Check-in and opening introductions8:15 am - 8:45 am
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Session Two9:15 am - 9:45 am
Why attackers love email and what you can do about it
Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Cyber Exposure – The Next Frontier
The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program. Join us for a discussion on how companies can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.
Casey Reid is a Principal Security Engineer at Tenable, responsible for helping enterprise customers reduce their Cyber Exposure and strengthen their Vulnerability Management program. He is an energetic, outspoken, problem solver and hobby hacker with over 15 years of diverse technical experience. When he’s not learning new technologies or hacking in his lab, he is competing at local CrossFit competitions and Obstacle Course Races such as the World’s Toughest Mudder.
Session Four10:45 am - 11:15 am
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
Lunch11:15 am - 11:45 am
Break / Vendor Booth Time / Lunch
Keynote Session11:45 am - 12:30 pm
Special Agent Paul M. Schaaf is a Cyber Agent assigned to the FBI Phoenix Division. He holds a Master’s Degree in Computer Information Systems and a Bachelor’s Degree in Finance. SA Schaaf worked in computer systems in the financial sector before joining the FBI in 2003 and has experience with Cyber, Civil Rights, Fraud, Extortion, Intellectual Property and Innocent Images cases throughout his career. SA Schaaf also has the unique distinction of having the first Spam Case go to trial which involved an international spam operation that operated out of 4 countries.
Break12:30 pm - 12:45 pm
Break / Vendor Booth Time
Session Five12:45 pm - 1:15 pm
An Overview of WLAN Security
As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with growing threats of IoT hacks. Learn best practices and evaluate different security approaches to address security concerns. Bring your questions and join our speaker to cover:
- The key tenets of WLAN security
- How WPA3 will impact Enterprise and Public networks
- Choosing the proper authentication and encryption models
- Device, User and IoT access control
- Future challenges for Wi-Fi security
Session Six1:15 pm - 2:00 pm
Understanding Common Perimeter Exposures
In this talk, Haley Sayres, Product Manager at Expanse, will provide an in-depth look at common perimeter exposures that plague companies as complex as the Fortune 500, collected from our global-scale, near realtime Internet intelligence platform. We will highlight how these exposures come about, how they persist, and expose how identical types have resulted in large, well-publicized breaches. Finally, we will discuss approaches organizations can take to secure their network edge despite technological changes and organizational complexity.
Break2:00 pm - 2:15 pm
Break / Vendor Booth Time
Session Seven2:15 pm - 2:45 pm
The Bots are Coming!
Actually, they are here. They now represent over 50 percent of internet traffic. But not all bots are bad. There are many good bots, such as chat bots and search engine bots, that we rely on in our day-to-day digital lives. You do need to know the difference and take control of your bot traffic—they cannot be ignored and you cannot just block them all. In this presentation, we will look at the growth of bots, good bots versus bad bots, what to look for in a bot mitigation solution and a few use cases.
Session Eight2:45 pm - 3:15 pm
Stepping into the cloud with confidence
It’s no surprise that organizations are increasingly investing in the cloud for its key capabilities—ease of use, scalability, and cost savings. The cloud is changing the way we work. This also introduces new security risks. You can roll the dice and hope that someone else is keeping an eye on security. Or, you can ensure your security in the cloud with Cisco Stepping into the cloud with confidence solutions. In this session, you will see how things are changing, what the new risks are, and how you can protect yourself and your company as you take advantage of the many benefits of using the cloud.
4 Takeaway Bullet Points:
- Protect by take advantage of the many benefits of using the cloud
- Stop threats earlier with predictive intelligence
- Simplest to deploy and manage
- Most open and reliable platform
Break3:15 pm - 3:30 pm
Break / Vendor Booth Time
Session Nine3:30 pm - 4:15 pm
A new approach to email security for Office 365
For hackers, Office 365 is the new black!
Because a simple set of Office 365 credentials can give you access to sensitive documents, applications and confidential business information, Office 365 is now the go-to place for cybercriminals looking to make a fast and high profit.
Each day these hackers implement new and always more creative phishing and spear-phishing attacks, that easily bypass the traditional email security solutions.
Discover what their techniques are, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Session Ten4:15 pm - 4:45 pm
Cybersecurity, an End to End Approach
Glenn Napurski is a Microsoft Certified Trainer with over 20 years of IT training and consulting experience. His broad IT background helps both his students and clients gain a big picture view of Cyber Security and the challenges it brings to organizations of all sizes. In addition to a Bachelor’s degree in Engineering Glenn currently carries certifications by CompTIA, Cisco Systems, Logical Operations, Microsoft, and the National Cloud Technologists Association. Outside the classroom he enjoys restoring old muscle cars and motorcycles.
Session Eleven4:45 pm - 5:15 pm
Will the CIS top 20 security framework for you?
During this presentation, attendees will gain an in-depth understanding of security framework and the ways it can help their organization achieve better overall security postures on-premises and in the cloud. Specifically, this session will focus on the Center for Internet Security’s (CIS) Top 20 security controls and how they make it simpler for businesses to achieve their security goals. In addition, you’ll learn about the CIS testing metrics and how they are designed to validate whether the security solutions put in place are meeting the controls at your organization.
Registration has closed for this conference