Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Session One9:00 am - 9:30 am
About Respond Software
Respond Software delivers instant ROI to organizations in their battle against cyber crime. With its patent-pending intelligent decision engine, PGO, Respond Software’s product uniquely combines the best of human expert judgement with the scale, thoroughness, and consistency of software. This quick-to-implement, cyber-security decision automation software delivers the equivalent of a virtual, best-of-breed analyst team that dramatically increases capacity and improves monitoring and triage capabilities at a fraction of the cost.
Respond Software was founded in 2016 by security and software industry veterans.
Session Two9:30 am - 10:00 am
About Tempered Networks
Our Proven Solution is Unlike Any Other
Originally developed for a global Fortune 50 manufacturer, our technology enabled the company to increase its competitive edge by modernizing their production network and increasing production output, while safeguarding them against cyber breaches. Today, IDN is available to the broader market and we’re uniquely positioned to help you overcome your thorniest networking challenges. We understand the significant burden created by complex, time-consuming, and costly work-arounds – not to mention the distressing security trade-offs.
Our identity-based solution leverages the IETF-ratified Host Identity Protocol (HIP), an industry breakthrough for secure communications. With HIP, your devices can be identified using strong cryptographic identities, rather than an IPv4 or IPv6 address. This means your networked devices can change location yet retain their strong ‘verifiable’ cryptographic identity.
Our simple to use policy-based orchestration means anyone can manage IDN overlays. Our point-and-click orchestration tool sets and distributes network policies, making manual and tedious IP address management a thing of the past. It’s time to say good-bye to antiquated addressed-defined networking and welcome identity defined networking.
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
We help organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products.
We help customers protect their businesses and meet compliance needs. And all our customers benefit from the expertise of our threat analysts located around the world. Their research is at the heart of everything we do. They quickly find the latest threats and update protection for our customers automatically. Plus, our support engineers are experts on all our products, and they’re available whenever you need them.
We make our products easy to install and use so you spend less time managing security. With Sophos you can focus on the needs of your business because we’re securing your entire organization.
Session Four11:00 am - 11:30 am
For over a decade and thousands of terabytes uploaded, Nordic Backup has never a lost a single byte of customer data. We’ve restored thousands of computers and millions of files, getting businesses back up and running and individuals back to normal.
More than anything else, we believe that says who we are.
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Keynote Session12:00 pm - 12:45 pm
Keynote Details Coming Soon
Break12:45 pm - 1:15 pm
Break / Vendor Booth Time
Session Six1:15 pm - 1:45 pm
About Attivo Networks
Attivo Networks® is the leader in deception for cyber security defense. Founded in 2011, Attivo Networks provides a comprehensive deception platform that in real-time detects inside-the-network intrusions in networks, public and private data centers, and specialized environments such as Industrial Control System (ICS) SCADA, Internet of Things (IoT), and Point of Sale (POS) environments.
Founded on the premise that even the best security systems cannot prevent all attacks, Attivo provides the required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Unlike prevention systems, Attivo assumes the attacker is inside the network and uses high-interaction decoys and endpoint, server, and application deception lures placed ubiquitously across the network to deceive threat actors into revealing themselves.
Session Seven1:45 pm - 2:15 pm
Certificate Management Challenges and How to Overcome Them
Join Kyle Grueninger, Vice President of Sales, The SSL Store™ as he discusses the difficulties businesses face when managing SSL in this new era of data protection. “Certificate Management Challenges and How to Overcome Them” will highlight key factors contributing to the increase in SSL usage, recent real-life examples of certificate expirations and their business impact, common challenges companies must solve to efficiently manage SSL, operational consequences of SSL mis-management and what to look for in effective certificate management solutions.
For a copy of this presentation, please contact Kyle Grueninger @ kyle@theSSLstore.com.
Break2:15 pm - 2:30 pm
Break / Vendor Booth Time
Session Eight2:30 pm - 3:00 pm
About Vade Secure
Vade Secure has developed a full set of security features against the most sophisticated email scams such as phishing and spear phishing, malware and ransomware. As a Global company, protecting more than 500 million mailboxes worldwide, we have an accurate vision on worldwide email flow. This allows us to provide the comprehensive solution against all email threats, ensuring a zero-day protection, even on targeted attacks. Our solutions are tailored to deal with a large amount of emails to help ISPs, OEMs, hosting companies and Enterprises.
Session Nine3:00 pm - 3:30 pm
About Trend Micro
250+ million endpoints. 500,000+ companies worldwide. One security software company.
For over 30 years, Trend Micro’s unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats.
The depth of our experience remains unmatched. From the endpoint to the network to the cloud, we’ve got you covered with a connected threat defense recognized by analysts, customers, and industry gurus of all kinds.