Download NEW YORK TECH-SECURITY CONFERENCE

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Cyberwarfare wikipedia , lookup

Security-focused operating system wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Operation Payback wikipedia , lookup

Mobile security wikipedia , lookup

Outlook.com wikipedia , lookup

Computer security wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
Tech-Security Conference, Atlanta, GA
Table of Contents
Wi-Fi Instructions / Facebook / Twitter Info .................. .1
Agenda………………………………………………………2
About Data Connectors ................................................. .6
CPE Credits .................................................................. .6
Testimonials .................................................................. .7
Upcoming Conferences ................................................. .8
Contact Information ....................................................... .9
Tech-Security Conference, Atlanta, GA
WI-FI INSTRUCTIONS
 Verify that your system’s network adapter is setup for DHCP so that it
may access our EVENTS network. If your network adapter is setup
for a Static IP address, please change your adapter to DHCP
 Your Username is data and the Password is data2017. Both ID and
password is in lower caps.
Like us at www.facebook.com/DataConnectors and follow us on Twitter
@DataConnectors for a chance to win our monthly $50 prize!
Congratulations to our winners:
December – Michelle Todd
November – John Ryon
October – Jane O’Neil
September – Brian Handrigan
August – Kathleen Dickman
July – Jeff Janak
Stay Connected
1
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, Atlanta, GA
Agenda
8:15-8:45
Check-In and Opening Introductions
Data Connectors is proud to host the Tech-Security Strategies Conference.
,
8:45-9:15
Session One – Sentinel IPS, Ted Gruenloh, Director of Operations
Network Security is a Team Sport
Now more than ever, protecting your network takes teamwork. So, who are the players? There
are more than you think: It’s not just you and your staff. Your users and vendors are obviously on
the team, but it goes a lot deeper than that, too. Through a handful of quick case studies, we’ll
pull back the curtain on shared threat intelligence, open source software, outsourcing, and even
social media to see how an emphasis on working together can help combat common issues like
ransomware and malware.
For a copy of this presentation, please contact Ted Gruenloh @ [email protected].
9:15-9:45
Session Two – Reduxio, Wade O’Harrow, Regional Manager
Beyond Time & Space
Presentation copy provided.
9:45-10:15
Break / Vendor Booth Time
10:15-11:00
Session Three – Observable Networks, Patrick Crowley, CTO & Founder
A New Way to Look at IT Security with Endpoint Modeling
Endpoint compromise has been a consistent theme in nearly every modern security breach. This
discussion makes the case for a new approach to IT security yielding compelling results and
visibility into all network Endpoint behavior. With great accuracy, extremely low noise, and
supporting evidence, endpoint modeling discovers and tracks the regular behavior of each
device in a way that makes possible the automatic recognition of potentially harmful activities.
Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for
enterprises today, and how this solution is being used successfully in organizations large and
small, in traditional networks and cloud environments including AWS VPCs, Azure and others.
For a copy of this presentation, please contact Ron Sterbenz @ [email protected].
11:00-11:30
Session Four – Cyphort, Juan Perez, Sr. Systems Engineer
Identifying Security Gaps
Exploring techniques for identifying architecture security gaps. A high-level review of current
security technologies and understanding their strengths and limitations. Why behavior analytics,
coupled with machine learning science offers the best approach in filling the security gap.
For a copy of this presentation, please contact Juan Perez @ [email protected].
2
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, Atlanta, GA
11:30-12:00
Break / Vendor Booth Time / Lunch
12:00-12:30
Session Five – Egress Software Technologies, Tony Pepper, CEO
Securing your organization and containing the insider threat
Despite increasing investment in the cybersecurity market, we continue to see a rise in data
breaches and their related costs, specifically those relating to the insider threat (accidental loss
and malicious insider). Despite these types of incidents contributing approximately 50% of all
breaches, CIO focus remains on the external threat.
In this presentation, we will question whether a new approach to data security needs to be
applied: one that recognizes data security can’t be tackled in silo and instead a holistic more
strategic approach must be taken to protect and secure data throughout its lifecycle in order to
contain the insider threat.
For a copy of this presentation, please contact Daniel Hoy @ [email protected].
12:30-12:45
Break / Vendor Booth Time
12:45-1:15
Session Six – Arbor Networks, Jeff Tidwell, Account Manager
The Impact of DDoS Attacks
Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by
overwhelming it with traffic from multiple sources. They target a wide variety of important
resources, from consumer-facing financial and news websites, to internally-oriented employee
intranet links, and present a major challenge in today's cloud-based world to making sure people
can access important information and mission-critical applications. Arbor will discuss the
misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and
how they can help customers mitigate their risk.
Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise
and service provider networks from these DDoS attacks and advanced threats. Its advanced threat
solution delivers complete network visibility through a combination of packet capture and NetFlow
technology, enabling the rapid detection and mitigation of attack campaigns, malware and
malicious insiders.
Presentation copy provided.
1:15-1:45
Session Seven – ControlScan, Alex Knight, Director of Security Product Strategy
Mind the Gaps: Leveraging “Security as a Service” to Gain Cyber Advantage
Presentation copy provided.
1:45-2:00
Break / Vendor Booth Time
3
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, Atlanta, GA
2:00-2:30
Session Eight – Terbium Labs, Emily Wilson, Director of Analysis
The Truth About the Dark Web: Separating Fact from Fiction
For most, the term dark web immediately conjures thoughts of illegal drug sales, pornography,
weapons of mass destruction, fraud and other criminal acts. Attend this presentation, “The Truth
About the Dark Web: Separating Fact from Fiction” to learn more about common industry myths
and what content actually exists on the dark web. Research findings from a Terbium Labs recent
report analyzes what’s really taking place on the far corners of the Internet, including:
•Anonymity does not mean criminality.
•Pornography is prominent, but not all of it is illegal.
•Drugs are a popular topic.
•The Fraud Foible.
•Extremism is rare.
Presentation copy provided.
2:30-2:45
Break / Vendor Booth Time
2:45-3:30
Session Nine – Lockstep Technology Group, James Harden, Managing Partner
Mitigating the Risk of Corporate Hacking
Join Lockstep as we explore the unique challenges surrounding data confidentiality and integrity
protection within corporate environments. Practical approaches to mitigating the risk of data
breach will be reviewed by exploring the following topics:
 Threat Actors and Motives - Who wants your data and why
 Hacking Demo - From Endpoint compromise to "Keys to the Kingdom" - See how they do
it
 Breach Tactics and Methodologies
 The risk to the integrity of your data: Personally Identifiable Information (PII); Patient and
Customer Data (HIPAA, PCI); HR and Finance (FINRA); Trade Secrets
 Practical methods to mitigating the risk of breach
Presentation copy provided.
Prize Drawings for All in Attendance
3:30-4:00
Session Ten – Zscaler, Kevin Peterson, Director, Security & Network Transformation
Your Office 365 Network: Before, During, and After the Rollout
Of the 6,000 customers that route all of their Internet traffic through Zscaler, over 700 are using
Office 365, amounting to over 1.2 petabytes (!) of Office 365 traffic alone — and growing daily.
With this much experience, we would like to share what it takes to make the network, the
business, and careers truly shine as cloud platforms such as this become the new normal. In the
process, we will cover the objectives, metrics, and value that leading organizations require. We’ll
even show you how to succeed without the need for a costly proof-of-concept (PoC)!
For a copy of this presentation, please contact Janel Urena @ [email protected].
4
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, Atlanta, GA
Prize Drawings for All in Attendance
4:00-4:30
Session Eleven – Sophos, Ken Swain, Channel Sales Engineer, Sales
Keep Ransomware Out. How you can stop ransomware and exploits before they strike.
From ransomware to rootkits, old school security cannot keep pace with today’s advanced
attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.

Prevent: stop ransomware before it strikes by addressing the attack methods of attacks
used by advanced persistent threats

Detect: quickly and easily detect and isolate attacks

Respond: laser in on critical alerts and address them with simple to understand security
intelligence
Presentation copy provided.
Prize Drawings for All in Attendance
5
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, Atlanta, GA
Welcome to Data Connectors
Data Connectors’ technology security conferences are focused on providing you with the latest
best practices, products and services available to the community right now in an educational
environment. Whether you are concerned with information security, cyber security, network
security or particular topics such cloud computing, the evolving IT landscape as well as how to
combat cyber criminals, you will leave the event better informed and ready to tackle the issues
at hand inside your organization.
Each event is packed with regionally-based vendors and speakers that are on the frontline.
They have the tactics and can help your team to develop a strategy that works for your needs.
Join us at one of our events throughout the United States or Canada to learn and network with
industry professionals today.
CPE CREDITS
$50 processing fee.
Please see the Registration Desk for further details.
6
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, Atlanta, GA
Testimonials
"Great job! It is one of the most informative one day conferences I've ever attended!"
"Enjoyed meeting and talking to you at your Tech-Security Conference in Raleigh NC. A lot of our ISSA Chapter
members attended and all had very positive experiences. Also, we learned more for improving our own chapter
sponsored InfoSeConference and hope we can call on you in the future."
“I didn't get a chance to complete the evaluation form, but the workshop today was EXCELLENT! I just wanted to
express my appreciation for the information made available to us at the workshop today. I thought that all of the
presenters were clear, concise and provided highly useful and easily understandable information, even to those of us
who are not exactly experts in the field of e-security. The handouts were really helpful too. One of my colleagues who
couldn't attend after we described what we gained from the workshop asked if there would be another. We hope to be
invited."
"The conference was very informative. It brought me up to date on the latest trend on security issues and possible
solutions. Please accept my complements to you and your staff on putting this conference together. Please keep me
informed of future events."
"The conference was refreshing and informative. The location was perfect. My compliments go to the conference
organizers!"
"Thank-you for a terrific conference. I learned much more than I expected and every presentation was appropriate,
concise and very well done. The networking opportunity was a real bonus. I kept thinking that I wish I had this level of
understanding prior to commencing an "extreme makeover" of our technology infrastructure. Public schools' dollars are
sparse and must be stretched at every opportunity. Smart, relevant and robust acquisitions are the best ways to do
this."
“I wanted to thank you for putting on a great show in January. I think the show was set up real nice, and I think we’ll get
some business from it. The quality of the attendees was good, so all in all, I think we’ll be interested in participating
again in future shows. Keep us on the list for upcoming events. “
“I wanted to send along a quick thank you to the Data Connectors team for a very nice event here in Milwaukee. I
heard positive remarks from a variety of folks including attendance levels, how well organized it was, and how the
timing stayed on track.''
“Your meeting was so informative and you planned it so well. I love to learn and you had such great people lecturing. I
was so happy to be able to attend.”
“We look forward to continuing to support Data Connectors so keep up the good work, driving qualified attendance and
producing first-class local seminars.”
“Just a note to say that you sent my sales reps home exhausted! They were so busy at the Ft Lauderdale Data
Connectors meeting & talking to potential customers and taking notes for later follow-up that they just about dropped
of fatigue by the time the exhibits closed! And this week, still no respite -- they have to call and meet with all those
people.”
7
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, Atlanta, GA
2017
UPCOMING CONFERENCES
January 26, Charlotte, NC
June 29, Boise, ID
November 30, Seattle, WA
February 2, Los Angeles, CA
July 6, Milwaukee, WI
December 6, St. Louis, MO
February 9, Houston, TX
July 12, Orlando, FL
December 7, Orange County, CA
February 16, Des Moines, IA
July 13, Pittsburgh, PA
December 13, Chicago Suburbs, IL
February 23, Salt Lake City, UT
July 20, Cincinnati, OH
December 14, Ft. Lauderdale, FL
March 2, Jacksonville, FL
July 27, Dallas, TX
March 9, New Jersey, NJ
August 3, Indianapolis, IN
March 16, Columbus, OH
August 10, Washington, D.C.
March 23, San Jose, CA
August 17, Denver, CO
March 30, Detroit, MI
August 24, Atlanta, GA
April 6, Raleigh, NC
August 31, Sacramento, CA
April 12, San Diego, CA
September 7, Oklahoma City, OK
April 13, Chicago, IL
September 14, Montreal, QC
April 20, Tampa, FL
September 21, Kansas City, KS
April 27, San Antonio, TX
September 28, London, ENG
May 4, Baltimore, MD
October 5, Austin, TX
May 11, Toronto, ON
October 12, Boston, MA
May 18, Omaha, NE
October 19, New York City, NY
May 25, Hartford, CT
October 26, Nashville, TN
June 1, Anaheim, CA
November 1, Calgary, AB
June 8, Minneapolis, MN
November 2, Birmingham, AL
June 15, Vancouver, BC
November 9, San Francisco, CA
June 22, Philadelphia, PA
November 16, Phoenix, AZ
8
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, Atlanta, GA
Contacts
Olivea Mollak
[email protected]
(850) 932-5338
Lisa Dewey
[email protected]
(972) 533-8845
Bonnie Seaman
[email protected]
972505795586
Kim Carlos
[email protected]
(678) 279-2660
Rita Chen
[email protected]
(669) 444-1786
Ash Mathew
[email protected]
(586) 453-7506
Daniel Hoy
[email protected]
44 (0) 207-624-8500
Karl Frazier
[email protected]
(801) 550-0225
Lexy Marchbank
[email protected]
(408) 656-7834
Andy Orso
[email protected]
(314) 606-7438
Andy Orso
[email protected]
(314) 606-7438
9
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, Atlanta, GA
Jacqueline Witter
[email protected]
(206) 390-9421
Jennifer Poole
[email protected]
(800) 949-4696
Jason Satcher
[email protected]
(770) 505-9550
Holly Noble
[email protected]
(651) 695-7669
Ron Williams
[email protected]
(716) 558-7280
Ron Sterbenz
[email protected]
(612) 920-0580
Nicole Bennett
[email protected]
(407) 215-3033
Wade O'Harrow
[email protected]
404-263-3889
Alex Hwang
[email protected]
(408) 613-2561
Brianna Strain
[email protected]
(404) 709-0190
Natalie Contorno
[email protected]
(972) 991-5005
10
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, Atlanta, GA
Philip Alexander
[email protected]
(650) 996-3898
Joanne Oliver
[email protected]
(603) 831-4362
Nicole Glynn
[email protected]
(781) 486-7300
Keena Thomas
[email protected]
(410) 994-5962
Simona Hiutin
[email protected]
(416) 300-1966
Sasha Nunke
[email protected]
650-209-4180
Chuong Pham
[email protected]
(408) 768-1786
Janel Urena
[email protected]
(678) 478-3327
11
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, Atlanta, GA
Notes
12
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, Atlanta, GA
Notes
13
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com