Data Connectors is proud to host the Cybersecurity Strategies Conference.
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Resolve alerts. Stop Breaches.
It sounds simple until you tackle the problem of dealing with alerts at scale. Learn why MSSP’s and in-house SOCs can’t solve it, and how this results in accepting risk you may not know about.
In our brief time we will:
1. Communicate the problem along with solutions to the business in a way that results in action.
2. Expect a candid translation of security terms which mask risk and give a false sense of security to the business.
3. Learn how to translate risk into a business discussion to justify the cost of mitigation.
4. Leave with a worksheet which you can use in your own work environment.
5. Make career enhancing decisions.
Greg Werkowitch is an MDR specialist who bridges the communication gap between security and business leadership teams in a way that is easily understood and that also focuses on business outcomes. The end result is both sides have a better chance of getting what they need while making career enhancing decisions.
Resolving alerts at scale for business outcomes
For a copy of this presentation, please contact Greg Werkowitch – [email protected]
What is Robotic Decision Automation and Why Should I care?
Tuning down devices, writing SIEM Rules and monitoring detection consoles is out. Not only do we not like it, it hasn’t proved to be effective and it gives us less visibility. The Respond Analyst is a new kind of analyst that increases capacity and improves the capability of any security team, regardless of size or industry – It optimizes your resource-constrained, overworked teams with a virtual analyst that processes alerts at machine speed, at scale, 24×7. Powered by Robotic Decision Automation (RDA), it’s ideal for organizations that are collecting meaningful security data, but struggle with having the manpower and time to properly analyze and triage every security event.
Join us during this presentation to learn:
Why traditional human-centric monitoring based on rules and queries has failed and leads to analyst fatigue and turnover.
How the Respond Analyst uses RDA to eliminate concerns of ‘unattended alerts’ and missed clues by analyzing more security data – No filters, No Tuning. We’ll discuss how new approaches and technology will advance Security Operations to have the capacity of a Fortune 100 company. Your team can analyze billions of incoming security events daily using techniques such as AI, ML, Expert Systems, and probabilistic math.
How the Respond Analyst integrates with your existing technologies and workflows to speed response, modernize, and automate security operations.
Thomas is an expert in application security, red teaming and penetration testing, and general data security and privacy issues, with nearly twenty years of hands-on experience in the field at companies like Hewlett Packard and Micro Focus. He was a founding Board Member in the New York City chapter of OWASP, and has long been a well-known public advocate for stronger application security. His social-media based research project, dubbed the “Robin Sage Experiment,” demonstrated the dangers—and widespread prevalence—of information oversharing online today, and received media coverage and international attention. Thomas is passionate about how adversarial perspectives and red teaming exercises can help organizations build stronger cyber defenses, and designs attack and defend training curricula for top universities and cybersecurity certificate programs.
Break / Vendor Booth Time
A New Era of Data Protection: Converged DR and Backup
In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!
The cost and business impact of downtime and data loss can be immense
Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters
Having a plan and process in place will help you mitigate the impact of an outage on your business.
In this presentation we will address the challenges, needs, strategies, and solutions.
The Human Deception Problem: Understanding and Defending Against Social Engineering Attacks
The most successful method of cyber-attacks continues to be phishing. These attacks cost organizations millions of dollars each year and things are just getting worse. As these attacks intensify and become more refined, technology is failing to keep up and your users will continue to fall prey. To effectively defend yourself against this, you have to understand how the attacks work, including the psychological triggers and tricks the attackers are using. This session will explore the different levers that social engineers and scam artists pull to make your users more likely to do their bidding.
Join James R. McQuiggan, CISSP, Security Awareness Advocate at KnowBe4, as he provides fun and engaging examples of mental manipulation in everyday life: from the tactics used by common criminals, to sophisticated social engineering and online scams. Additionally, he’ll look at how you can ethically use the very same levers when educating your users.
James is a Security Awareness Advocate for the KnowBe4 Company. Prior to joining KnowBe4, James worked for Siemens for eighteen years where he was responsible for various roles over that time. James was the Product & Solution Security Officer Siemens Gamesa Renewable Energy. He consulted and supported various corporate divisions on cybersecurity standards, information security awareness and securing product networks. In addition to his work at Siemens, James is also a part time faculty professor at Valencia College in the Engineering, Computer Programming & Technology Division.
Within the Central Florida community, he is the President of the Central Florida (ISC)2 Chapter supporting cybersecurity professionals with meetings, education and networking opportunities. Working with the Center for Cyber Safety and Education, James has taught the Safe & Secure Online education and awareness program to over 7,000 students, parents, teachers and the “life experienced” (seniors) to ensure they understand the dangers of the internet.
James is the father of two teenage daughters and continues to make sure they are safe and secure online while using their smartphones and social media.
Break / Vendor Booth Time / Lunch
Mr. J.D. Henry serves as the Region VII (Missouri, Kansas, Iowa, and Nebraska), Cybersecurity Advisor for the Regional Operations Branch of the Integrated Operations Directorate. He supports the Department of Homeland Security (DHS) and Cybersecurity and Infrastructure Security Agency (CISA) mission of strengthening the security and resilience of the nation’s critical infrastructure. His program coordinates cyber preparedness, risk mitigation and incident response, and provides cyber security resources, including assessments, to the nation’s sixteen critical infrastructure sectors and state, local, tribal, and territorial government entities.
J.D. has 19 years’ experience in the Information Technology field, to include multiple civilian assignments within the Department of Defense. Additionally, he is still currently serving as a Cyber Warfare Officer in the United States Air Force Reserves.
J.D. has numerous IT and cyber certifications to include: Certified Information System Security Professional (CISSP), Certified Information Systems Manager (CISM), GIAC Certified Forensic Analyst (GCFA), and GIAC security Essentials Certification (GSEC).
J.D. has earned a Master’s in Business Administration from Lindenwood University, and Bachelors of Science degrees from the University of Maryland University College in Information Systems Management and Southern Illinois University Carbondale in Workforce Education and Development.
Break / Vendor Booth Time
Deception Technology, Luxury Item or Lifeline?
A common deception technology misconception is that it is a luxury item meant only for companies with mature security operations or large budgets. This session will provide insight into how deception has evolved, its fit within the security stack, and why organizations both large and small are turning to deception for accurate detection, building predictive defenses, and accelerated incident response. Join in to hear about real-world deployments and top use cases. Attendees will leave with insight into the value and benefits that defenders have realized from adding deception into their security operations programs and why it is often a lifeline for defense against today’s advanced attackers.
GB has 3 decades of experience in I.T. ranging from network support, programming, application & network performance management to security architecture & cyber security across verticals such as airlines, government, healthcare, manufacturing and medical devices. GB has a BA in Computer Science, Mathematics and Physics and an MBA in MIS and Operations. GB has held numerous industry certifications and is a Certified Ethical Hacker (CEH) and Certified Information Systems Security Professional (CISSP). GB lives in Aurora, IL and is extensively involved in community service.
Windows 10 Migrations
Companies are scrambling to beat the deadline and get their remaining Win 7 machines migrated to Windows 10 before Microsoft sunsets Windows 7 on January 14th.
Start managing your endpoints properly and proactively. Avoid the inevitable long term implications of quick-fix upgrades. In this presentation we outline the different migration approaches taken today. We also outline how to overcome some typical pitfalls and start managing the entire life-cycle of your PCs, Servers and Mobiles centrally through one intuitive UI. And even if Win 7 is no longer your problem, how about the next In-Place upgrades coming down the pipe at a frequent pace to keep the Migration pains and inconsistencies across Windows deployments going.
Holger is a seasoned UEM expert with over 20 years of experience in Endpoint Automation for company of all sizes.
He has designed and implemented UEM solutions for many large enterprises as well as SMB customers. As a former Product Manager in the UEM space he is also familiar with most company’s general challenges and common obstacles in achieving a secure, easy to manage and support, consistent user workspace.
Break / Vendor Booth Time
Idaptive Next-Gen Access is the only industry-recognized solution that uniquely converges single single-on (SSO), adaptive multifactor authentication (MFA), enterprise mobility management (EMM) and user behavior analytics (UBA). With Idaptive, organizations experience secure access everywhere, reduced complexity and have newfound confidence to drive new business models and deliver kick-ass customer experiences. Over 2,000 organizations worldwide trust Idaptive to proactively secure their businesses.
Mergers & Acquisitions: Best practices for information security
This is a non vendor pitch about best practices as companies go through mergers, or how to plan ahead before the merger.
David Barton, Chief Information Security Officer, is responsible for the day-to-day leadership and general management of the company. Barton brings to Stellar Cyber more than 20 years of experience in security leadership roles across a variety of industries, including telecommunications, healthcare, software development, finance and government. Prior to Stellar Cyber, he was Chief Operating Officer for 5Iron. Before 5Iron, he spent three years as Chief Information Security Officer for Forcepoint, responsible for securing the information and physical assets of Forcepoint on a global scale. Barton spent three years building and leading the international security team at Hireright protecting their customer data and intellectual property. Prior to that, he spent almost eight years as director of information security at AT&T/Cingular, based in Atlanta, Georgia, where he led efforts to protect over 80 million wireless subscribers. As group manager of security operations and engineering at Sprint/Nextel, he managed all security activities for application development, database architecture and enterprise policy and audit compliance, in addition to building a world-class white-hat security team. Barton holds an executive MBA from University of Missouri, Kansas City, a B.S. in management information systems from Simpson College and a CISSP certification.