Data Connectors is proud to host the Cybersecurity Strategies Conference.
8:15 am - 5:00 pm4800 South Tryon StreetCharlotte, NC 28217704-527-8400
CHECK-IN AND OPENING INTRODUCTIONS
Session One8:45 am - 9:15 am
About Respond Software
Respond Software delivers instant ROI to organizations in their battle against cyber crime. With its patent-pending intelligent decision engine, PGO, Respond Software’s product uniquely combines the best of human expert judgement with the scale, thoroughness, and consistency of software. This quick-to-implement, cyber-security decision automation software delivers the equivalent of a virtual, best-of-breed analyst team that dramatically increases capacity and improves monitoring and triage capabilities at a fraction of the cost.
Respond Software was founded in 2016 by security and software industry veterans.
Session Two9:15 am - 9:45 am
One Platform for IT Resilience — simple, scalable, and always available.
Successful businesses are embracing digital transformation – harnessing the power of technology to drive efficiencies, create new experiences, and ultimately beat the competition. These business leaders are relying on their IT organizations to make it happen. Challenged to maximize IT resources and faced with the complexity of protecting the business while modernizing and transforming, IT leaders are shifting to an IT resilience strategy. IT resilience is the ability to seamlessly adapt to new technology and drive IT transformation, while mitigating the risks of downtime, ensuring an always-on business and the best customer experience.
Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto combines disaster recovery, backup and cloud mobility in a simple, converged platform. With enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds.
Session Three10:15 am - 10:45 am
People friendly. Enterprise tough.
We’re an enterprise SaaS solution that secures all distributed end-user data in our state-of-the-art cloud infrastructure.
Through continuous, automatic collection via a lightweight agent on the device, Code42 secures every file on Mac, Windows, and Linux laptops and desktops. Our platform enables IT, security, and business teams to limit risk, meet data privacy regulations, and recover from data loss, no matter the cause.
Session Four10:45 am - 11:15 am
We help organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products.
We help customers protect their businesses and meet compliance needs. And all our customers benefit from the expertise of our threat analysts located around the world. Their research is at the heart of everything we do. They quickly find the latest threats and update protection for our customers automatically. Plus, our support engineers are experts on all our products, and they’re available whenever you need them.
We make our products easy to install and use so you spend less time managing security. With Sophos you can focus on the needs of your business because we’re securing your entire organization.
Keynote Session11:45 pm - 12:45 pmSpecial Agent Brian CyprianFBI, Charlotte Cyber Task Force
Brian N. Cyprian has been a Special Agent since 2005 and supervisor for the Charlotte Cyber Task Force since March 2016. Cyprian develops strategy to defeat cyber adversaries and to protect U.S. critical infrastructure. He is responsible for informing critical stakeholders and citizens of vulnerabilities and schemes targeting the United States, specifically those who are located North Carolina. Both criminal and national security computer intrusions are investigated by the Charlotte Cyber Task Force and emphasis is placed on proactively developing relationships prior to cyber incidents. Prior to reporting to Charlotte, Cyprian was assigned to FBI Headquarters, Cyber Division, where he managed national security computer intrusion investigations. He has worked in the Chicago and Kansas City Field Offices. Cyprian has a B.S. in Computer Information Systems and a MBA from Texas A&M University –Commerce. He has several computer certifications, to include the CISSP and GIAC’s Certified Intrusion Analyst.
Session Six1:00 pm - 1:30 pm
It all started when our founders, working for one of the most successful network security companies at that time, were frequently asked by customers how they should implement the same type of security in the cloud. This prompted the realization that the best security technologies for malware detection, data classification, encryption, user management, access control, and so much more already existed. Unfortunately, customers had no way to connect it to their SaaS applications in a unified way, with just a single click.
With that vision in mind, Avanan cloudified the security tools of the industry’s leading vendors and built a platform that could connect these tools to the most widely used enterprise SaaS applications. With everything virtualized, installing these tools on any SaaS is as easy as installing an app on a phone. By simply choosing the security tools from the Avanan security app store, customers can implement multiple security solutions across any or all of their SaaS applications.
Session Seven1:30 pm - 2:00 pm
About SSL Store
The SSL Store™ was founded in 2009 and is owned by the Internet security firm Rapid Web Services, LLC. Our headquarters is located in sunny St. Petersburg, Florida, and we have additional offices in The Netherlands and India…where there are 50+ people working on website security solutions just for you! As the world’s foremost provider of SSL security certificates, The SSL Store™ is one of the largest Platinum Partners of the world’s leading Certification Authorities (CAs), including Symantec, GeoTrust, Thawte, RapidSSL, Certum and Comodo.
Session Eight2:15 pm - 2:45 pmTom Atkins
Deception technology, luxury item or life line?
Is deception technology only for mature security operations or is it an effective cyber security solution to help companies mature their capabilities? Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. Learn how deploying decoys throughout your environment can build the bridge strengthening all the levels in your security stack. Join us for this session where you’ll hear about real-world deployment experiences, the value customers are realizing, and what Red Teams are saying about deception-based threat detection.
Tom Atkins is a veteran Information Security professional with over 25 years of experience. Tom specializes in guiding young technology companies successfully into new markets. He works closely with leading companies to identify and resolve their core security challenges. At FireEye, he was the first customer-facing employee for the East Coast and at OpenDNS held a similar role building the Enterprise sales organization and strategy and managing the transition through the acquisition by Cisco in 2015. Tom is currently leading the East sales team for Attivo Networks, the leading deception company in the market.
Session Nine3:00 pm - 3:30 pm
Sertainty enables you to build from a new foundation. Our technology makes it easy to configure and mix intelligence into ordinary data-files empowering its ability to act and react.
Sertainty shifts data control and risk mitigation from an indirect/re-active paradigm to a direct/active paradigm by driving governance, provenance and protection INTO YOUR DATA and technology solutions. We call this Data: Empowered.
Session Ten3:30 pm - 4:00 pm
Security breaches, data leaks and email-based attacks are a real threat to your organization. Now, more than ever, you need a new approach to email security and management. Don’t let the limitations of traditional technologies prevent you from protecting email and corporate information.
We have made it our mission to mitigate the risks you face from email, and support you in reducing the cost and complexity of protecting yourself by moving this workload to the cloud. We live and breathe cloud technology. We developed our proprietary cloud architecture to offer you comprehensive email security, service continuity and archiving in a single subscription service. Our goal is to make it easier for you to protect your business in today’s fast-changing security and risk environment.