Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS
Session One8:45 am - 9:15 am
About Respond Software
Respond Software delivers instant ROI to organizations in their battle against cyber crime. With its patent-pending intelligent decision engine, PGO, Respond Software’s product uniquely combines the best of human expert judgement with the scale, thoroughness, and consistency of software. This quick-to-implement, cyber-security decision automation software delivers the equivalent of a virtual, best-of-breed analyst team that dramatically increases capacity and improves monitoring and triage capabilities at a fraction of the cost.
Respond Software was founded in 2016 by security and software industry veterans.
Session Two9:15 am - 9:45 am
About Sentinel IPS
Network security isn’t just our business. It’s our passion.
The first iteration of Sentinel Intrusion Prevention Systems began in Dallas, Texas, in 1995, at the dawn of the World Wide Web. Although we started as web developers, we soon shifted our focus to network security, driven by the belief that everyone—and every sized company—has the fundamental right to be secure on the Internet. Small businesses, state and local government entities, and companies with lean IT departments that simply didn’t have the security expertise or the time to put one more thing on their already overflowing plates.
We couldn’t find an integrated solution that checked all the boxes, so, we assembled a team of innovators and developed our own.
Session Three10:15 am - 10:45 am
Nyotron has turned the security paradigm upside down by focusing on the damage stage or the intended outcome behind the attack. Traditional as well as next-generation endpoint security technologies attempt to prevent attacker’s entry into the enterprise, whether at the perimeter or the endpoint, acting like gates that can be bypassed. We assume that given enough time targeted and unknown threats will bypass your existing security controls. Our engine has mapped legitimate operating system behavior, so when an attack attempts to delete, exfiltrate or encrypt files, we know the actions shouldn’t be allowed and stop the damage from executing.
Founded in 2012, Nyotron is headquartered in Santa Clara, CA with R&D in Israel. Nyotron has earned a top score of 5 stars from SC Magazine in its review of Endpoint Security Platforms, won GOLD in the 2017 IT World Awards for Endpoint Security and was designated as the 2017 HOT COMPANY in Endpoint Security by Cyber Defense Magazine.
Session Four10:45 am - 11:15 am
One Platform for IT Resilience — simple, scalable, and always available.
Successful businesses are embracing digital transformation – harnessing the power of technology to drive efficiencies, create new experiences, and ultimately beat the competition. These business leaders are relying on their IT organizations to make it happen. Challenged to maximize IT resources and faced with the complexity of protecting the business while modernizing and transforming, IT leaders are shifting to an IT resilience strategy. IT resilience is the ability to seamlessly adapt to new technology and drive IT transformation, while mitigating the risks of downtime, ensuring an always-on business and the best customer experience.
Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto combines disaster recovery, backup and cloud mobility in a simple, converged platform. With enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds.
Session Five11:45 am - 12:15 pm
InNet partners with customers to design, deploy, and support a full suite of advanced technology solutions focusing upon enterprise and mid-market IT organizations and assisting in regards to networks, information security, business continuity, storage, cloud migration, virtualization and performance monitoring. As one of the most trusted solution providers in the Central and Eastern USA, InNet brings many years of valuable experience from a myriad of customer perspectives working with leading enterprise and corporate customers to deliver technology that meets business objectives.
Session Seven1:30 pm - 2:00 pm
We are a team of cybersecurity professionals changing how companies protect themselves from today’s—and tomorrow’s—phishing threats. Our mission: to protect organizations from the growing number of phishing attacks occurring outside of email throughout the Web.
Founded by Atif Mushtaq, lead architect of FireEye’s core malware detection technology, we are focused on the biggest vulnerability in cybersecurity: human fallibility. While OS emulation (sandboxing) addressed the .exe malware problem, SlashNext has pioneered the concept of Session Emulation to solve the HTML Attack problem presented by Web-based phishing.
Session Eight2:15 pm - 2:45 pm
About Tempered Networks
Our Proven Solution is Unlike Any Other
Originally developed for a global Fortune 50 manufacturer, our technology enabled the company to increase its competitive edge by modernizing their production network and increasing production output, while safeguarding them against cyber breaches. Today, IDN is available to the broader market and we’re uniquely positioned to help you overcome your thorniest networking challenges. We understand the significant burden created by complex, time-consuming, and costly work-arounds – not to mention the distressing security trade-offs.
Our identity-based solution leverages the IETF-ratified Host Identity Protocol (HIP), an industry breakthrough for secure communications. With HIP, your devices can be identified using strong cryptographic identities, rather than an IPv4 or IPv6 address. This means your networked devices can change location yet retain their strong ‘verifiable’ cryptographic identity.
Our simple to use policy-based orchestration means anyone can manage IDN overlays. Our point-and-click orchestration tool sets and distributes network policies, making manual and tedious IP address management a thing of the past. It’s time to say good-bye to antiquated addressed-defined networking and welcome identity defined networking.
Session Nine3:00 pm - 3:30 pm
About SSL Store
The SSL Store™ was founded in 2009 and is owned by the Internet security firm Rapid Web Services, LLC. Our headquarters is located in sunny St. Petersburg, Florida, and we have additional offices in The Netherlands and India…where there are 50+ people working on website security solutions just for you! As the world’s foremost provider of SSL security certificates, The SSL Store™ is one of the largest Platinum Partners of the world’s leading Certification Authorities (CAs), including Symantec, GeoTrust, Thawte, RapidSSL, Certum and Comodo.
Sertainty enables you to build from a new foundation. Our technology makes it easy to configure and mix intelligence into ordinary data-files empowering its ability to act and react.
Sertainty shifts data control and risk mitigation from an indirect/re-active paradigm to a direct/active paradigm by driving governance, provenance and protection INTO YOUR DATA and technology solutions. We call this Data: Empowered.