Why Does Ransomware Continue to Evade Our Defenses?

  Presented by Nyotron

Ransomware has long been a menace for organizations and consumers. Global damage cost estimates reach about 10 billion USD per year. After all these years, why does ransomware continue to be so good at being so bad?

In this seminar, we will review the security industry’s history of largely ineffective responses to ransomware. We will discuss standard ransomware detection methods with their pros and cons. You will see how ransomware developers use simple techniques to bypass each of those methods. This live session will also highlight some of the latest attacks, including Norsk Hydro and ransomware pretending to donate your Bitcoins to a children’s charity.

After examining the bad, we will provide you with a no-nonsense defense strategy for hardening your defenses against ransomware.

Illuminating Behavioral Patterns to Assist Technology for Insider Threats

  Presented by Vanguard Infrastructures & HPE

Today, intellectual property theft is responsible for the greatest transfer of wealth among the countries of the world and frequently involves utilizing the company Insider. The security of the company is every employees’ responsibility. Technological innovations in Machine Learning can identify both the human and machine insider threat. In addition, employees must be educated as to what to look for when looking for the Insider Threat. Sensitizing your employees to scenario indicators, elicitation techniques involving behavioral manipulation, and the other principles can create a security force multiplication that will provide greater protection for your company. Vanguard Infrastructures is presenting information and strategies to incorporate the eyes and ears of your employees in the hunt for the insider.

The Proliferation of Video in Enterprise Design, and How It will Impact You

  Presented by Star Leaf & Netrix

The presentation will go over the complexities of a successful video/collaboration environment from a technical and physical perspective. We will discuss the technology, psychology of, and successful adoption of Video Conferencing in the workplace. One size does not fit all and equipment must be scaled appropriately. We will also go over the recommended beta/installation program and what that looks like.

Top 5 Resiliency Myths and What to Do About Them

  Presented by Luis Tapia • Resiliency Relationship Manager, Fannie Mae and Adjunct Professor, University of North Texas

It is said that plans are worthless, but planning is everything. If this is true, why is it common for an organization’s resiliency posture to plateau in the advancement towards maturity, despite our best planning efforts? What can we do about common resiliency misconceptions that are holding your organization back? This presentation looks at challenges that impede resiliency and what can be done to break through these deep-rooted barriers. It considers both business and technology perspectives and suggests a how to overcome several resiliency myths.

As a kid, Luis Tapia loved watching Godzilla movies. It wasn’t the monster that captivated him, but concern about the destruction left behind. For the past 12 years, Mr. Tapia has made meaning contributions in emergency management and business continuity within the private, public, and non-profit sectors. In addition, Mr. Tapia has been an adjunct instructor for two universities, using a blend of theory and practice to teach the next generation of emergency management and business continuity planners. Mr. Tapia has been involved in a wide range of technical, natural, and man-made disasters, helping individuals and organizations coordinate their efforts and overcome the disruptive nature of these events.

Mr. Tapia’s educational background includes an MPA from the University of North Texas and MS in Emergency Management from Oklahoma State University. Mr. Tapia lives in Denton, TX.

Let’s Sharpen Your Soft Skills!

  Moderated by INTERFACE Advisory Council

You spend your days dealing with outages, attacks, requests and anything else that can keep you behind a monitor all day. However, there is so much needed to advance your IT career. When it comes to “soft skills” of networking and communication, it can be a challenge for an IT professional to find time. How can you improve your standing in your company? What about looking for your next position? There are so many skills needed to excel when it comes to your career. Join us for an interactive discussion that will address these challenges and more. Our local Dallas IT professionals will share their experience on stepping out from behind the monitor and being noticed! Your questions are welcome in this panel discussion.

Panelists:

  • Tambra Draper-Horn • Sr. Applications Security Engineer, Sabre Corporation
  • Craig Broussard • Director, Global Infrastructure, NCH Corporation
  • Susan Smith • Manager, Information Technologt, The Salvation Army of North Texas
  • Sergio Puga • Project Manager, FedEx

AI: Demystifying the Dark Arts to Combat Threats  

  Presented by Vanguard Infrastructures & HPE

To combat the latest threats, cyber security vendors have no choice but to use one of the most powerful tools to emerge in decades – Artificial Intelligence. But critics are right in their concerns over the interpretability of AI solutions. How do we learn to trust the magic black boxes when even the experts can’t explain the answers produced by AI? What is AI, and how is it different than data science and machine learning? What does it mean when a cyber-security solution is AI-enabled? What are the important things to know about the different AI implementations as they relate to cyber security products? How do I trust the output / results of AI? Join us as we provide an AI primer through the lens of cyber security and dissipate the cloudiness caused by buzzwords.

Moderator:

  • Troy Cooper • Vanguard Infrastructures CEO Co-Founder

Panel Experts:

  • Vijay Richard • Vanguard Infrastructures Exec VP Co-Founder
  • Chris Kauffman • Vanguard Infrastructures Chief AI Strategist
  • Ann Hinkle • Vanguard Infrastructures Chief of Security Services
  • Dan Roessner • Vanguard Infrastructures Facility Security Officer

Time to Get Re-Married: Privacy and Cybersecurity Are Still in Love!

  Presented by Mary N. Chaney, Esq. • CISSP, Attorney, The Cyber Security Law Firm of Texas

Cybersecurity and privacy have been divorced for some time now. With organizations splitting responsibilities, cyber/information security responsibilities lie with the technical teams and privacy generally residing with the legal teams. Unfortunately, this split has been disastrous, mostly for the general public. In this session we will discuss how forward-thinking companies are re-marrying their cybersecurity and privacy programs to create a more holistic plan for data security and privacy. Hopefully, to live happily ever after.

The Current Malware Threat Landscape & Enterprise Grade Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Prepare for a Secure Automated Multi-cloud World with an Onsite Data Center

  Presented by Juniper Networks & Kudelski Security

In order to have the best success building a data center network that is ready for multi-cloud, it must have three critical components; Automation, Security, and Open Standards. Transformation to a multi-cloud environment is a complex task, as security is critical. This talk will discuss the key areas you need to be aware of when creating your strategies around data center buildouts, upgrades, and migrations in a multi-cloud world.