Welcome / Introductions8:30 am - 9:00 am
Data Connectors is proud to host the St. Louis & Oklahoma Virtual Cybersecurity Summit.
Session One9:00 am - 9:30 am
Threat Hunting & Modern Security: 3 Fundamental Flaws
Security Operations is a discipline continuously evolving – with the evolution of tools and processes , there are still 3 fundamental flaws that exist with Modern Security Operations. We will examine 3 specific flaws of modern security operations:
- Risk Acceptance
- SOC Alert Overload
- Inability to mitigate all Zero-Day Attacks.
We will start the discussion with a quick SOC capacity expertise, review in detail the 3 fundamental security flaws, revisit the math from the SOC capacity exercise to understand “what is being missed based upon my current capacity?” We will also cover costs to the business for associated with these flaws and wrap up with some suggestions for mitigation.
Jim Rohde, Director of Presales Engineering at CRITICALSTART is responsible for leading a team of security experts supporting technical conversations for CRITICALSTART’s products & services, including their flagship offering: Managed Detection & Response. Prior to CRITICALSTART, Jim held leadership roles at large Managed Security Service providers including Secureworks & Trustwave where he has received numerous awards for customer & company exceeding objectives. Jim’s expertise in a multitude of security domains over his career has made him a sought after Trusted advisor for organizations of all sizes.
Session Two9:30 am - 10:00 am
Cyber Resilience: Rethinking your data protection strategy in the age of ransomware.
Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!
Andy Fernandez is a Global Product Marketing Manager at Zerto. With a focus on product marketing and launches, he strives to translate technical innovation to business value. After spending years in various technology companies and entrepreneurship pursuits, Andy is focused on launching industry-leading products and accelerating their adoption.
Session Three10:30 am - 11:00 am
The IoT storm … Will we survive the coming deluge?
IoT devices permeate the most intimate aspects of our everyday lives. Now more than ever we must address the risks associated with these always on, always connected devices!
Robert Falzon is currently the Head of Engineering within the office of the CTO for Check Point Software Technologies Inc., the worldwide leader in securing the Internet. His background includes over 20 years of experience in large-scale network security architecture, design, and deployment projects for government and business organizations spanning the globe. Currently leading a large team of the most talented cyber security engineers in the industry, Robert and his team are responsible for educating the market on the latest cyber security trends.
Other past responsibilities have included operational, management, and developmental duties for major accounts within EDS Canada’s network security team, and lead engineer for many major European Telco accounts with Alcatel in Paris France. While with Alcatel, Robert worked to assist those accounts in moving to emerging voice technologies while maintaining a focus on security.
After obtaining his CISSP certification, Robert went on to provide security process and audit/penetration testing training to major financial and energy customers within Europe and the Middle East, in addition to providing audit and penetration testing and consulting services to customers worldwide.
Session Four11:00 am - 11:30 am
About Attivo Networks
Attivo Networks® is the leader in deception for cyber security defense. Founded in 2011, Attivo Networks provides a comprehensive deception platform that in real-time detects inside-the-network intrusions in networks, public and private data centers, and specialized environments such as Industrial Control System (ICS) SCADA, Internet of Things (IoT), and Point of Sale (POS) environments. Founded on the premise that even the best security systems cannot prevent all attacks, Attivo provides the required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Unlike prevention systems, Attivo assumes the attacker is inside the network and uses high-interaction decoys and endpoint, server, and application deception lures placed ubiquitously across the network to deceive threat actors into revealing themselves.
Lunch11:30 am - 12:00 pm
Lunch / Solutions Showcase Open
Session Six1:15 pm - 1:45 pm
Cybercrime, Inc: The Business of the Dark Web
The Dark Web is growing at an exponential rate, with hackers doubling down on cybercrime-as-a-service – allowing non-traditional and unskilled hackers to wreak havoc in ways previously impossible. Criminals don’t have to be skilled to get your data; they just have to hire someone who is.
The session aims to expose the inner workings and business of the cyber underground, focusing on the following:
- Cryptocurrency – the impact digital currency has had on the rate of growth of cybercrime
- Cybercrime-as-a-service – the expansion of services offered by skilled hackers & for low costs
- Money laundering & money mules – ways criminals are skirting around laws/regulations to get paid
- How businesses can protect themselves from all levels of cyber criminals
Michael Mayes is a senior writer and researcher at Armor, a cloud security-as-a-service provider in Richardson, Texas. His career in technology communications includes work with the Human Genome Project, handheld software during the Palm and Pocket PC era, blockchain development and cybersecurity. He began his research in black markets in 2013 during a PhD year in professional and technical writing at the University of Memphis where he wrote on the early days of Bitcoin and its defining proof of concept, the Silk Road.
Session Eight2:30 pm - 3:00 pm
About Sentinel IPS
Network security isn’t just our business. It’s our passion. The first iteration of Sentinel Intrusion Prevention Systems began in Dallas, Texas, in 1995, at the dawn of the World Wide Web. Although we started as web developers, we soon shifted our focus to network security, driven by the belief that everyone—and every sized company—has the fundamental right to be secure on the Internet. Small businesses, state and local government entities, and companies with lean IT departments that simply didn’t have the security expertise or the time to put one more thing on their already overflowing plates. We couldn’t find an integrated solution that checked all the boxes, so, we assembled a team of innovators and developed our own.
Session Nine3:00 pm - 3:30 pm
Session Details Coming Soon
Closing Session + Prize Drawing
Solution Showcase Open Until 6:00 pm
Registration for this event is opening soon.
Click Here to be added to the Invitation List for a complimentary pass.