CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Session Two9:15 am - 9:45 am
Threat Lifecycle Management
Today’s reality is that your organization will continue to be confronted by increasingly frequent and complex cyber threats.
The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to monitor and search across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? Faster time to detect and time to respond, without adding staff to accomplish the job.
Darren Cathey has several decades of experience in programming, operating systems, and applications security.
His multi-functional experience in engineering, marketing and sales lends itself well to supporting both SMB and Enterprise customers in the Mid-Atlantic territory as a Sr. Systems Engineer. Past experience includes positions with HP, Wind River Systems, Arxan, Vormetric and Varonis.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
Who Is a Privileged User, Really? The Answer May Surprise You
Gurpreet leads Axiad’s technology roadmap with more than 17 years of experience in cutting-edge network security and identity management technologies and methods. Prior to joining Axiad IDS in 2017, Gurpreet served in variety of management and senior technical roles at IBM, Lenovo, Oberthur, SafeNet, and SecuEra. His contributions included the development of the many hardware and software products for Cybersecurity, Identity and Access Management for people, devices, and Internet of Things.
Session Four10:45 am - 11:15 am
Cyber Exposure: Essential Visibility into the Modern Attack Surface
The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program. Join our session to learn how CISOs can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.
Joe Decker has been with Tenable for over four years, most recently serving as a security engineer. Previously, Joe has worked in and with multiple departments within Tenable including the support department and R&D. Joe specializes in security implementations and solutions planning. Throughout his time in engineering, he has helped countless companies gain visibility into their cyber exposure using Tenable’s solutions.
Lunch11:15 am - 11:45 am
Break / Vendor Booth Time / Lunch
Keynote Session11:45 am - 12:30 pm
Dave Hogue currently serves as the Technical Director for the NSA’s Cybersecurity Threat Operations Center (NCTOC), a dynamic, national-level entity that serves at the forefront in the fight against malicious cyber activity through integrated cybersecurity operations.
Break12:30 pm - 12:45 pm
Break / Vendor Booth Time
Session Six12:45 pm - 1:30 pm
A new approach to email security for Office 365
For hackers, Office 365 is the new black!
Because a simple set of Office 365 credentials can give you access to sensitive documents, applications and confidential business information, Office 365 is now the go-to place for cybercriminals looking to make a fast and high profit.
Each day these hackers implement new and always more creative phishing and spear-phishing attacks, that easily bypass the traditional email security solutions.
Discover what their techniques are, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Session Seven1:30 pm - 2:00 pm
The Security Educated Workforce: Utopia or Reality?
Data loss is only the symptom. The root of the problem is with the unpredictable nature of humans. Strong security measures can create a forcefield, but it only takes a minute for an imprudent employee to circumvent them. Learn how to leverage behavioral context and AI to condition employees into security-sustainable habits.
Ron Coe, Jr. is an Information Systems executive with an extraordinary ability to integrate leading edge technologies with business requirements. Acknowledged by some of the largest technology companies in the world as having a broad vision for how new capabilities might be used in Professional Services, Oil & Gas, and Management Consulting organizations. Ron has proven ability to deliver complex, highly integrated information systems to businesses while ensuring that the user experience remains familiar. Ron has demonstrated ability to interact with members at all levels of an organization; excellent communications skills have earned the role of trusted business advisor. Proven ability to develop and lead globally distributed multicultural teams.
Alex Price is passionate about introducing organizations to new and innovative technologies that challenge the status quo. Alex’s career spans over 12 years of account management at companies such as TANDBERG, Cisco, and Jazz Networks. When Alex isn’t working, he spends his free time wakeboarding in the summer and hitting the slopes in the winter.
Break2:00 pm - 2:15 pm
Break / Vendor Booth Time
Session Eight2:15 pm - 2:45 pm
Protecting your Data from the Inside
Data Security is a term that covers a broad spectrum of approaches. Perimeter solutions are vital to keeping external threats out, but what if those threats get in? What if those threats have been inside all along? This presentation will discuss the notion of a trusted insider threat and a solution to help protect your critical file assets utilizing real-time activity monitoring.
Break2:45 pm - 3:00 pm
Break / Vendor Booth Time
Session Nine3:00 pm - 3:30 pm
Win Big with IT Resilience
In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you to manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.
Session Ten3:30 pm - 4:00 pm
A Practical (low cost) Approach to Securing East-West Traffic & Critical Data
Despite best efforts organizations continue to struggle detecting and stopping attacks that lead to costly exposures of critical data.
Why is this? One reason is that organizations typically do not have a simple means to provide visibility to threat as they move East-West across their network. Leaving them blind to up to 80% of their threat surface.
Come learn how to leverage simple techniques to make your existing threat detection and investigation processes much more effective.
Learn also how to add layers of defense to protect your most critical assets.
Prize Drawings for all in attendance
Session Eleven4:00 pm - 4:45 pm
Adopting a People Centric Approach to Cyber Security
The best defense is still a good offense. Best practices for a holistic cyber security program involves educating end users with where & how they are exposed to cyber-attacks, and highlighting key areas where proactive steps should be taken to minimize risks to cyber-attacks.
The facts remain that the number of cyber-attacks have continued to rise, and are becoming increasingly technically advanced. It’s clear that the end user has to be integrated into any cyber security defense strategy. The holistic cyber defense eco-system combines both human and technical security preventative measures into a comprehensive security program.
Jack Johnson Manager a Sr. Systems Engineer with Proofpoint has over 20 years of experience in the Enterprise Systems Engineering and Security space. Jack is a US Navy veteran where he served for 8 years as a Cryptologist. He also has an extensive background in Cyber Security having managed a Security Operations Center (SOC) for 13 years.
Registration has closed for this conference