* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download NEW YORK TECH-SECURITY CONFERENCE
Cyberwarfare wikipedia , lookup
Security-focused operating system wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Cyber-security regulation wikipedia , lookup
Operation Payback wikipedia , lookup
Mobile security wikipedia , lookup
Outlook.com wikipedia , lookup
Tech-Security Conference, Atlanta, GA Table of Contents Wi-Fi Instructions / Facebook / Twitter Info .................. .1 Agenda………………………………………………………2 About Data Connectors ................................................. .6 CPE Credits .................................................................. .6 Testimonials .................................................................. .7 Upcoming Conferences ................................................. .8 Contact Information ....................................................... .9 Tech-Security Conference, Atlanta, GA WI-FI INSTRUCTIONS Verify that your system’s network adapter is setup for DHCP so that it may access our EVENTS network. If your network adapter is setup for a Static IP address, please change your adapter to DHCP Your Username is data and the Password is data2017. Both ID and password is in lower caps. Like us at www.facebook.com/DataConnectors and follow us on Twitter @DataConnectors for a chance to win our monthly $50 prize! Congratulations to our winners: December – Michelle Todd November – John Ryon October – Jane O’Neil September – Brian Handrigan August – Kathleen Dickman July – Jeff Janak Stay Connected 1 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, Atlanta, GA Agenda 8:15-8:45 Check-In and Opening Introductions Data Connectors is proud to host the Tech-Security Strategies Conference. , 8:45-9:15 Session One – Sentinel IPS, Ted Gruenloh, Director of Operations Network Security is a Team Sport Now more than ever, protecting your network takes teamwork. So, who are the players? There are more than you think: It’s not just you and your staff. Your users and vendors are obviously on the team, but it goes a lot deeper than that, too. Through a handful of quick case studies, we’ll pull back the curtain on shared threat intelligence, open source software, outsourcing, and even social media to see how an emphasis on working together can help combat common issues like ransomware and malware. For a copy of this presentation, please contact Ted Gruenloh @ [email protected]. 9:15-9:45 Session Two – Reduxio, Wade O’Harrow, Regional Manager Beyond Time & Space Presentation copy provided. 9:45-10:15 Break / Vendor Booth Time 10:15-11:00 Session Three – Observable Networks, Patrick Crowley, CTO & Founder A New Way to Look at IT Security with Endpoint Modeling Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling results and visibility into all network Endpoint behavior. With great accuracy, extremely low noise, and supporting evidence, endpoint modeling discovers and tracks the regular behavior of each device in a way that makes possible the automatic recognition of potentially harmful activities. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others. For a copy of this presentation, please contact Ron Sterbenz @ [email protected]. 11:00-11:30 Session Four – Cyphort, Juan Perez, Sr. Systems Engineer Identifying Security Gaps Exploring techniques for identifying architecture security gaps. A high-level review of current security technologies and understanding their strengths and limitations. Why behavior analytics, coupled with machine learning science offers the best approach in filling the security gap. For a copy of this presentation, please contact Juan Perez @ [email protected]. 2 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, Atlanta, GA 11:30-12:00 Break / Vendor Booth Time / Lunch 12:00-12:30 Session Five – Egress Software Technologies, Tony Pepper, CEO Securing your organization and containing the insider threat Despite increasing investment in the cybersecurity market, we continue to see a rise in data breaches and their related costs, specifically those relating to the insider threat (accidental loss and malicious insider). Despite these types of incidents contributing approximately 50% of all breaches, CIO focus remains on the external threat. In this presentation, we will question whether a new approach to data security needs to be applied: one that recognizes data security can’t be tackled in silo and instead a holistic more strategic approach must be taken to protect and secure data throughout its lifecycle in order to contain the insider threat. For a copy of this presentation, please contact Daniel Hoy @ [email protected]. 12:30-12:45 Break / Vendor Booth Time 12:45-1:15 Session Six – Arbor Networks, Jeff Tidwell, Account Manager The Impact of DDoS Attacks Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today's cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk. Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders. Presentation copy provided. 1:15-1:45 Session Seven – ControlScan, Alex Knight, Director of Security Product Strategy Mind the Gaps: Leveraging “Security as a Service” to Gain Cyber Advantage Presentation copy provided. 1:45-2:00 Break / Vendor Booth Time 3 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, Atlanta, GA 2:00-2:30 Session Eight – Terbium Labs, Emily Wilson, Director of Analysis The Truth About the Dark Web: Separating Fact from Fiction For most, the term dark web immediately conjures thoughts of illegal drug sales, pornography, weapons of mass destruction, fraud and other criminal acts. Attend this presentation, “The Truth About the Dark Web: Separating Fact from Fiction” to learn more about common industry myths and what content actually exists on the dark web. Research findings from a Terbium Labs recent report analyzes what’s really taking place on the far corners of the Internet, including: •Anonymity does not mean criminality. •Pornography is prominent, but not all of it is illegal. •Drugs are a popular topic. •The Fraud Foible. •Extremism is rare. Presentation copy provided. 2:30-2:45 Break / Vendor Booth Time 2:45-3:30 Session Nine – Lockstep Technology Group, James Harden, Managing Partner Mitigating the Risk of Corporate Hacking Join Lockstep as we explore the unique challenges surrounding data confidentiality and integrity protection within corporate environments. Practical approaches to mitigating the risk of data breach will be reviewed by exploring the following topics: Threat Actors and Motives - Who wants your data and why Hacking Demo - From Endpoint compromise to "Keys to the Kingdom" - See how they do it Breach Tactics and Methodologies The risk to the integrity of your data: Personally Identifiable Information (PII); Patient and Customer Data (HIPAA, PCI); HR and Finance (FINRA); Trade Secrets Practical methods to mitigating the risk of breach Presentation copy provided. Prize Drawings for All in Attendance 3:30-4:00 Session Ten – Zscaler, Kevin Peterson, Director, Security & Network Transformation Your Office 365 Network: Before, During, and After the Rollout Of the 6,000 customers that route all of their Internet traffic through Zscaler, over 700 are using Office 365, amounting to over 1.2 petabytes (!) of Office 365 traffic alone — and growing daily. With this much experience, we would like to share what it takes to make the network, the business, and careers truly shine as cloud platforms such as this become the new normal. In the process, we will cover the objectives, metrics, and value that leading organizations require. We’ll even show you how to succeed without the need for a costly proof-of-concept (PoC)! For a copy of this presentation, please contact Janel Urena @ [email protected]. 4 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, Atlanta, GA Prize Drawings for All in Attendance 4:00-4:30 Session Eleven – Sophos, Ken Swain, Channel Sales Engineer, Sales Keep Ransomware Out. How you can stop ransomware and exploits before they strike. From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them. Learn how you can get innovative endpoint protection without impacting performance. Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats Detect: quickly and easily detect and isolate attacks Respond: laser in on critical alerts and address them with simple to understand security intelligence Presentation copy provided. Prize Drawings for All in Attendance 5 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, Atlanta, GA Welcome to Data Connectors Data Connectors’ technology security conferences are focused on providing you with the latest best practices, products and services available to the community right now in an educational environment. Whether you are concerned with information security, cyber security, network security or particular topics such cloud computing, the evolving IT landscape as well as how to combat cyber criminals, you will leave the event better informed and ready to tackle the issues at hand inside your organization. Each event is packed with regionally-based vendors and speakers that are on the frontline. They have the tactics and can help your team to develop a strategy that works for your needs. Join us at one of our events throughout the United States or Canada to learn and network with industry professionals today. CPE CREDITS $50 processing fee. Please see the Registration Desk for further details. 6 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, Atlanta, GA Testimonials "Great job! It is one of the most informative one day conferences I've ever attended!" "Enjoyed meeting and talking to you at your Tech-Security Conference in Raleigh NC. A lot of our ISSA Chapter members attended and all had very positive experiences. Also, we learned more for improving our own chapter sponsored InfoSeConference and hope we can call on you in the future." “I didn't get a chance to complete the evaluation form, but the workshop today was EXCELLENT! I just wanted to express my appreciation for the information made available to us at the workshop today. I thought that all of the presenters were clear, concise and provided highly useful and easily understandable information, even to those of us who are not exactly experts in the field of e-security. The handouts were really helpful too. One of my colleagues who couldn't attend after we described what we gained from the workshop asked if there would be another. We hope to be invited." "The conference was very informative. It brought me up to date on the latest trend on security issues and possible solutions. Please accept my complements to you and your staff on putting this conference together. Please keep me informed of future events." "The conference was refreshing and informative. The location was perfect. My compliments go to the conference organizers!" "Thank-you for a terrific conference. I learned much more than I expected and every presentation was appropriate, concise and very well done. The networking opportunity was a real bonus. I kept thinking that I wish I had this level of understanding prior to commencing an "extreme makeover" of our technology infrastructure. Public schools' dollars are sparse and must be stretched at every opportunity. Smart, relevant and robust acquisitions are the best ways to do this." “I wanted to thank you for putting on a great show in January. I think the show was set up real nice, and I think we’ll get some business from it. The quality of the attendees was good, so all in all, I think we’ll be interested in participating again in future shows. Keep us on the list for upcoming events. “ “I wanted to send along a quick thank you to the Data Connectors team for a very nice event here in Milwaukee. I heard positive remarks from a variety of folks including attendance levels, how well organized it was, and how the timing stayed on track.'' “Your meeting was so informative and you planned it so well. I love to learn and you had such great people lecturing. I was so happy to be able to attend.” “We look forward to continuing to support Data Connectors so keep up the good work, driving qualified attendance and producing first-class local seminars.” “Just a note to say that you sent my sales reps home exhausted! They were so busy at the Ft Lauderdale Data Connectors meeting & talking to potential customers and taking notes for later follow-up that they just about dropped of fatigue by the time the exhibits closed! And this week, still no respite -- they have to call and meet with all those people.” 7 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, Atlanta, GA 2017 UPCOMING CONFERENCES January 26, Charlotte, NC June 29, Boise, ID November 30, Seattle, WA February 2, Los Angeles, CA July 6, Milwaukee, WI December 6, St. Louis, MO February 9, Houston, TX July 12, Orlando, FL December 7, Orange County, CA February 16, Des Moines, IA July 13, Pittsburgh, PA December 13, Chicago Suburbs, IL February 23, Salt Lake City, UT July 20, Cincinnati, OH December 14, Ft. Lauderdale, FL March 2, Jacksonville, FL July 27, Dallas, TX March 9, New Jersey, NJ August 3, Indianapolis, IN March 16, Columbus, OH August 10, Washington, D.C. March 23, San Jose, CA August 17, Denver, CO March 30, Detroit, MI August 24, Atlanta, GA April 6, Raleigh, NC August 31, Sacramento, CA April 12, San Diego, CA September 7, Oklahoma City, OK April 13, Chicago, IL September 14, Montreal, QC April 20, Tampa, FL September 21, Kansas City, KS April 27, San Antonio, TX September 28, London, ENG May 4, Baltimore, MD October 5, Austin, TX May 11, Toronto, ON October 12, Boston, MA May 18, Omaha, NE October 19, New York City, NY May 25, Hartford, CT October 26, Nashville, TN June 1, Anaheim, CA November 1, Calgary, AB June 8, Minneapolis, MN November 2, Birmingham, AL June 15, Vancouver, BC November 9, San Francisco, CA June 22, Philadelphia, PA November 16, Phoenix, AZ 8 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, Atlanta, GA Contacts Olivea Mollak [email protected] (850) 932-5338 Lisa Dewey [email protected] (972) 533-8845 Bonnie Seaman [email protected] 972505795586 Kim Carlos [email protected] (678) 279-2660 Rita Chen [email protected] (669) 444-1786 Ash Mathew [email protected] (586) 453-7506 Daniel Hoy [email protected] 44 (0) 207-624-8500 Karl Frazier [email protected] (801) 550-0225 Lexy Marchbank [email protected] (408) 656-7834 Andy Orso [email protected] (314) 606-7438 Andy Orso [email protected] (314) 606-7438 9 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, Atlanta, GA Jacqueline Witter [email protected] (206) 390-9421 Jennifer Poole [email protected] (800) 949-4696 Jason Satcher [email protected] (770) 505-9550 Holly Noble [email protected] (651) 695-7669 Ron Williams [email protected] (716) 558-7280 Ron Sterbenz [email protected] (612) 920-0580 Nicole Bennett [email protected] (407) 215-3033 Wade O'Harrow [email protected] 404-263-3889 Alex Hwang [email protected] (408) 613-2561 Brianna Strain [email protected] (404) 709-0190 Natalie Contorno [email protected] (972) 991-5005 10 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, Atlanta, GA Philip Alexander [email protected] (650) 996-3898 Joanne Oliver [email protected] (603) 831-4362 Nicole Glynn [email protected] (781) 486-7300 Keena Thomas [email protected] (410) 994-5962 Simona Hiutin [email protected] (416) 300-1966 Sasha Nunke [email protected] 650-209-4180 Chuong Pham [email protected] (408) 768-1786 Janel Urena [email protected] (678) 478-3327 11 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, Atlanta, GA Notes 12 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, Atlanta, GA Notes 13 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com