CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Session One9:00 am - 9:30 am
Achieving “Always On” IT Resilience
It’s time to revolutionize your data protection strategy. Protecting and transforming your digital business for exceptional customer experiences requires an “always on” platform for disaster recovery, backup and cloud mobility. An IT Resilience Platform allows you to cost-effectively and swiftly manage both unplanned disruptions, including outages, ransomware attacks, and natural disasters, as well as planned events, such as moving to the cloud or data center consolidations.
Session Two9:30 am - 10:00 am
That Escalated Quickly! Defending The Next Wave of Cyberattacks
In this session, we will delve into the latest cyberattacks from the perspective of the attackers – as well as from the security professionals aiming to stop them.
Paul Lawrence is a Cyber Security Sales Engineer at Sophos. Prior to Sophos, Paul acted as an agnostic resource to help customers identify technology needs, analyze potential solutions, and develop the best plan of action to achieve their goals.
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
Cybercrime Tactics and Techniques Report
A significant uptick in threats aimed at businesses were reported in Q1 2019 from the same time last year. Companies need to take control against these increases in cyberthreats by remediating at scale, quickly mitigating attack impacts through isolation, and proactively hunting for threats before they execute.
- Significant increases in overall threats, Emotet, ransomware, and its impact on your enterprise
- How Mac, mobile malware, and especially adware are on the rise
- User concern about the safety of their personal information, and how organizations are failing to protect their data
- What it takes to create a resilient enterprise
Tony Kubinski is a Senior Sales Engineer for Malwarebytes, based in Chicago, Illinois. He has experience with multiple areas of information security including web, email, data loss prevention, and endpoint protection.
Prior to Malwarebytes, Tony has spent time at various hardware, software, and security companies including Forcepoint, Hewlett-Packard ESS, McAfee, Novell, VA Linux Systems, and Sun Microsystems.
Session Four11:00 am - 11:30 am
Innovative Endpoint Management
A Holistic Approach to Vulnerability Management, Patching, OS-Upgrades and Software Distribution
Axel Peters is Executive Sales Manager for baramundi software USA Inc., Headquartered in Framingham, MA. Axel has his degree in IT Management and over 6 years of experience in professional Endpoint Management. In this time he advised over 250 customers from small businesses to global enterprises in Europe, he is well aware of the challenges IT departments face today in order to keep their infrastructure up-to-date, safe and efficient.
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Session Five12:00 pm - 12:30 pm
Managing Risk in a Digital World
Digital transformation is not only changing how companies think about business. It is changing how we think about risk. We need to *act* on risk, not worry about it. We need to start and end with the basics. Join RSA as we review several key areas of digital risk management to target as you are challenged to be a key contributor in your company’s digital journey.
Ben Smith is Field Chief Technology Officer (Field CTO – US) with RSA. With 25 years experience in the information security, networking, and telecommunications industries, he regularly consults on RSA security and risk management solutions. His prior employers include UUNET, CSC, and the U.S. Government, along with several technology-oriented startups. He holds industry certifications in information security (CISSP), risk management (CRISC), and privacy (CIPT), and has presented on RSA’s behalf, both domestically and internationally, at cybersecurity events sponsored by Gartner, FS-ISAC, SANS, IANS, CERT/SEI, ISSA, (ISC)2, ISACA, RMA, BSides, ASIS, InfraGard, HTCIA, ICI, and other organizations. Ben on Twitter: @Ben_Smith
Keynote Session12:30 pm - 1:15 pm
In this presentation, Mark and Jody will be discussing the WFO CTF and their work collaborating cases and intelligence among their partner agencies.
ATSAIC Mark Marik’s Bio:
ATSAIC Marik has recently taken over as the USSS WFO ECTF. Prior to his time on protection, he was a forensic examiner of computers and mobile devices on the Seattle Field Office ECTF. During his five years on the Seattle ECTF he also was a case agent on multiple electronic crimes investigations.
SSA Jody Corbet’s Bio:
SSA Corbet served with the Virginia State Police for over six years prior to joining the FBI. He has worked violent crimes, drug cases, gang cases, white collar crime, and cyber matters during his 16 years. He has served in the Albany and Washington Field offices, as well as FBI HQ. He currently serves as the Supervisory Special Agent of the FBI’s Washington Field Office Cyber Task Force.
Break1:15 pm - 1:45 pm
Break / Vendor Booth Time
Session Seven1:45 pm - 2:15 pm
Your Last Line of Defense: A Guide to Disaster-proof Data Backup and Restore
While the importance of data backup is well established, the backup plans most companies use are decades old. The explosion of data in last 20 years has been matched by ever increasing storage capacity, a combination that creates one huge problem: how do you restore this ocean of data quickly when disaster strikes? In this session you’ll learn the techniques and technologies that will get your business back up and running quickly in an emergency while maintaining your long-term archives.
Morten Westerberg is the CEO and founder of Nordic Backup with branches in Denmark, Norway and the United States. Morten, who has dual Danish and US citizenship, began his professional career working with Managed IT Services and Business Continuity Planning in the late 90’s, which lead him to found Nordic Backup in Denmark in 2003, Norway in 2006, and the United States in 2009.
With over 20 years of experience in Business Continuity and data backup methods, Morten is an expert in cloud backup with a customer-centric focus on service and business recovery. His motto is, “Anyone can do a backup, but few know how to restore.”
Session Eight2:15 pm - 2:45 pm
Data as the Next Endpoint
Data is essentially inert and passive, lacking an inherent ability to either control its own fate or mitigate risks while under process, as well as at rest and in transit. Data loss and theft is a result of the problem.
The safety of the data is wholly dependent on human behavior and infrastructure. In reality, the enterprise protects data indirectly through a static perimeter. Endpoints are managed, and trust assumed. This approach is not data-centric and has reached obsolescence.
This workshop will survey the domain of the state actors and ensuing vulnerabilities to our infrastructure and corporations. It will highlight a paradigm that imbues data with self-governance, provenance and protection capabilities, to make it the new perimeter and a source to rethink deployments, workflows, and responsibilities.
Mr. Rickard graduated from Syracuse University with a degree in Physics. As a self-taught programmer he wrote computer programs to predict future stock movements and used that program to pay for his college tuition. His creativity and entrepreneurship got the attention of Wall Street and the DoD. He chose the DoD and quickly became a wargaming modeler, modeling Soviet military tactics. He eventually became an expert in US military weapon systems reliability by developing advanced analytic methods (i.e., big data). Soon after, he became an expert in applying machine learning and other advance analytic techniques to disrupt and defeat global terrorist threats. Not long after he assumed leadership roles where he led teams of subject matter experts in large scale defensive cybersecurity operations and systems. Today, he enjoys working with startup technology companies who have truly unique and differentiated capabilities. He serves on the advisory board of several companies and has most recently partnered with Sertainty Corp, the only company in the world to perpetually and permanently secure data by enabling it to defend itself.
Break2:45 pm - 3:00 pm
Break / Vendor Booth Time
CISO PANEL3:00 pm - 4:00 pm
Registration has closed for this conference
8:15 am - 5:00 pm2520 Wasser TerraceHerndon, VA 20171703-793-3366