemens, GE, British Oxygen Corp, Linde AG) as well as USA based companies including The Cleveland Clinic, Solekai-Fairway Software Engineering Services. He co-founded Arrington Vineyards-Winery and Lena Brewing Company. Fred’s professional eduction includes a bachelors and masters degrees in business administration as well as histology, respiratory medicine, commercial brewery-vineyard management and winemaking.
A Holistic and automated approach to OS-Upgrades, Software Distribution, Vulnerability Management and Patching Management
Zero Day Vulnerability, Windows Feature Updates, Office 365 Migration: Are any of these topics causing you to lose sleep? This seminar will show you how you can automate OS-migrations, software deployment projects, and patch management all from one easy to use Endpoint Management Suite.
Bob Troup is Executive Sales Manager for baramundi Software USA Inc., Headquartered in Framingham, MA,. Bob is a 30-year industry veteran in corporate networking and endpoint management sales and consulting with companies including, Ivanti, VMWare, Auria Corp., and Xyplex. He specializes in solutions and deployment consulting for complex networks and cloud-based software environments.
As Chief Technology Officer, Adel is responsible for the strategic business technology vision. He leads both product and development teams to deliver on the leadership’s vision, time and budget. Adel is a serial entrepreneur with two successful technology companies taken from inception to acquisition. He has proven executive experience with a solid track record that includes over 10 years at HealthStream and 7 years at InVivoLink and HealthTrust. Academically, he holds a Ph.D. in Machine Learning, Artificial Intelligence and Natural Language Processing from Computer Science at NCSU. He had has numerous publications addressing both AI and Blockchain in peer-reviewed, highly acclaimed conferences. He employs this solid foundation to serve the organization’s goals.