Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS
Session One8:45 am - 9:30 am
About Security Management Partners
Founded in 2001 and headquartered in Waltham, MA, Security Management Partners is a full-service IT assurance firm. We specialize in information security audits, assessments and regulatory compliance consulting for the corporate, healthcare, biopharma, and financial industries. As proven independent counsel to large global enterprises as well as small- to mid-sized businesses, SMP identifies threats and vulnerabilities, quantifies risks and provides remediation strategies for your information assets.
Our highly skilled IT security specialists maintain a singular focus to identify, test and provide concrete solutions that eliminate external and internal information security risks, while working in partnership with you to navigate today’s evolving regulatory compliance rules. SMP is 100% vendor-neutral, which means we do not push integration or managed services, sell hardware or software or act as resellers, which ensures complete objectivity in your IT security engagement.
Let us show you why hundreds of businesses have selected SMP as their cybersecurity provider of choice. We look forward to learning how we can help your organization advance its IT security, policies, practices and processes.
Session Two9:30 am - 10:00 am
About Tempered Networks
Our Proven Solution is Unlike Any Other
Originally developed for a global Fortune 50 manufacturer, our technology enabled the company to increase its competitive edge by modernizing their production network and increasing production output, while safeguarding them against cyber breaches. Today, IDN is available to the broader market and we’re uniquely positioned to help you overcome your thorniest networking challenges. We understand the significant burden created by complex, time-consuming, and costly work-arounds – not to mention the distressing security trade-offs.
Our identity-based solution leverages the IETF-ratified Host Identity Protocol (HIP), an industry breakthrough for secure communications. With HIP, your devices can be identified using strong cryptographic identities, rather than an IPv4 or IPv6 address. This means your networked devices can change location yet retain their strong ‘verifiable’ cryptographic identity.
Our simple to use policy-based orchestration means anyone can manage IDN overlays. Our point-and-click orchestration tool sets and distributes network policies, making manual and tedious IP address management a thing of the past. It’s time to say good-bye to antiquated addressed-defined networking and welcome identity defined networking.
Session Three10:30 am - 11:00 am
About Axiad IDS
Headquartered in Santa Clara, CA with offices in Canada, and India, Axiad IDS is a Trusted Identity and Access solutions provider for enterprise, government and financial organizations.
The emergence of Axiad IDS as an important player in the Identity Assurance industry is the result of listening to the most critical needs of companies and recognizing that ID security – especially in our increasingly digital world – could no longer be addressed with a patchwork of heterogeneous technologies.
Our approach starts with what customers need from a security and business perspective; we then build solutions that address these needs to safely interact online, access information from anywhere and leverage today’s digital realities.
With Axiad IDS, companies get a single supplier providing an integrated solution without sacrificing security.
Session Four11:00 am - 11:30 am
One Platform for IT Resilience — simple, scalable, and always available.
Successful businesses are embracing digital transformation – harnessing the power of technology to drive efficiencies, create new experiences, and ultimately beat the competition. These business leaders are relying on their IT organizations to make it happen. Challenged to maximize IT resources and faced with the complexity of protecting the business while modernizing and transforming, IT leaders are shifting to an IT resilience strategy. IT resilience is the ability to seamlessly adapt to new technology and drive IT transformation, while mitigating the risks of downtime, ensuring an always-on business and the best customer experience.
Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto combines disaster recovery, backup and cloud mobility in a simple, converged platform. With enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds.
Session Five12:00 pm - 12:30 pm
Founded in 2002 and headquartered in Chicago, Nexum® takes a comprehensive approach to security. Nexum approaches business with one simple statement: “Do what’s right for the customer and success will follow.”
Nexum helps you mitigate risks, protect your data, increase business continuity and meet your unique business objectives by:
Detecting and preventing network threats, intrusions and disruptions
Equipping you with the information, tools, training and resources you need to effectively manage IT risk
Nexum, Latin for an arrangement by which one pledged one’s very liberty as security, Nexum is committed to ensuring your security. At Nexum, We Mean Security®.
Session Six12:45 pm - 1:15 pm
At CSPi we are committed to helping our customers meet some of computing’s most demanding performance, availability and security challenges.
Today’s security teams receive a great deal of real-time information and intrusion alerts, generated from their security equipment and tools; yet, the volumes of data make it make it nearly impossible for incident response teams to validate a data breach. With our Myricom nVoy Series solution we offer our customers a new approach to cyber threat identification and investigation – a rapid breach response solution that identifies alerts associated with a specific asset and provides an extraction of the entire set of conversations associated with that breach.This detailed data is crucial in performing timely and accurate analysis needed to comply with data-privacy regulations such as GDPR, PCI DSS, HIPPA, SOX, and 48 different U.S. state laws related to PII.
Session Seven1:15 pm - 1:45 pm
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions. Over 5,150 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio trust Okta to securely connect their people and technology.