CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Session Two9:30 am - 10:00 am
AV, EDR, NGAV…What’s Next in Endpoint Protection?
Antivirus has been around since the 1980s. How did it evolve in the past decade? What about hot, machine learning powered Next Generation Antivirus products promoted by well-funded startups? Or should we assume compromise and focus on the Endpoint Detection and Response (EDR) instead? What are the pros and cons of these approaches and where is endpoint security going next?
This interactive presentation will discuss the reasons behind the vulnerable state of endpoint security and include a demo of the infamous Rubber Ducky that remains practically unstoppable by today’s endpoint protection products.
You will leave this presentation with the following knowledge:
-Understand the current state of endpoint security and latest attacks
-Explore available endpoint protection tools, including Endpoint Detection and Response (EDR)
-Learn about benefits and shortcomings of modern endpoint protection tools and approaches
-See an advanced file-less attack in action
-Learn the latest best practices and approaches that promise to reduce threat surface and minimize breaches
Nir Shafrir leads field engineering for Nyotron.
Shafrir has vast experience with the endpoint and network security market, working in the past for medium size local security companies in Israel as well as large global companies as IBM-Trusteer.
He had held both technical and commercial positions in the information security space and has a deep understanding in computer and network security technologies as well as in promoting innovating solutions for customers in the US and EMEA regions. Shafrir holds a bachelor’s degree in Computer scientists by the Open University.
For a copy of this presentation, please contact Jessica Filip – [email protected]
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
The Public Cloud: See Everything. Secure Everything
In an ever-changing, auto-scaling environment, continuous visibility of your public cloud infrastructure is vital. Come explore the challenges of the public cloud and how to avoid them.
Greg is the Sophos channel sales engineer for the pacific northwest territory covering Washington and Alaska. He has been a part of the Information Security community for 16 years the last 4 of which have been spent at Sophos.
For a copy of this presentation, please contact Jennifer Riley – [email protected]
Session Four11:00 am - 11:30 am
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
Jeff Raymond is a Seattle, WA based Cloud Security Engineer at Avanan. While working for companies ranging from security giants to start-ups, he has found his passion in protecting organizations from phishing attacks and securing their cloud applications. Outside of work, he can either be found snowboarding or wakeboarding (depending on the season) or geeking out in his home lab.
For a copy of this presentation, please contact Nick Damiano – [email protected]
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Keynote Session12:00 pm - 12:45 pm
The Cyber Threat Landscape
SA Brennan will present an overview of current cyber threat actors and a summary of their intrusion techniques along with insight on working with the FBI during an intrusion.
FBI Special Agent Kevin Brennan is currently assigned to the Seattle Field Office to investigate computer intrusions. He is also an FBI cyber instructor, teaching about cybercrime investigations to local, state, federal, and international law enforcement agencies. Prior to joining the FBI in 2006, he worked for IBM Global Services.
Break12:45 pm - 1:15 pm
Break / Vendor Booth Time
Session Six1:15 pm - 1:45 pm
Cybercrime Tactics and Techniques Report
The Malwarebytes Labs research team showed a significant uptick in threats aimed at businesses in Q1 2019 from the same time last year. Companies need to take control against these increases in cyberthreats by remediating at scale, quickly mitigating attack impacts through isolation, and proactively hunting for threats before they execute.
– Significant increases in overall threats, Emotet, ransomware, and its impact on your enterprise
– How Mac, mobile malware, and especially adware are on the rise
– User concern about the safety of their personal information, and how organizations are failing to protect their data
– What it takes to create a resilient enterprise
For a copy of this presentation, please contact Jen Munday – [email protected]
Session Seven1:45 pm - 2:15 pm
Data as the New Perimeter
Data is essentially inert and passive, lacking an inherent ability to either control its own fate or mitigate risks while under process, as well as at rest and in transit. Data loss and theft is a result of the problem.
The safety of the data is wholly dependent on human behavior and infrastructure. In reality, the enterprise protects data indirectly through a static perimeter. Endpoints are managed, and trust assumed. This approach is not data-centric and has reached obsolescence.
This workshop will discuss merger and acquisition best practices and the ensuing vulnerabilities to corporations if security is not at the forefront of the process. It will highlight a paradigm that imbues data with self-governance, provenance and protection capabilities, to make it the new perimeter and a source to rethink deployments, workflows, and responsibilities.
David Barton, Chief Information Security Officer, is responsible for the day-to-day security operations of Stellar Cyber in addition to product strategy and direction. Prior to Stellar Cyber, Barton was the COO for 5Iron, a MSSP based in Nashville, TN.
Barton brings to Stellar Cyber more than 20 years of experience in security leadership roles across a variety of industries, including telecommunications, healthcare, software development, finance and government. Prior to 5Iron, he spent three years as Chief Information Security Officer for Forcepoint, responsible for securing the information and physical assets of Forcepoint on a global scale.
Barton spent three years building and leading the international security team at Hireright protecting their customer data and intellectual property. Prior to that, he spent almost eight years as director of information security at AT&T/Cingular, based in Atlanta, Georgia, where he led efforts to protect over 80 million wireless subscribers. As group manager of security operations and engineering at Sprint/Nextel, he managed all security activities for application development, database architecture and enterprise policy and audit compliance, in addition to building a world-class white-hat security team.
Barton holds an executive MBA from University of Missouri, Kansas City, a B.S. in management information systems from Simpson College and a CISSP certification.
Break2:15 pm - 2:30 pm
Break / Vendor Booth Time
Session Eight2:30 pm - 3:00 pm
The Vera Platform gives developers the power to build advanced data security and control into any business application, extending protections beyond the borders of an organization. Leverage our SDK and REST APIs to encrypt, track, and revoke access to files, and give your security team complete visibility over how confidential information is used, and the tools to manage access anywhere it travels.
CISO PANEL3:00 pm - 4:00 pm
8:15 am - 5:00 pm1415 Fifth AvenueSeattle, WA 98101(206) 971-8000