CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Session One9:00 am - 9:30 am
Achieving “Always On” IT Resilience
It’s time to revolutionize your data protection strategy. Protecting and transforming your digital business for exceptional customer experiences requires an “always on” platform for disaster recovery, backup and cloud mobility. An IT Resilience Platform allows you to cost-effectively and swiftly manage both unplanned disruptions, including outages, ransomware attacks, and natural disasters, as well as planned events, such as moving to the cloud or data center consolidations.
Jon Sou is a Systems Engineer with Zerto and has over 15 years of experience in Information Technology. He has worked for large Fortune 50 companies and various technology companies in various engineering roles. He has architected, built and supported large infrastructure systems and has a passion for solving customer technical challenges around securing their IT environments.
Jon received his B.S. in Computer Engineering at Cal Poly SLO University and his M.S. in Management Information Systems & Technology from Cal Lutheran University.
Session Two9:30 am - 10:00 am
Deconstructing the Threat Landscape
In this session, we will cover some of today’s biggest threats, including Emotet and CryptoJacking. You’ll also learn how they attack, and what you can do to protect yourself. Many organizations already have the means to protect themselves, but are they using them properly? Are you doing the right things across your company?
Joe has been in the IT field for over 10 years with a focus on security for the past 6 years. Joe is a Channel Sales Engineer with Sophos, based out of Portland, OR. In his tenure at Sophos Joe has applied his skills to pre and post sales product support, partner and employee training, and account management.
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
Deception Technology – Luxury Item or Lifeline?
A common deception technology misconception is that it is a luxury item meant only for companies with mature security operations or large budgets. This session will provide insight into how deception has evolved, its fit within the security stack, and why financial institutions both large and small are turning to deception for accurate detection, building predictive defenses, and accelerated incident response. Join in to hear about real-world deployments and top use cases. Attendees will leave with insight into the value and benefits that defenders have realized from adding deception into their security operations programs and why it is often a lifeline for defense against today’s advanced attackers.
Session Four11:00 am - 11:30 am
The Human Firewall Is On Fire
Navigating the pitfalls of human error as your organization embarks upon the journey to cyber resilience
Every organization has unique criteria for determining the ideal technical solutions to meet the needs of their environment, and as a Proof of Concept Sales Engineer, it’s Jihad Nance’s privilege and passion to transform those criteria into practical, actionable, measurable, and scalable configuration experiences for new Mimecast customers. The focus of his career has been establishing himself as both a perpetually reliable technical resource and a pleasant point of contact in an industry oft stereotyped to be lacking in social graces. A graduate of the Computer and Electrical Engineering programs at North Carolina State University, Nance has 12 years of experience in the tech space, from “IT Guy,” to customer and desktop support, to his current position, in which he serves as a subject-matter expert and guide extraordinaire for Mimecast’s valued partners, ensuring enterprise email cyber resilience beyond the confines of mail security. Other than redefining the maxim that IT pros must choose between skill and disposition, Nance is stimulated by fine-tuning Proof of Concept environments to meet individualized organizational evaluation criteria, building fruitful relationships with successful Mimecast partners of every industry, and tending to a fledgling garden in sunny Sacramento.
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Keynote Session12:00 pm - 12:45 pm
How the DHS Can Help Protect Your Organization from Cybercrimes
Resilience is the ability to remain viable and sustainable during times of stress. Identification of organizational resilience are expressed in protection and sustainment requirements. The Department of Homeland Security will describe their cybersecurity resources used to support organizations in identifying, defining, and measuring resiliency capabilities.
Ms. Gilbeau serves as Cybersecurity Advisor, Region IX, for the Division of the Cybersecurity and Infrastructure Security Agency (CISA). She supports the Department of Homeland Security (DHS) mission of strengthening the security and resilience of the nation’s critical infrastructure. She manages a program to coordinate cyber preparedness, risk mitigation and incident response, and provides cybersecurity resources, including assessments, to the nation’s 16 critical infrastructure sectors and state, local, tribal, and territorial government entities.
An experienced federal government employee for over 31 years, Ms. Gilbeau was previously the Chief of National Cyber Exercise and Planning Program (NCEPP) within the National Cybersecurity and Communications Integration Center (NCCIC). Operationally-focused, her team prepared partners to respond in a coordinated fashion to complex scenarios. Her diverse background includes capabilities honed in the Department of Defense (DoD): Army – Information Assurance Branch Chief and Command Privacy Official, Strategic Planner, Information Technology Manager, COOP Planner, and Program Analyst; Marine Corps – Regional Program Manager for Navy/Marine Corps Internet (NMCI) transition, Network Administrator and Program Manager; and Navy – Human Capital Manager, Budget Analyst and Network Administrator.
A graduate of Harvard’s Kennedy School, Senior Executive Fellows Program, Ms. Gilbeau holds a Computer Science degree and has the following certifications: CISM; GIAC; CEH; and Security+.
Break12:45 pm - 1:15 pm
Break / Vendor Booth Time
Session Six1:15 pm - 1:45 pm
Cybercrime Tactics and Techniques Report
A significant uptick in threats aimed at businesses were reported in Q1 2019 from the same time last year. Companies need to take control against these increases in cyberthreats by remediating at scale, quickly mitigating attack impacts through isolation, and proactively hunting for threats before they execute.
- Significant increases in overall threats, Emotet, ransomware, and its impact on your enterprise
- How Mac, mobile malware, and especially adware are on the rise
- User concern about the safety of their personal information, and how organizations are failing to protect their data
- What it takes to create a resilient enterprise
Session Seven1:45 pm - 2:15 pm
A new approach to email security for Office 365
For hackers, Microsoft Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast and healthy profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Trey King is a Solutions Architect with Vade Secure and has more than ten years in various aspects of security (systems, networking, software development, and email). He loves code, surfing, understanding things on a granular level to solve complex problems, and thinks he is funnier than he really is.
Break2:15 pm - 2:30 pm
Break / Vendor Booth Time
Session Eight2:30 pm - 3:00 pm
Data Center and the Cloud: How Hybrid Cloud Changes your Security Visibility
Security requirements do not go away when you move part or all of your data center and applications to the cloud. Although most security controls can be easily applied to systems in the cloud, the weight of those controls and what constitutes an immediate concern versus a lower priority can be very different. In this session we will discuss the need to differentiate your cloud systems versus your internal data center, and administer your hybrid cloud environment with centralized management and visibility.
Jim Richards has more than 20 years of experience in IT, focusing on security for the past 10 years. Jim resides in Roseville, CA, and is currently a Senior Principal Engineer with Trend Micro, where he applies his training, system engineering and pre-sales experience to helping customers solve their security needs. In his spare time, Jim enjoys time with his children, golf and lots and lots of football!
Session Nine3:00 pm - 3:20 pm
Don’t Feed The Phish!
Discussion on reducing usefulness of compromised credentials while eliminating friction for end users. A little bit of history lesson with trending identity and security topics.
James Byerly has been helping organizations with Security and IAM for over 12 years. He is originally from San Jose, CA where his father was a programmer for Digital Research and his mother worked in Quality Control at Atari. If you talk to James you might hear a strong hint of a southern accent as the family relocated to Nashville in the late 70s’ . After graduating Middle Tennessee State University, James spent many years in the printing and paper industries. In 2007, he decided to take the leap into technology where he reconnected with his roots and now works for a Santa Clara based company called Idaptive which specializes in Identity and Access Management / IDaaS solutions.
Registration has closed for this conference
8:30 am - 4:30 pm2001 Point West WaySacramento CA 95815916-929-8855