Cyber Security Summit - The Teneo Group
The Teneo Group

Cyber Security Summit

Save the Date:

Thursday, October 17, 2024

10AM ~ 5PM  –  Mt. Laurel, NJ    –    Lunch will be provided.    –    To add a topic to the agenda, please contact Cyber Sal.


Keynote Speaker Eddie DoyleCybersecurity Evangelist

Achieving desired outcomes in enterprise threat detection, investigation, and response in an increasingly challenging threat environment requires an aggressive commitment to AI-powered XDR, delivering innovative TDIR capabilities, such as hybrid IT estate integration & automation, enabling organizations to match the speed and scale of today’s threats, in keeping pace with the breadth and sophistication of adversaries.

In this session, Eddie Doyle will demonstrate how 150,000+ GWs & millions of endpoints correlate analytics, resulting in just a few critical daily tasks that security professionals can focus on.

Krista ValenzuelaNJ Cybersecurity and Communications Integration Cell (NJCCIC)

Ransomware is still prevalent and evolving in our current threat landscape. Join NJCCIC Cyber Threat Outreach, Krista Valenzuela as she reviews the latest cybersecurity trends, threats and tactics.

As well as providing information on SLCGP and other NJCCIC resources.

Kathy FernandezFunding Cybersecurity Solutions with State and Federal Grant Funds

Katherine Fernandez is a Strategic Program Manager at Check Point Software, where she expertly manages the E-Rate contract and grants, ensuring schools and libraries across the U.S. have access to cutting-edge cybersecurity solutions. With a strong background in strategic planning and program management, Katherine is known for her leadership in driving complex projects, optimizing cybersecurity resources, and securing critical funding. Her work not only supports organizational growth but also enhances digital safety in the education sector.

Tales from the War Room - Incident Response Analysts Dissecting a Case Study of an AttackTim Otis - Lead, Incident Response Operations

This session is a case study of compromise where attackers used vulnerabilities on an internet facing device to gain initial access, escalate privilege, conduct reconnaissance and then move into the internal network proper.  It also offers a unique opportunity to observe attackers troubleshoot and develop workarounds to bypass existing security solutions.

The session will include:

  • Vulnerabilities present and how they were exploited.
  • Tools used by the attacker.
  • Workaround used by the attackers to bypass security controls.

Tim Otis has spent the last 28 years at the forefront of the cyber security industry. He has held numerous roles from help-desk, system administrator, field engineer, software development, and incident response roles that have provided a wealth of knowledge, expertise, and a seat at the table in cleaning up some of largest cyber security attacks in the world. As Head of IR/MDR at Check Point, Tim leads a global team of IR Analysts, SOC Analysts, Coordination Experts, Customer Success/Support and Software Developers to deliver Incident Response and MDR services to customers all over the world.

Roundtable DiscussionOpen Dialog

This roundtable aims to share insights, strategies, and best practices to combat cyber threats. Topics often cover emerging threats, regulatory compliance, incident response, and the latest technological advancements. Bring your questions for the group!

By bringing diverse perspectives together, we will help to build a more resilient and secure digital environment, promoting proactive measures and innovative approaches to safeguarding information.

Zach SchmidtQuiet Infiltrations: Pen Testing & What Your Security Isn’t Saying

Zach Schmidt, RedTrace Technologies VP of Sales, will host a session that will explore the critical role of penetration testing in enhancing cybersecurity for K-12 schools, where safeguarding student data and maintaining secure learning environments are paramount. 

With rising cyber threats targeting educational institutions, penetration testing provides an essential layer of protection by identifying vulnerabilities before they can be exploited. 

The session will highlight how proactive security measures, like pen testing, help schools prevent data breaches, protect sensitive information, and ensure a safer digital experience for students, educators, and administrators alike.

https://www.linkedin.com/in/zmschmidt/

Jason GarayCybersecurity and Infrastructure Security Agency (CISA)

Jason Garay is a Cybersecurity Advisor for the Department of Homeland Security within Cybersecurity and Infrastructure Security Agency (CISA) Region 2 and leads the effort to protect and enhance the resilience of the nation’s physical and cyber infrastructure. Region 2 covers New York, New Jersey, Puerto Rico, and the U.S. Virgin Islands. Prior to this position, he was an Intelligence Research Specialist with Homeland Security Investigations (HSI) SAC Newark, assigned to the El Dorado Task Force within the Cyber Crimes Group.

Before joining CISA in January 2024, Mr. Garay joined HSI in May 2020, and worked on complex investigations focusing primarily on the dark web, network intrusions, and complex cryptocurrency cases. Mr. Garay holds a BS in Criminal Justice from Felician University, and an MS in National Security with a specialization in Cyber Security from New Jersey City University. He also holds various professional cyber security certifications from SANS such as GSEC, GCIH, GCED, and GCTI.

He’s been in the intelligence field for 10 years and previously worked at the NYS Division of Homeland Security & Emergency Services (DHSES) within the Office of Counter Terrorism as a Cyber Security Analyst based out of New York City.