Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS
Session One8:45 am - 9:15 am
Nyotron has turned the security paradigm upside down by focusing on the damage stage or the intended outcome behind the attack. Traditional as well as next-generation endpoint security technologies attempt to prevent attacker’s entry into the enterprise, whether at the perimeter or the endpoint, acting like gates that can be bypassed. We assume that given enough time targeted and unknown threats will bypass your existing security controls. Our engine has mapped legitimate operating system behavior, so when an attack attempts to delete, exfiltrate or encrypt files, we know the actions shouldn’t be allowed and stop the damage from executing.
Founded in 2012, Nyotron is headquartered in Santa Clara, CA with R&D in Israel. Nyotron has earned a top score of 5 stars from SC Magazine in its review of Endpoint Security Platforms, won GOLD in the 2017 IT World Awards for Endpoint Security and was designated as the 2017 HOT COMPANY in Endpoint Security by Cyber Defense Magazine.
Session Two9:15 am - 9:45 am
People friendly. Enterprise tough.
We’re an enterprise SaaS solution that secures all distributed end-user data in our state-of-the-art cloud infrastructure.
Through continuous, automatic collection via a lightweight agent on the device, Code42 secures every file on Mac, Windows, and Linux laptops and desktops. Our platform enables IT, security, and business teams to limit risk, meet data privacy regulations, and recover from data loss, no matter the cause.
Session Three10:15 am - 10:45 am
We help organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products.
We help customers protect their businesses and meet compliance needs. And all our customers benefit from the expertise of our threat analysts located around the world. Their research is at the heart of everything we do. They quickly find the latest threats and update protection for our customers automatically. Plus, our support engineers are experts on all our products, and they’re available whenever you need them.
We make our products easy to install and use so you spend less time managing security. With Sophos you can focus on the needs of your business because we’re securing your entire organization.
Session Four10:45 am - 11:30 am
Today’s data protection solutions fail because the trade-off between security and ease-of-use is unacceptable.
Regulated content, intellectual property, and other sensitive information are the lifeblood of the enterprise and that data must be shared – inside and outside your organization. Yet, today’s solutions just don’t work because the user experience causes too much friction to be effective. Virtru is dedicated to eliminating the trade-off between data protection and ease-of-use.
More than 8,000 organizations trust the Virtru Data Protection platform to easily protect and control sensitive information regardless of where it’s been created, stored, or shared. Learn more about Virtru’s patented underlying technology, which allows users anywhere, on any device to work the way they do today – without requiring a separate log-in, user interface, or application.
Session Five12:00 pm - 12:30 pm
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions.
Over 5,150 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio trust Okta to securely connect their people and technology.
Keynote Session12:45 pm - 1:30 pmDavid ZetoonyPartner, Bryan Cave
David Zetoony is an internationally recognized data privacy and security attorney that has been called a “Cybersecurity & Data Privacy Trailblazer,” and the top “Legal Influencer,” by legal sources such as the National Law Journal, Lexology, and JD Supra.
He is regularly called upon by some of the world’s most complex organizations to confront their most difficult United States and European privacy and security challenges. He has helped hundreds of clients design, or validate, their privacy programs against the GDPR and United States law, and has navigated complex data security incidents and security breaches on behalf of numerous clients. He has also successfully defended companies’ privacy and security practices before the Federal Trade Commission, and other regulatory agencies.
He leads the firm’s global data privacy and security practice. He is frequently asked to speak and write on issues of domestic and international data privacy and security law, and has authored the American Bar Association’s lead treatise on the European GDPR.
Session Seven1:30 pm - 2:00 pm
APCON, an industry leader in network visibility and security solutions, provides an unparalleled level of confidence to enterprise and midsize businesses seeking network insights for enhanced investigation, threat detection and response. Our customers include Fortune 1000 companies to midsize organizations as well as government and defense agencies. Organizations in over 40 countries depend on APCON solutions.
APCON’s mission is to provide valuable network insights that enable security and network professionals to monitor, secure and protect their data in both physical and virtual environments, inspiring confidence through APCON’s exceptional product quality and responsive customer service.
Session Eight2:15 pm - 2:45 pm
About Vade Secure
Vade Secure has developed a full set of security features against the most sophisticated email scams such as phishing and spear phishing, malware and ransomware. As a Global company, protecting more than 500 million mailboxes worldwide, we have an accurate vision on worldwide email flow. This allows us to provide the comprehensive solution against all email threats, ensuring a zero-day protection, even on targeted attacks. Our solutions are tailored to deal with a large amount of emails to help ISPs, OEMs, hosting companies and Enterprises.