Data Connectors is proud to host the Cybersecurity Strategies Conference.
8:15 am - 5:00 pm1701 California StreetDenver CO 80202303-297-1300
CHECK-IN AND OPENING INTRODUCTIONS
Session One8:45 am - 9:15 am
About Respond Software
Respond Software delivers instant ROI to organizations in their battle against cyber crime. With its patent-pending intelligent decision engine, PGO, Respond Software’s product uniquely combines the best of human expert judgement with the scale, thoroughness, and consistency of software. This quick-to-implement, cyber-security decision automation software delivers the equivalent of a virtual, best-of-breed analyst team that dramatically increases capacity and improves monitoring and triage capabilities at a fraction of the cost.
Respond Software was founded in 2016 by security and software industry veterans.
Session Two9:15 am - 9:45 am
Nyotron has turned the security paradigm upside down by focusing on the damage stage or the intended outcome behind the attack. Traditional as well as next-generation endpoint security technologies attempt to prevent attacker’s entry into the enterprise, whether at the perimeter or the endpoint, acting like gates that can be bypassed. We assume that given enough time targeted and unknown threats will bypass your existing security controls. Our engine has mapped legitimate operating system behavior, so when an attack attempts to delete, exfiltrate or encrypt files, we know the actions shouldn’t be allowed and stop the damage from executing.
Founded in 2012, Nyotron is headquartered in Santa Clara, CA with R&D in Israel. Nyotron has earned a top score of 5 stars from SC Magazine in its review of Endpoint Security Platforms, won GOLD in the 2017 IT World Awards for Endpoint Security and was designated as the 2017 HOT COMPANY in Endpoint Security by Cyber Defense Magazine.
Session Three10:15 am - 10:45 am
People friendly. Enterprise tough.
We’re an enterprise SaaS solution that secures all distributed end-user data in our state-of-the-art cloud infrastructure.
Through continuous, automatic collection via a lightweight agent on the device, Code42 secures every file on Mac, Windows, and Linux laptops and desktops. Our platform enables IT, security, and business teams to limit risk, meet data privacy regulations, and recover from data loss, no matter the cause.
Session Four10:45 am - 11:15 am
We help organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products.
We help customers protect their businesses and meet compliance needs. And all our customers benefit from the expertise of our threat analysts located around the world. Their research is at the heart of everything we do. They quickly find the latest threats and update protection for our customers automatically. Plus, our support engineers are experts on all our products, and they’re available whenever you need them.
We make our products easy to install and use so you spend less time managing security. With Sophos you can focus on the needs of your business because we’re securing your entire organization.
Session Five11:45 pm - 12:30 pm
Today’s data protection solutions fail because the trade-off between security and ease-of-use is unacceptable.
Regulated content, intellectual property, and other sensitive information are the lifeblood of the enterprise and that data must be shared – inside and outside your organization. Yet, today’s solutions just don’t work because the user experience causes too much friction to be effective. Virtru is dedicated to eliminating the trade-off between data protection and ease-of-use.
More than 8,000 organizations trust the Virtru Data Protection platform to easily protect and control sensitive information regardless of where it’s been created, stored, or shared. Learn more about Virtru’s patented underlying technology, which allows users anywhere, on any device to work the way they do today – without requiring a separate log-in, user interface, or application.
Keynote Session12:45 pm - 1:30 pmDavid ZetoonyPartner, Bryan Cave
David Zetoony is an internationally recognized data privacy and security attorney that has been called a “Cybersecurity & Data Privacy Trailblazer,” and the top “Legal Influencer,” by legal sources such as the National Law Journal, Lexology, and JD Supra.
He is regularly called upon by some of the world’s most complex organizations to confront their most difficult United States and European privacy and security challenges. He has helped hundreds of clients design, or validate, their privacy programs against the GDPR and United States law, and has navigated complex data security incidents and security breaches on behalf of numerous clients. He has also successfully defended companies’ privacy and security practices before the Federal Trade Commission, and other regulatory agencies.
He leads the firm’s global data privacy and security practice. He is frequently asked to speak and write on issues of domestic and international data privacy and security law, and has authored the American Bar Association’s lead treatise on the European GDPR.
David’s book, The EU GDPR General Data Protection Regulation: Answers to the Most Frequently Asked Questions is available here.
Session Seven1:30 pm - 2:00 pm
APCON, an industry leader in network visibility and security solutions, provides an unparalleled level of confidence to enterprise and midsize businesses seeking network insights for enhanced investigation, threat detection and response. Our customers include Fortune 1000 companies to midsize organizations as well as government and defense agencies. Organizations in over 40 countries depend on APCON solutions.
APCON’s mission is to provide valuable network insights that enable security and network professionals to monitor, secure and protect their data in both physical and virtual environments, inspiring confidence through APCON’s exceptional product quality and responsive customer service.
Session Eight2:15 pm - 2:45 pm
About Vade Secure
Vade Secure has developed a full set of security features against the most sophisticated email scams such as phishing and spear phishing, malware and ransomware. As a Global company, protecting more than 500 million mailboxes worldwide, we have an accurate vision on worldwide email flow. This allows us to provide the comprehensive solution against all email threats, ensuring a zero-day protection, even on targeted attacks. Our solutions are tailored to deal with a large amount of emails to help ISPs, OEMs, hosting companies and Enterprises.
Session Nine3:00 pm - 3:30 pm
About Tempered Networks
Our Proven Solution is Unlike Any Other
Originally developed for a global Fortune 50 manufacturer, our technology enabled the company to increase its competitive edge by modernizing their production network and increasing production output, while safeguarding them against cyber breaches. Today, IDN is available to the broader market and we’re uniquely positioned to help you overcome your thorniest networking challenges. We understand the significant burden created by complex, time-consuming, and costly work-arounds – not to mention the distressing security trade-offs.
Our identity-based solution leverages the IETF-ratified Host Identity Protocol (HIP), an industry breakthrough for secure communications. With HIP, your devices can be identified using strong cryptographic identities, rather than an IPv4 or IPv6 address. This means your networked devices can change location yet retain their strong ‘verifiable’ cryptographic identity.
Our simple to use policy-based orchestration means anyone can manage IDN overlays. Our point-and-click orchestration tool sets and distributes network policies, making manual and tedious IP address management a thing of the past. It’s time to say good-bye to antiquated addressed-defined networking and welcome identity defined networking.
Session Ten3:30 pm - 4:00 pm
The Vera Platform gives developers the power to build advanced data security and control into any business application, extending protections beyond the borders of an organization. Leverage our SDK and REST APIs to encrypt, track, and revoke access to files, and give your security team complete visibility over how confidential information is used, and the tools to manage access anywhere it travels.