CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Data Connectors is proud to host the Washington DC Cybersecurity Conference.
Session One9:00 am - 9:30 am
More than 30,000 customers worldwide—including nearly half the global Fortune 500—rely on RSA’s business-driven security™ strategy for cyber threat detection and response, identity and access management, online fraud prevention, and governance, risk and compliance solutions. Armed with the industry’s most powerful tools, enterprises can better focus on growth, innovation and transformation in today’s volatile business environment.
RSA is a part of the Dell Technologies family of brands. Dell Technologies is a unique family of businesses that provides the essential infrastructure for organizations to build their digital future, transform IT and protect their most important asset: information. The company services customers of all sizes across 180 countries – ranging from 98 percent of the Fortune 500 to individual consumers – with the industry’s most comprehensive and innovative portfolio from the edge to the core to the cloud.
Session Two9:30 am - 10:00 am
PacketViper is deception technology which solves important cybersecurity problems for our clients and produces practical, real-world results, including dynamic network defense, relief of security related operational costs and burdens, and 3rd party risk monitoring with policy enforcement. PacketViper produces relevant intelligence that is automatically applied and supports real-time policy enforcement. Our customers are in both the public and private sectors and cover multiple industries.
Break10:00 am - 10:30 am
Coffee Break / Vendor Exhibit Time
Session Three10:30 am - 11:00 am
Session Details Coming Soon
Session Four11:00 am - 11:30 am
How Hackers Bypass Email Security: An Attack Guide for the Uninitiated
The scale of email migration to the cloud requires a strategic shift in security for collaboration suites. The Office 365 inbox and user credentials are the #1 target for hackers. 90% of breaches start with email and the security incident orchestration, automation and response workload drains resources from the SOC team. Sharing insights from research, Michael will demonstrate the techniques attackers use to bypass Microsoft’s defenses, fool filters, and launch attacks.
He will talk about how CISOs have started to adopt a continuous adaptive risk and trust assessment mindset to protect inboxes from the evolving threats including phishing, account takeover and business email compromise.
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Keynote Session12:00 pm - 12:45 pm
Keynote Details Coming Soon
Networking / Happy Hour4:00 pm - 5:00 pm
Registration for this event is opening soon.