Data Connectors is proud to host the Cybersecurity Strategies Conference.
Check-in and opening introductions8:15 am - 8:45 am
Session Two9:15 am - 9:45 am
Cyber Exposure – The Next Frontier
The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program. Join our session to learn how CISOs can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.
Liz Leon has been with Tenable for the four years, most recently serving as a solution engineer. Liz specializes in security implementations and solutions planning. Throughout her time in engineering, she has helped countless companies gain visibility over their cyber exposure using Tenable’s solutions.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Keynote Session10:15 am - 10:45 am
Mauricio Angée is a Certified Information Systems Security Professional (CISSP) with over 30
years of experience in healthcare, banking and financial services, hospitality, entertainment, and the government sector, with a strong background in cybersecurity, information assurance, privacy, regulatory compliance, and risk management.
Mauricio currently serves as Chief Information Security Officer (CISO) at Mount Sinai Medical
Center in Miami, Fl., where he is responsible for setting the roadmap and strategy for the
protection of information assets and patient information. Prior to joining Mount Sinai, he served as Vice President of Information Security at Mercantil Bank and was the acting Chief Information Security Officer at Universal Orlando Parks and Resorts (Universal Studios Florida). Mauricio also served as an Information Systems Security Officer (ISSO) at Harris Corporation supporting the Federal Aviation Administration (FAA) Telecommunications Infrastructure (FTI), and the US Census Bureau. In his ISSO role, he successfully coordinated the security certification and accreditation activities, and developed the incident response capabilities. Mr. Angée was the Computer Security Official (CSO) for Northrop-Grumman at the National Aeronautics and Space Administration (NASA) at the Kennedy Space Center, FL., where he supported the Kennedy Integrated Communications Services (KICS) contract.
Mauricio currently serves in the Board of Directors, and the FBI- Infragard information sharing
group of South Florida, and the South Florida CISO Council. Mauricio is one of the most influential security professionals in his field. With his leadership skills and extensive experience, he has made significant contributions to the information security community. He was nominated for the CISO of the Year Award by the EC Council in 2013.
Mauricio is currently pursuing his Doctorate degree in Business with concentration in Information Security at St. Thomas University. He received his master’s degree in computer and Information science with concentration in Information Security from Nova Southeastern University. He is currently an adjunct faculty at Florida International University and St. Thomas University.
Break11:15 am - 11:45 am
Break / Vendor Booth Time / Lunch
Break12:15 pm - 12:30 pm
Break / Vendor Booth Time
Session Six1:00 pm - 1:45 pm
Another Cloud Discussion!?!?! – Security in Cloud Environments Exposed
This presentation is based on a whitepaper, The Importance of modern IT-Security in private and public Cloud Environments by Nils Schäfer, a Security Engineer at Check Point Software Technologies. The author uses honeypot deployment in a cloud environment with basic cloud security controls enabled. The data generated by the honeypot shows how vulnerable cloud environments can be. We also discuss how the cyber kill chain applies to cloud environments.
Download the Presentation
Rolando is a Cloud Architect at Check Point. He has seven years of experience as a Security Engineer covering large enterprise accounts in Florida. He has advised customers on Check Point Software security solutions for a variety of platforms including endpoint, datacenter, cloud and mobility.
Break1:45 pm - 2:00 pm
Break/ Vendor Booth Time
Session Seven2:00 pm - 2:30 pm
Using Artificial Intelligence to detect threats without Decryption
Networks are becoming more and more opaque as network based encryption is on the rise protecting our traffic as it travels over trusted and untrusted networks. We are not the only ones making use of this as adversaries are hiding their communication in the same encrypted channels. In 2016, Cisco researchers published a paper and an open-source implantation debuting Encrypted Traffic Analytics that is an application of Machine Learning to detect malicious activity without the need for decryption. In this session we will discuss Encrypted Traffic Analytics’ origin, the Machine Learning techniques, and the results we have experienced as it has been implemented in solutions across public and private sectors.
Brian Butler is a Consulting Systems Engineer in the Global Service Provider group where he consults with large Internet Service Provider Organizations to help them identify security products that will protect their network, data and users. In this role, Brian has become a valuable asset to his customers, identifying malicious activity on the network through the use of NetFlow visibly. He is also responsible for deploying and testing security products within customers’ production environments and utilizing CISCO solutions to remedy their security issues.
Brian is a member of the GSP Data Analytic Tiger Team at Cisco, providing recommendations to large ISP companies when dealing with their Big Data analytics. He is also a member of the Flow Masters group within Cisco, that is tasked with expanding the knowledge of how Behavior Analysis utilizing NetFlow can further benefit customers within the Cisco Global Security Sales Organization.
Brian is currently preparing for his AWS certifications. He lives just north of Atlanta with his wife, and they have become bowling enthusiasts as their two kids have gone off to college leaving them empty nesters.
Break3:00 pm - 3:15 pm
Break / Vendor Booth Time
Session Ten4:00 pm - 4:30 pm
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
8:00 am - 5:00 pm60 South Ivanhoe BoulevardOrlando, FL 32804407-425-4455
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365