Data Connectors is proud to host the Cybersecurity Strategies Conference.
8:15 am - 5:00 pm21111 Haggerty RoadNovi, MI 48375248-349-4000
CHECK-IN AND OPENING INTRODUCTIONS
Session One8:45 am - 9:15 am
About Tempered Networks
Our Proven Solution is Unlike Any Other
Originally developed for a global Fortune 50 manufacturer, our technology enabled the company to increase its competitive edge by modernizing their production network and increasing production output, while safeguarding them against cyber breaches. Today, IDN is available to the broader market and we’re uniquely positioned to help you overcome your thorniest networking challenges. We understand the significant burden created by complex, time-consuming, and costly work-arounds – not to mention the distressing security trade-offs.
Our identity-based solution leverages the IETF-ratified Host Identity Protocol (HIP), an industry breakthrough for secure communications. With HIP, your devices can be identified using strong cryptographic identities, rather than an IPv4 or IPv6 address. This means your networked devices can change location yet retain their strong ‘verifiable’ cryptographic identity.
Our simple to use policy-based orchestration means anyone can manage IDN overlays. Our point-and-click orchestration tool sets and distributes network policies, making manual and tedious IP address management a thing of the past. It’s time to say good-bye to antiquated addressed-defined networking and welcome identity defined networking.
Session Two9:15 am - 9:45 am
About Oracle + Dyn
Oracle Corporation is an integrated technology company providing technology solutions for businesses worldwide. Oracle was founded by Larry Ellison and is led by CEOs Mark Hurd and Safra Catz.
Flexibility is vital to modern businesses. Customers are now digital natives and workforces are becoming increasingly mobile. Oracle provides businesses with an integrated range of applications, storage, databases, cloud technologies, and servers to help empower modern businesses.
Oracle technology has been used by more than 420,000 customers across 195 countries to accelerate their digital transformation. Oracle technology has been harnessed by industry leaders in fields such aerospace, insurance, retailers, SaaS providers, universities, and manufacturers.
On November 21, 2016, Oracle announced it had signed an agreement to acquire Dyn. “Dyn’s immensely scalable and global DNS is a critical core component and a natural extension to our cloud computing platform,” stated Thomas Kurian, President of Product Development at Oracle.
Dyn’s best-in-class DNS and email delivery solutions extend the Oracle cloud computing platform, providing enterprise customers with comprehensive solution for Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS).
Session Three10:15 am - 10:45 amBrad BlodgettSystems Engineer
Win Big with IT Resilience
Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto is changing the way disaster recovery, data protection and cloud are managed. With enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds. Zerto is trusted by over 6,000 customers globally and is powering resiliency offerings for Microsoft Azure, IBM Cloud, AWS, Sungard and more than 350 cloud services providers
Session Four10:45 am - 11:15 am
Code42 is the leader in data loss protection, visibility and recovery solutions. Native to the cloud, the Code42 Next-Gen Data Loss Protection rapidly detects insider threats, satisfies regulatory compliance requirements and speeds incident response — all without lengthy deployments, complex policy management or blocks on user collaboration. Because the solution collects and indexes every version of every file, it offers total visibility and recovery of data — wherever it lives and moves. Security, IT and compliance professionals can protect endpoint and cloud data from loss, leak and theft while maintaining an open and collaborative culture for employees.
Backed by security best practices and control requirements, Code42 Next-Gen DLP also preserves files for compliance and can be configured for GDPR, HIPAA, PCI and other regulatory frameworks. More than 50,000 organizations worldwide, including the most recognized brands in business and education, rely on Code42 to safeguard their ideas. Founded in 2001, the company is headquartered in Minneapolis, Minnesota, and backed by Accel Partners, JMI Equity, NEA and Split Rock Partners.
Session Five11:45 am - 12:15 am
Founded in 2002 and headquartered in Chicago, Nexum® takes a comprehensive approach to security. Nexum approaches business with one simple statement: “Do what’s right for the customer and success will follow.”
Nexum helps you mitigate risks, protect your data, increase business continuity and meet your unique business objectives by:
Detecting and preventing network threats, intrusions and disruptions
Equipping you with the information, tools, training and resources you need to effectively manage IT risk
Nexum, Latin for an arrangement by which one pledged one’s very liberty as security, Nexum is committed to ensuring your security. At Nexum, We Mean Security®.
Session Six12:30 pm - 1:00 pmJamie DuffDirector of Corporate Markets
A new approach to email security for Office 365
For hackers, Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Session Eight2:15 pm - 2:45 pmMichael Landewe
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
Session Nine3:00 pm - 3:30 pm
From the start, the Fortinet vision has been to deliver broad, truly integrated, high-performance security across the IT infrastructure.
We provide top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. Our unique security fabric combines Security Processors, an intuitive operating system, and applied threat intelligence to give you proven security, exceptional performance, and better visibility and control–while providing easier administration.
Our market position and solution effectiveness have been widely validated by industry analysts, independent testing labs, business organizations, and media outlets worldwide. We are proud to count the majority of Fortune 500 companies among our satisfied customers.
Fortinet is headquartered in Sunnyvale, California, with offices around the globe. Founded in 2000 by Ken Xie, the visionary founder and former president and CEO of NetScreen, Fortinet is led by a strong management team with deep experience in networking and security.
About Data Partner
Established in 2001, Data Partner Inc. has been providing our customers with complete IT solutions focusing on key critical elements. Over the years we have evolved our business model alongside the growing need for increased security and simplicity that today’s IT world demands. We utilize our teams years of experience to learn the details of your environment and offer you a state of the art, custom, and cost effective long term solution to meet all of your business needs.