dc-cybersecurityevents.com Open in urlscan Pro
2606:4700:20::ac43:49e5  Public Scan

Submitted URL: http://x8htn.mjt.lu/lnk/AaoAAEH9T4AAAAAAAAAAAAJ9Sc0AAAAAsdQAAAAAABfAXQBhU0h1sWLfkIQWQXeRRNx-dLci9QAXQ60/6/STkpa4Wmmh...
Effective URL: https://dc-cybersecurityevents.com/2021-texas/featured-keynote/?aff=MJE2&utm_source=MJE2&utm_medium=Email&utm_campaign=TEX2
Submission: On September 29 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST /fsg?pageId=6a9a50ef-f65e-4c9e-968b-97e2a89d634f&variant=a

<form action="/fsg?pageId=6a9a50ef-f65e-4c9e-968b-97e2a89d634f&amp;variant=a" method="POST"><input type="hidden" name="pageId" value="6a9a50ef-f65e-4c9e-968b-97e2a89d634f"><input type="hidden" name="pageVariant" value="a">
  <div class="fields">
    <div class="lp-pom-form-field single-line-text" id="container_first_name"><input id="first_name" name="first_name" type="text" class="ub-input-item single text form_elem_first_name" placeholder="First Name" required=""></div>
    <div class="lp-pom-form-field single-line-text" id="container_last_name"><input id="last_name" name="last_name" type="text" class="ub-input-item single text form_elem_last_name" placeholder="Last Name" required=""></div>
    <div class="lp-pom-form-field single-line-text" id="container_company"><input id="company" name="company" type="text" class="ub-input-item single text form_elem_company" placeholder="Company" required=""></div>
    <div class="lp-pom-form-field single-line-text" id="container_title"><input id="title" name="title" type="text" class="ub-input-item single text form_elem_title" placeholder="Title" required=""></div>
    <div class="lp-pom-form-field email" id="container_email"><input id="email" name="email" type="email" class="ub-input-item single text form_elem_email" placeholder="Business Email" required=""
        pattern="^[a-zA-Z0-9._%+-]+@[a-zA-Z0-9_-]+\.[a-zA-Z0-9-.]{2,61}$"></div>
    <div class="lp-pom-form-field single-line-text" id="container_phone_number"><input id="phone_number" name="phone_number" type="tel" class="ub-input-item single text form_elem_phone_number" placeholder="Work Phone" required=""
        pattern="^(\+?1[ -]?)?\(?[2-9]\d\d\)?[ -]?[2-9]\d\d[ -]?\d{4}$"></div>
    <div class="lp-pom-form-field single-line-text" id="container_zip"><input id="zip" name="zip" type="text" class="ub-input-item single text form_elem_zip" placeholder="Zip" required=""></div><input id="aff" name="aff" type="hidden" class="hidden"
      value="MJE2"><input id="registration_status" name="registration_status" type="hidden" class="hidden" value="New"><input id="Unbounce" name="Unbounce" type="hidden" class="hidden" value="unbounce  Texas lp"><input id="Event_ID" name="Event_ID"
      type="hidden" class="hidden" value="91">
    <div class="lp-pom-form-field checkbox-group multi-group" id="container_terms">
      <div class="ub-input-item input-wrap optionsList" id="group_terms">
        <div class="option" id="ub-option-terms-item-0"><input type="checkbox" id="terms_" name="terms" value="" class="checkbox form-builder-checkbox-input form_elem_terms" data-required=""><label for="terms_"
            class="opt-label form-builder-checkbox-label"><span class="label-style"></span></label></div>
      </div>
    </div>
  </div><button class="lp-element lp-pom-button" id="lp-pom-button-345" type="submit"><span class="label"><strong>REGISTER NOW</strong></span></button>
  <input type="hidden" name="ubafs-jev" id="ubafs-jev"
    value="{&quot;date&quot;:&quot;2021-09-29T18:37:08.180Z&quot;,&quot;agent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36&quot;,&quot;screen&quot;:{&quot;availWidth&quot;:1600,&quot;availHeight&quot;:1200,&quot;width&quot;:1600,&quot;height&quot;:1200},&quot;window&quot;:{&quot;innerWidth&quot;:1600,&quot;innerHeight&quot;:1200},&quot;hasPlugins&quot;:true}">
</form>

Text Content

Data Connectors, 500 Chesterfield Center, Suite 200, Chesterfield, MO 63017,
USA, +1.636.778.9495

Copyright © 2021 Data Connectors

TOP

Cybersecurity Conference

BECOME A SPONSOR

Ground Rules for Cyber Risk 

Quantification

Register today for the Texas Virtual Cybersecurity Summit to hear informative
Keynote Presentations, including insights from the FBI Cyber Division.  Learn
what role banks play in converting crypto and look at the risks financial
institutions face by processing ransomware.





embed google map iframe

 * Qualification for 11 CPE credits

 * Access to all Keynote & Educational Sessions

 * Food & Beverage during the Conference 

 * Solutions Showcase Admission

 * Chances to win giveaways from partners

 * Entry to the Community Social Event

MEET THE SPEAKERS

Gavin Grounds

Exec. Director Cyber Security Strategy and Information Risk Management at
Verizon 





REGISTRATION INCLUDES




REQUEST MORE DETAILS


TEXAS

Virtual Cybersecurity Conference

VIRTUAL CYBERSECURITY SUMMIT

presented by Data Connectors


REGISTER NOW

I Agree to Data Connectors' Terms & Conditions*

REGISTRATION IS NOW OPEN! 

Registration for qualified senior professionals.
Subject to approval. 

SAVE $200 BY COMPLETING YOUR REGISTRATION TODAY*

* Savings applied with VIP code at checkout



October 6 - 7, 2021

Irving Convention Center

October 6 - 7, 2021

Irving Convention Center

REGISTER NOWREGISTER NOW

Ransomware Investigations and Actionable Intelligence from DarkSide and REvil

In almost all areas of business and corporate management, we speak in terms of
facts, figures and real fiscal currencies. So why do cybersecurity leaders opt
for gradients (low, medium, high, critical) and colors (Green, Amber, Red…
“traffic light” chart)?

This keynote will analyze the key reasons why qualitative risk methods and
relative ratings are woefully inadequate and do not meet basic business needs;
and delve into their weakness as it pertains to the inputs and conclusions.  




 


SEE FULL AGENDA

Thursday, October  14, 2021

Ground Rules for Cyber Risk Quantification















Pamela Clegg

VP of Financial Investigations

CypherTrace

Gavin Grounds

Exec. Director Cyber Security Strategy and Information Risk Management at
Verizon 




MEET THE SPEAKER

MEET THE SPEAKERS

In almost all areas of business and corporate management, we speak in terms of
facts, figures and real fiscal currencies. So why do cybersecurity leaders opt
for gradients (low, medium, high, critical) and colors (Green, Amber, Red…
“traffic light” chart)?

This keynote will analyze the key reasons why qualitative risk methods and
relative ratings are woefully inadequate and do not meet basic business needs;
and delve into their weakness as it pertains to the inputs and conclusions.  

SPEAKER DETAILSSPEAKER DETAILSSpeaker Details


Insights from the FBI Internet Crime 

Complaint Center (IC3)


























Ransomware is now a threat equal to terrorism. Cryptocurrencies have proven to
be a lucrative modus operandi for criminal groups and state-actors looking to
launder funds and evade sanctions. Cryptocurrency intelligence products, such as
CipherTrace Inspector, can remove the financial incentives from ransomware
perpetrators without risking brute force attacks. In May 2021, US-based Colonial
Pipeline paid 75 BTC ($4.3M USD at the time) after a ransomware attack from
DarkSide severely hindered the refinery’s operations.






Ground Rules for Cyber Risk Quantification















 


INSIGHTS FROM THE FBI INTERNET CRIME COMPLAINT CENTER (IC3)





James T Harris

SMAPA-FBI Cyber Division




Ransomware is now a threat equal to terrorism. Cryptocurrencies have proven to
be a lucrative modus operandi for criminal groups and state-actors looking to
launder funds and evade sanctions. Cryptocurrency intelligence products, such as
CipherTrace Inspector, can remove the financial incentives from ransomware
perpetrators without risking brute force attacks. In May 2021, US-based Colonial
Pipeline paid 75 BTC ($4.3M USD at the time) after a ransomware attack from
DarkSide severely hindered the refinery’s operations.

YOU'RE INVITED 

TO OUR LIVE ONLINE

CYBERSECURITY SUMMIT

James T Harris

SMAPA-FBI Cybercrime Division