dc-cybersecurityevents.com
Open in
urlscan Pro
2606:4700:20::ac43:49e5
Public Scan
Submitted URL: http://x8htn.mjt.lu/lnk/AaoAAEH9T4AAAAAAAAAAAAJ9Sc0AAAAAsdQAAAAAABfAXQBhU0h1sWLfkIQWQXeRRNx-dLci9QAXQ60/6/STkpa4Wmmh...
Effective URL: https://dc-cybersecurityevents.com/2021-texas/featured-keynote/?aff=MJE2&utm_source=MJE2&utm_medium=Email&utm_campaign=TEX2
Submission: On September 29 via manual from US — Scanned from DE
Effective URL: https://dc-cybersecurityevents.com/2021-texas/featured-keynote/?aff=MJE2&utm_source=MJE2&utm_medium=Email&utm_campaign=TEX2
Submission: On September 29 via manual from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST /fsg?pageId=6a9a50ef-f65e-4c9e-968b-97e2a89d634f&variant=a
<form action="/fsg?pageId=6a9a50ef-f65e-4c9e-968b-97e2a89d634f&variant=a" method="POST"><input type="hidden" name="pageId" value="6a9a50ef-f65e-4c9e-968b-97e2a89d634f"><input type="hidden" name="pageVariant" value="a">
<div class="fields">
<div class="lp-pom-form-field single-line-text" id="container_first_name"><input id="first_name" name="first_name" type="text" class="ub-input-item single text form_elem_first_name" placeholder="First Name" required=""></div>
<div class="lp-pom-form-field single-line-text" id="container_last_name"><input id="last_name" name="last_name" type="text" class="ub-input-item single text form_elem_last_name" placeholder="Last Name" required=""></div>
<div class="lp-pom-form-field single-line-text" id="container_company"><input id="company" name="company" type="text" class="ub-input-item single text form_elem_company" placeholder="Company" required=""></div>
<div class="lp-pom-form-field single-line-text" id="container_title"><input id="title" name="title" type="text" class="ub-input-item single text form_elem_title" placeholder="Title" required=""></div>
<div class="lp-pom-form-field email" id="container_email"><input id="email" name="email" type="email" class="ub-input-item single text form_elem_email" placeholder="Business Email" required=""
pattern="^[a-zA-Z0-9._%+-]+@[a-zA-Z0-9_-]+\.[a-zA-Z0-9-.]{2,61}$"></div>
<div class="lp-pom-form-field single-line-text" id="container_phone_number"><input id="phone_number" name="phone_number" type="tel" class="ub-input-item single text form_elem_phone_number" placeholder="Work Phone" required=""
pattern="^(\+?1[ -]?)?\(?[2-9]\d\d\)?[ -]?[2-9]\d\d[ -]?\d{4}$"></div>
<div class="lp-pom-form-field single-line-text" id="container_zip"><input id="zip" name="zip" type="text" class="ub-input-item single text form_elem_zip" placeholder="Zip" required=""></div><input id="aff" name="aff" type="hidden" class="hidden"
value="MJE2"><input id="registration_status" name="registration_status" type="hidden" class="hidden" value="New"><input id="Unbounce" name="Unbounce" type="hidden" class="hidden" value="unbounce Texas lp"><input id="Event_ID" name="Event_ID"
type="hidden" class="hidden" value="91">
<div class="lp-pom-form-field checkbox-group multi-group" id="container_terms">
<div class="ub-input-item input-wrap optionsList" id="group_terms">
<div class="option" id="ub-option-terms-item-0"><input type="checkbox" id="terms_" name="terms" value="" class="checkbox form-builder-checkbox-input form_elem_terms" data-required=""><label for="terms_"
class="opt-label form-builder-checkbox-label"><span class="label-style"></span></label></div>
</div>
</div>
</div><button class="lp-element lp-pom-button" id="lp-pom-button-345" type="submit"><span class="label"><strong>REGISTER NOW</strong></span></button>
<input type="hidden" name="ubafs-jev" id="ubafs-jev"
value="{"date":"2021-09-29T18:37:08.180Z","agent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36","screen":{"availWidth":1600,"availHeight":1200,"width":1600,"height":1200},"window":{"innerWidth":1600,"innerHeight":1200},"hasPlugins":true}">
</form>
Text Content
Data Connectors, 500 Chesterfield Center, Suite 200, Chesterfield, MO 63017, USA, +1.636.778.9495 Copyright © 2021 Data Connectors TOP Cybersecurity Conference BECOME A SPONSOR Ground Rules for Cyber Risk Quantification Register today for the Texas Virtual Cybersecurity Summit to hear informative Keynote Presentations, including insights from the FBI Cyber Division. Learn what role banks play in converting crypto and look at the risks financial institutions face by processing ransomware. embed google map iframe * Qualification for 11 CPE credits * Access to all Keynote & Educational Sessions * Food & Beverage during the Conference * Solutions Showcase Admission * Chances to win giveaways from partners * Entry to the Community Social Event MEET THE SPEAKERS Gavin Grounds Exec. Director Cyber Security Strategy and Information Risk Management at Verizon REGISTRATION INCLUDES REQUEST MORE DETAILS TEXAS Virtual Cybersecurity Conference VIRTUAL CYBERSECURITY SUMMIT presented by Data Connectors REGISTER NOW I Agree to Data Connectors' Terms & Conditions* REGISTRATION IS NOW OPEN! Registration for qualified senior professionals. Subject to approval. SAVE $200 BY COMPLETING YOUR REGISTRATION TODAY* * Savings applied with VIP code at checkout October 6 - 7, 2021 Irving Convention Center October 6 - 7, 2021 Irving Convention Center REGISTER NOWREGISTER NOW Ransomware Investigations and Actionable Intelligence from DarkSide and REvil In almost all areas of business and corporate management, we speak in terms of facts, figures and real fiscal currencies. So why do cybersecurity leaders opt for gradients (low, medium, high, critical) and colors (Green, Amber, Red… “traffic light” chart)? This keynote will analyze the key reasons why qualitative risk methods and relative ratings are woefully inadequate and do not meet basic business needs; and delve into their weakness as it pertains to the inputs and conclusions. SEE FULL AGENDA Thursday, October 14, 2021 Ground Rules for Cyber Risk Quantification Pamela Clegg VP of Financial Investigations CypherTrace Gavin Grounds Exec. Director Cyber Security Strategy and Information Risk Management at Verizon MEET THE SPEAKER MEET THE SPEAKERS In almost all areas of business and corporate management, we speak in terms of facts, figures and real fiscal currencies. So why do cybersecurity leaders opt for gradients (low, medium, high, critical) and colors (Green, Amber, Red… “traffic light” chart)? This keynote will analyze the key reasons why qualitative risk methods and relative ratings are woefully inadequate and do not meet basic business needs; and delve into their weakness as it pertains to the inputs and conclusions. SPEAKER DETAILSSPEAKER DETAILSSpeaker Details Insights from the FBI Internet Crime Complaint Center (IC3) Ransomware is now a threat equal to terrorism. Cryptocurrencies have proven to be a lucrative modus operandi for criminal groups and state-actors looking to launder funds and evade sanctions. Cryptocurrency intelligence products, such as CipherTrace Inspector, can remove the financial incentives from ransomware perpetrators without risking brute force attacks. In May 2021, US-based Colonial Pipeline paid 75 BTC ($4.3M USD at the time) after a ransomware attack from DarkSide severely hindered the refinery’s operations. Ground Rules for Cyber Risk Quantification INSIGHTS FROM THE FBI INTERNET CRIME COMPLAINT CENTER (IC3) James T Harris SMAPA-FBI Cyber Division Ransomware is now a threat equal to terrorism. Cryptocurrencies have proven to be a lucrative modus operandi for criminal groups and state-actors looking to launder funds and evade sanctions. Cryptocurrency intelligence products, such as CipherTrace Inspector, can remove the financial incentives from ransomware perpetrators without risking brute force attacks. In May 2021, US-based Colonial Pipeline paid 75 BTC ($4.3M USD at the time) after a ransomware attack from DarkSide severely hindered the refinery’s operations. YOU'RE INVITED TO OUR LIVE ONLINE CYBERSECURITY SUMMIT James T Harris SMAPA-FBI Cybercrime Division