Securing Digital Communication: Accelerating Your Digital Business
Entire workforces are pivoting to 100 per cent digital everything – motivating security leaders to accelerate their digital business initiatives – but how does this translate for sensitive documents and confidential communications? Many organizations are not well-prepared.
Learn more about the critical role email data protection plays in your digital business acceleration and how to choose an encryption solution which works – and will actually be used – throughout your organization.
Join Echoworx’s Senior Director of Market Intelligence Jacob Ginsberg as he talks about:
Jacob Ginsberg, Senior Director of Market Intelligence, has been with Echoworx since 2012 and is an avid technology advocate. Jacob, utilizing Echoworx’s extensive market intelligence, develops insights for global enterprises leveraging innovative information security technologies. Jacob is passionate about translating today’s data into tomorrow’s business advantage.
Data Connectors is proud to host the Southern California Virtual Cybersecurity Summit!
More than 80,000 members of the Data Connectors Cybersecurity Community are in Southern California. This TWO-DAY Virtual Summit will be conducted in real time, with amazing panels, presentations, exhibits & demonstrations!
Times for this Event are in Pacific Standard Time (PST)
Threat Hunting & Modern Security: 3 Fundamental Flaws
Security Operations is a discipline continuously evolving – with the evolution of tools and processes , there are still 3 fundamental flaws that exist with Modern Security Operations. We will examine 3 specific flaws of modern security operations:
We will start the discussion with a quick SOC capacity expertise, review in detail the 3 fundamental security flaws, revisit the math from the SOC capacity exercise to understand “what is being missed based upon my current capacity?” We will also cover costs to the business for associated with these flaws and wrap up with some suggestions for mitigation.
Jim Rohde, Director of Presales Engineering at CRITICALSTART is responsible for leading a team of security experts supporting technical conversations for CRITICALSTART’s products & services, including their flagship offering: Managed Detection & Response. Prior to CRITICALSTART, Jim held leadership roles at large Managed Security Service providers including Secureworks & Trustwave where he has received numerous awards for customer & company exceeding objectives. Jim’s expertise in a multitude of security domains over his career has made him a sought after Trusted advisor for organizations of all sizes.
Get Rich Quick with Ransomware: A Lazy Hacker’s Perspective for Enterprises
Think Ransomware isn’t for you? In this enlightening talk, Gil Azrielant, co-founder of Axis Security, will quickly discuss the business opportunities, the technologies, the industry and the mechanics that attract hackers to ransomware. In the process Gil will reveal how some enterprises can use new technologies to defend themselves against attack.
Gil Azrielant is co-founder and CTO of Axis Security. Gil is responsible for technology strategy and the development of the company’s cloud-based zero-trust application access platform. Prior to joining Axis Security, Gil was co-founder & CTO of Cool Cousin, a cloud-based platform for travelers looking to unlock outstanding travel experiences.
Gil’s cybersecurity career began in the elite Unit 8200 of the Israeli Army Intelligence Corps, where he worked on advanced cyber security and code decryption. He served five years inside this elite unit, working as a researcher and team leader.
Gil holds a Bachelor of Science degree in Computer Science and graduated magna cum laude from IDC Herzliya, one of Israel’s leading academic institutions.
The Fear Factor: Reducing Risk in Your Environment
Security is a top priority for organizations today. In this session, attendees will learn how to improve their organization’s security posture in the following ways:
This session will help attendees to understand that fear should not be a factor in their approach to security.
Greg has 18 years’ experience as an IT Director for organizations in compliant environments including healthcare, medical device, and pharmaceuticals. He has an undergraduate degree in Computer Information Systems from Indiana University and an MBA from UNC-Wilmington. Greg is an ISACA Certified Information Systems Auditor, passing his exam in the 90th percentile. Greg’s initiative led to the creation of our Security Audit and Compliance team, which now focuses on framework-based assessments (NIST, HIPAA, ISO), Internal Audit as a Service (IAaaS), Penetration Testing and Virtual CISO offerings.
Lessons Learned from Real-life Ransomware Remediation Projects
Ransomware has organizations of all sizes and across all industries concerned that they may be the next to get attacked. Hackers have deployed wide-scale efforts to focus on known vulnerabilities, target users who are least prepared and may least expect it, and hone in on gaps in security with targeted exploits.
While helping to remediate active ransomware, the Dasher team has taken the time to pull together best practices and lessons learned from working with clients, with particular focus on the trends in attacks seen over the past few years.
In this presentation, Senior Solution Architect, Kellen Christensen, will talk through this experience, sharing new information the team has learned. He will also make recommendations on what steps your organization should be taking in order to help prevent future Ransomware attacks.
Kellen has been with Dasher Technologies since 2016 and currently holds the title of Sr. Solution Architect, Cybersecurity. Throughout his long career, Kellen has architected and implemented countless Cybersecurity and networking-related projects for organizations in manufacturing, hospitality and healthcare for both Small Businesses and Enterprises. Kellen is an expert in solutions from companies like Palo Alto Networks, Aruba, Cisco, Tenable, F5 and many many more in both the physical and cloud space.
Ransomware – to Pay, or Not to Pay?
Ransomware has been a hot topic of 2020, as bad actors show there is no honor among thieves – as they target hospitals, health care organizations and other firms in the throws of COVID response. Moreover, sensitive data is put at risk, huge sums of money are in the balance, and organizations must struggle between expediency and the bottom line.
Lunch Briefing – Starts at 12 noon
Small business deserves big protection with Cisco Umbrella
Small businesses are facing many of the same cybersecurity challenges as these larger businesses: 66% of small businesses experienced a cyberattack in 2019, and 63% experienced a data breach. But securing your business doesn’t have to be complicated. Join Rohit where you’ll learn more about small business cybersecurity and why DNS protection makes a difference.
Rohit Sawhney leads the DNS Product Management team for Cloud Security at Cisco, with expertise in Cisco Umbrella and surrounding technologies. Rohit has vast experience in product development disciplines in leading global hi-tech organizations for over 20 years. Rohit has rich experience in presenting breakout sessions at Cisco Live events and representing Cisco at numerous other customer and partner events, trade shows, and exhibitions. Rohit holds degrees in Electrical & Computer Engineer and a Business MBA.
Lunch / Solutions Showcase Open
Confessions of a Rogue FBI Agent
1999 – the early days of cybercrime. Identity theft was a new idea, and the FBI birthed a new division to handle it. It had never been done before – but a few agents started it, flew by the seat of their pants, and traversed the federal law enforcement landscape to blaze a new path, fighting criminals that worked outside our boarders.
EJ Hilbert was there at the beginning. In this keynote presentation, he’ll talk about case studies from that time, and walk through the scintillating story of his own travelais, which led him to bring down the first major Russian CyberHacker, and later land him squarely in the crosshairs of an international spy thriller: corporate espionage, rouge agents, questionable officials and bad actors.
You’ll be excited and enlightened by the story, and in the process learn more about today’s threat landscape. Moreover, you’ll understand why the current cybersecurity environment goes beyond traditional law enforcement – requiring vigilance on the part of corporations and especially cybersecurity professionals.
E.J. Hilbert is the Founder of KCECyber. E.J. has over 25 years of experience in the Security, Privacy, Risk Mitigation and Compliance fields. E.J.’s primary expertise is in helping clients establish a compliant Cyber Security and Privacy strategy and executing on that plan.
Prior to starting KCECyber, E.J. has held executive roles in Cyber Security and Privacy at CNM, GDBA, PriceWaterhouse Coopers and Kroll (US and Europe). During which he has served as Practice Leader, Consultant, Educator and CISO for employers and clients.
E.J. also served as an FBI Special Agent addressing White Collar Crime, Cybercrime, Counterintelligence and Counterterrorism. He spent 4 years undercover; two years working against Eastern European hackers and two infiltrating Al Qaeda online.
Is Ransomware Winning?
Ransomware is a prevalent cybersecurity threat. Threat actors are constantly changing tactics looking for new ways to force ransom payments. With each new emerging ransomware threat family, the size and scope of threats are getting nastier too. This has led to incredible increases in the average ransoms paid over the past eighteen months. In this session, we will look at recent ransomware trends, the critical changes to threat actor behaviors, and discuss the strategies and technologies organizations need to defend themselves against this evolving threat.
Chris Goettl is the Director of Product Management for security products at Ivanti. Chris has over 15 years of experience working in IT, where he supports and implements security solutions for Ivanti customers and guides the security strategy and vision for Ivanti security products. He is also a security evangelist speaking at security events globally where he gives guidance around modern cyber threats and how to combat them effectively. Chris hosts a monthly webinar focusing on Patch Tuesday and security vulnerabilities, and frequently blogs about security topics. You can find contributed articles as well as commentary from Chris in notable security news sources like SC Magazine, Redmond Magazine, ComputerWorld, ThreatPost, Help Net Security, and more.
Visibility in the Cloud Must be Part of your Security Strategy
As we move to the cloud we often overlook the issue around planning for security. We size for compute and resilience but what about security and compliance? Lets talk about a few of the issues around moving to the cloud from a security point of view and a few ideas on resolving the issues this new architecture presents.
James is a veteran security professional with Gigamon and has worked with some of the largest companies pre and post breach. He has provided guidance to organizations on methods to build out secure Access and Visibility plans during these times of consistently evolving network and security landscapes. As a Field CTO at RSA Security James spent his time speaking to executives about building a mature cybersecurity posture and what it takes to achieve usability and compliance. James is a standing member of the High Tech Criminal Investigations Association and volunteers with police investigations in high tech crimes.
Introduction to Risk-Based Vulnerability Management
Organizations have millions of vulnerabilities. And our research has shown that those same organizations, large or small, on average, can only fix one in 10 of those vulnerabilities.
But as a security executive you still need to keep your organization secure, so how do you do that when you can’t possibly fix all of your vulnerabilities? The answer is to focus on your highest-risk vulnerabilities first.
Join Kenna Security’s CTO and Co-Founder Ed Bellis as he:
Ed Bellis is a security industry veteran and expert and known in security circles as “the father of risk-based vulnerability management.” He founded Kenna Security to deliver a data-driven risk-based approach to remediation and help IT teams prioritize and thwart would-be security threats.
Ed is the former CISO of Orbitz and former Vice President, Corporate Information Security at Bank of America. He is an advisor to Dharma and former advisor to SecurityScoreboard.com and Society of Payment Security Professionals. Ed is a contributing author to the book, Beautiful Security (Oram, Andy & Viega, John, O’Reilly Media, 2009).
He is a frequent speaker at industry conferences. Recent engagements include the 2017 Enterprise Security Summit (Dos and Don’ts of Establishing Metrics that Cultivate Real Security) and InfoSec World (Amateur Hour: Why APT’s Are the Least of Your Worries).
Interview: Cybersecurity and Data – from GDPR to CCPA
Scott Giordano, Esq. and Michael Hiskey – Data Connectors
In a world where more and more companies are completely virtual, it is vital to keep data protected. When hackers want to access personal data, they can do so with ease as de-identification is no longer enough to keep it safe. If the bad actors obtain this personal data, there can be severe consequences from the GDPR and the CCPA.
Join Scott Giordano, Vice President, and Senior Legal Counsel for Privacy and Compliance at Spirion, as he delves into the evolving topics that surround the legal end of data protection. The specificities of data protection laws can differ between every state in America. Come learn about the differences between the GDPR vs the CCPA, the legal ramifications of data breaches from the EU and CCPA, and how Spirion can help to protect your data.
Scott M. Giordano is an attorney with more than 20 years of legal, technology, and risk management consulting experience. An IAPP Fellow of Information Privacy and a Certified Information Security Systems Professional (CISSP), Scott serves as Spirion’s subject matter expert on multinational data protection and its intersection with technology, export compliance, internal investigations, information governance, and risk management. Prior to joining Spirion, he served as Director, Data Protection for Robert Half Legal and established the global privacy program for Esterline Technologies Corporation in Bellevue, WA.
During his career, Scott has held senior positions at several legal technology firms and is listed as co-inventor on Intelligent Searching of Electronically Stored Information, patent application no. 13/842,910. In addition, he taught the first law school course anywhere on electronic evidence and e-discovery.
Scott is a member of the bar in Washington state, California, and the District of Columbia.
Although it seems like a decade – just a few years ago, industry analysts were still advising the CISO community to keep the “crown jewel” data in private data centers. Requirements for the security OF the cloud, and the security IN the cloud have accelerated quickly and today – amid the pandemic – that transition is near-complete.
This is a broad topic – so our panel today will focus on the nuances of security IN the cloud, and some of the cutting-edge practices that innovative organizations are doing today to get ahead of threat actors who target online storage, protocols, email, file shares, and other data and network access that can be accidentally be exposed.
The 2020 Cybersecurity Skills Shortage
The cybersecurity skills shortage is real and getting worse: according to ISC(2), nearly three million cybersecurity positions worldwide are currently unfilled, and Cyberseek reports that more than 300,000 positions are available just in the United States. A lack of cybersecurity analysts, researchers, and other security experts means that bad actors have even more of an upper hand because there are fewer people available to investigate potential threats, analyze attacks, and remediate security problems. The lockdowns arising from the COVID-19 pandemic has made the problem worse.
Osterman Research has conducted an in-depth study and produced a white paper focused squarely on this issue, and Michael Osterman will be presenting the results of that research. In this session you will learn:
Michael Osterman is the principal analyst of Osterman Research, a market research and consulting firm focused on understanding the technologies and processes involved in workplace communication and collaboration. Michael has been the head of Osterman Research for 19 years and in the tech-focused market research industry for many years before that. The company covers a number of topics related to security, security awareness training, content archiving and other areas that are focused on how people communicate and collaborate. The company is based in Washington State.
Q&A Session to follow Keynote speaker Osterman
Summary of Day one, what to expect tomorrow… And Remember the Solutions Showcase is Open until 6:00pm on Day One!
Rise of the Machines: Best Practices for Securing Unmanaged and IoT devices
For many years now, enterprise networks have seen an explosive rise in devices that are challenging for security teams to secure. These include not only unmanaged devices, but also the extensive portfolio of Internet of Things (IoT) in enterprises such IP cameras, conference room TVs, smart building systems, manufacturing machines and medical devices.
Join Ordr CSO Jeff Horne in this webinar to learn:
Jeff Horne is currently the CSO at Ordr where he is responsible for security direction both within Ordr products and internal security. Prior to Ordr Jeff was the VP of Information Security for Optiv where he was responsible for all Security Operations, Governance Risk and Compliance, Endpoint, Internal Incident Response, Physical Security, and Employee Security Awareness groups. Before Optiv Jeff was the Senior Director of Information Security for SpaceX where he was responsible for the overall security strategy of SpaceX and managing the Information Security, Compliance (ITAR), Security Operations, and Physical Security groups. Previous to SpaceX Jeff was the Vice President of R&D and Chief Architect for Accuvant LABS where he managed teams of researchers and consultants specializing in reverse engineering,
Reducing Friction and Managing Remote Work Environments
The business world has changed and many of those changes, like remote working, are here to stay. And keeping your teams safe during this period is a no-brainer—as is making sure their remote endpoints are managed and secure. But with these changes come a list of concerns and issues that many organizations just are not ready to address, sometimes highlighting legacy support policies and even out-of-standard technological needs. The friction of everyday management of the full enterprise has increased, putting a strain on the IT and support staff as well as the users.
During this presentation, I will address common areas of friction in endpoint management as well as ways to pinpoint friction in your environment, and finally ways to address the problems and setup your organization for scalability with endpoint management.
Jay Goodman is a product marketing expert and intelligence consultant with experience working with Fortune 500 companies and startups alike. Jay joined Automox in 2019 and is responsible for the messaging and intelligence gathering functions within the company. Previously, Jay was a Product Manager for McAfee and an avid participant in the cybersecurity and competitive intelligence communities.
Automate or Die Trying: The New Cybersecurity Reality
As the nature of threats continue to evolve as well as the volume of threats increase, a new reality is setting upon cybersecurity teams – automation. Paired with human error and the insurmountable amount of data to manage, it is inevitable that a potential threat will slip through the cracks for businesses who rely too heavily on manual process.
Implementing automation could be vital in order to reliably protect your organization and ensure resilience through robust and repeatable processes.
Join our leading security and product development experts to learn:
Ike Nwabah is the Director of Product Marketing, responsible for the messaging, positioning, and market & competitive insights at Armor. Ike brings 10 years of experience in the technology industry to his role. Prior to Armor, Ike led the product and go-to-market strategy for the Network Security portfolio at AT&T Cybersecurity. He also has a sales and project finance background with other Fortune 500 organizations. Ike holds an MBA with a concentration in Marketing and International Business from the University of Texas at Dallas.
Building Cyber Resilience: Finding Factors not Fault
Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.
Mark Sangster is the author of “NO SAFE HARBOR: The Inside Truth About Cybercrime and How to Protect Your Business.”
Mark is an award-winning speaker at international conferences and prestigious stages including the Harvard Law School, and author on various subjects related to cybersecurity.
He is a contributing author to several leading industry publications (CSO magazine, SC Magazine, LegalTech News), an invited speaker at 40+ conferences a year, and regular guest on well-respected podcasts.
Mark has served on the LegalSEC Council with the International Legal Technology Association (ILTA), and now advises the National Association of Manufacturers (NAM) to establish their cybersecurity policies.
His thought provoking work and perspective on shifting risk trends has influenced industry thought leader, and is a go-to subject matter expert for leading publications and media outlets including the Wall Street Journal and Canadian Broadcast Corporation when covering major data breach events.
His 25-year career was established with industry giants like Intel Corporation, BlackBerry, and Cisco Systems. At BlackBerry, Mark worked on the first secure devices for government agencies. Since then, he has continued to build mutually beneficial relationships with regulatory agencies in key industry sectors including legal, finance, healthcare and manufacturing.
Offensive AI vs. Defensive AI: Battle of the Algorithms
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against Offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.
In this session, learn about:
David Masson is Darktrace’s Director of Enterprise Security, and has over two decades of experience working in fast moving security and intelligence environments in the UK, Canada and worldwide. With skills developed in the civilian, military and diplomatic worlds, he has been influential in the efficient and effective resolution of various unique national security issues. David is an operational solutions expert and has a solid reputation across the UK and Canada for delivery tailored to customer needs. At Darktrace, David advises strategic customers across North America and is also a regular contributor to major media outlets in Canada where he is based, included CBC and The Globe and Mail. He holds a master’s degree from Edinburgh University.
AI & ML in Cybersecurity: Can we ‘Science the heck’ out of trouble?
We get it, Artificial Intelligence (AI) with particular focus on Machine Learning (ML) is one way to overcome advanced threats with particular attention to scale. That said, those terms are thrown at our executives to delight, amaze and confuse them. How do we really discern between them as tools in our kit versus ‘Weapons of Mass Distraction’?
Lunch Briefing – Starts at 12 noon
Proactive Endpoint Protection: What it Is and What it Is Not
Breach damage caused by hackers has accelerated in 2020 despite the fact that businesses are spending more than ever on endpoint security. This is because the incremental improvements being made to EDR and NGAV are outmatched by the fundamental changes we’ve seen in adversarial techniques. Morphisec’s Sam Osterhout will show out a proactive approach to endpoint security offers a means of preventing even the most advanced zero-days, fileless attacks, and exploits. This is not a better, faster, improved version of the tools that have failed us in the past, it’s an entirely new approach to endpoint security that can be quickly and effectively implemented by any business.
Sam is Morphisec’s Senior Security Advisor responsible primarily for the western US territories. Sam has several years of experience in security since his tenure as a US Army Infantry team leader, and is Morphisec’s most recent global sales leader. Sam has been a trusted, consultative voice for his customers and prospects who continue to be huge, and public, champions of their experience with regard to both the solution’s efficacy, as well as their customer experience. Few sellers are more in touch with their buyer’s journeys, even fewer know the technology they’re selling in greater depth.
Lunch / Solutions Showcase Open
The Last Line of Defense: The Importance of having a robust and comprehensive Data Protection strategy
Data protection is experiencing a resurgence. Historically its been seen as an innovation backwater and as “insurance”, but with the growth of Ransomware and cybercrime, and increasing risk, organisations are having to modernize their data protection architectures and strategies to ensure that data can be recovered quickly to ensure that an Organisation can survive an attack. Join this session to learn about the latest innovations in the data protection space and how they can be deployed to provide a comprehensive last line of defence.
David joined Pure Storage in October 2018 as the Rapid Restore Solutions Director and is responsible for the
Rapid Restore solutions roadmap, working with our Data Protection partners (Veritas, Veeam, CommVault & Rubrik) and making sure the Pure sales field have all the tools and enablement they need to be successful. Previously,
David spent a year at Amazon Web Services building a competitive team to work directly with Amazon’s sellers and customers. Before that David spent 17 years at Veritas Technologies in a number of roles – SE, SE Manager and later was responsible for building
a Competitive Intelligence team. He left Veritas as the Director of Competitive and Market Intelligence in 2017.
Understanding and Combating Credential Stuffing Attacks
Credential stuffing attacks are the most common threats observed at Auth0. These attacks can lead to fraud, loss of reputation, and ultimately, loss of revenue.
In credential stuffing attacks, threat actors use stolen credentials from one breach to take over users’ other accounts. This is effective because, according to Google, 65% of people reuse passwords across multiple accounts. On some days, these attacks originate from more than 50,000 IP addresses and may account for as much as half of all login attempts using our platform. Even the most mature companies are vulnerable if they don’t have the right preventative measures in place.
Join Auth0 to learn:
Chris Scott is a Senior Solutions Engineer at Auth0. Leveraging his past experience in both software development and enterprise sales, Chris provides education and guidance to security professionals looking to strengthen their identity strategy.
Hacking Exposed: Learning from the Adversaries
Fileless attacks and fileless malware have grown in sophistication, especially in their ability to obfuscate and hide from both traditional and next-generation anti-virus. Join us to discover the techniques being used by APT32/OceanLotus to attack their victims and learn how to replicate them to better test your defenses. In this very short demonstration, you will learn techniques to make a weaponized document that is designed to not just bypass AV but also human threat hunters through a sophisticated method of obfuscation and the use of built-in trusted tools. The document is capable of allowing the attacker to gain remote access to the victim system and exfiltrate sensitive data. You will get to see, firsthand, the attack compromise both a Windows PC as well as a MacOS.
Brian Robison is the Chief Evangelist at BlackBerry, where he educates the world that preventing cybersecurity threats is actually possible and a much better approach than detecting and responding after the attack. Prior to joining Cylance, Robison spent five years helping secure corporate data on mobile devices—three years at Citrix as Director of Technical Marketing and two years driving enterprise product strategy at Good Technology. Before moving into the mobile security space, Robison’s career focused on endpoint security and risk and compliance. At McAfee, he led the effort to bring ePolicy Orchestrator into the modern age as well as managing the vulnerability management and policy compliance solutions. Prior to McAfee, Robison held many roles over his seven-year career at Tripwire, Inc.
Using Security Testing to know What’s Working
The security team needs to stop being invisible. When we’re not on the forefront on business mind-share, security becomes a cost-center that only appears if something goes wrong. Using security testing to show what is going right – quarter by quarter – demonstrates the direct and real impact of the security team on the safety and strength of the business itself. This session will dive into topics regarding how continuous security validation can demonstrate ROI on investment, how to show that those investments have a real impact on the reputation and revenue of the business, and how any new spend can be justified in terms of continued benefit to the bottom line.
Mike DeNapoli has spent over two decades working with companies from mom and pop shops to Fortune 100 organizations; advising on issues from Business Continuity Planning, to Cloud Transformation, to Real-World Cybersecurity. He is currently a Senior Solution Architect with Cymulate Breach and Attack Simulation; helping customers and partners know that their security controls are defending the organization, without speculation.
Defense-in-Depth: 3rd Party Risk
Layering Defense in Depth (DiD) with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors. From individual laptops, to VPN to the WAN, the old paradigm of “castles and moats” is soooo 1999. How are organizations defending against inventive hackers penetrating their systems in 2020?
A People-Centric Approach to Cyber Risk Management
Today’s threat landscape is characterized by attacks which focus on humans. For the third straight year, Proofpoint Threat Research has confirmed that over 99% of attacks are human-activated.
Developing a holistic cyber security program involves educating end users on where and how they are exposed to cyber-attacks, gathering metrics, and highlighting key areas where proactive steps can be identified to minimize risks to cyber-attacks.
During this presentation, we’ll cover:
Jack Johnson has been enjoying his current role as a Sr. Solutions Engineer with Proofpoint for the past 3+ years and is a recognized subject matter expert in the information security industry. Specializing in detecting and mitigating Social Engineering attacks, Jack has over 25 years of experience having begun his adult career by serving 8 years in the US Navy as a Naval Cryptologist. Transitioning to his civilian career he leveraged skills learned in the Navy to obtain a role as an Enterprise Linux Systems Engineer where he learned OS and network security first hand. Ultimately Jack found himself in a role as a SOC Manager, where he managed a phishing takedown service for 13+ years before joining Proofpoint.
The Dark Web: A New Underground Economy
How Dark Markets are Innovating and Why It Matters
Throughout history, underground economies thrive following war, natural disaster or political upheaval. While difficult to accurately discern, the underground economy in the U.S. is estimated to be 11-12% of GDP or $2.5 trillion–excluding illegal drug sales, gambling or prostitution! Over the last two years, dark web marketplaces and other underground commerce methods have been innovative and growing, preparing for a new economic reality. While drugs are still popular, malware and stolen data have become far more lucrative for sellers and buyers. In this session, analyst Michael Mayes will share the latest on dark web market innovation and activity, including the sale of COVID-19 related drugs and supplies.
Michael Mayes is a writer and cybersecurity threat researcher in Dallas, Texas. Since 2013, his work has focused on dark net anonymous markets and the technology, including Bitcoin, that makes them possible. His research on dark markets and ransomware has been featured in Forbes, Dark Reading, ZDNET and BusinessWeek.
Solution Showcase Open until 6:00 pm