Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS
Session One8:45 am - 9:15 am
About IP Pathways
IP Pathways believes capital investments in technology should help businesses grow revenue, increase customer satisfaction, drive efficiencies, lower costs and create a competitive advantage. At IP Pathways, our mission is to be an expert provider of hybrid IT solutions by delivering world-class engineering services supported by high-touch customer service.
We were founded on a simple philosophy—do whatever it takes for the customer. We do this using a simple formula—deliver best-in-class technology and focus on the customer.
IP Pathways provides IT hardware and software, data center, cloud, professional and managed services, and hybrid IT solutions to small, medium-sized and enterprise customers throughout the Midwest. Our award-winning engineering team architects, implements, monitors, supports and manages private and hybrid cloud solutions for your data center, our data center or any data center. Named by CRN Magazine in 2015 as one of the 250 most certified, 500 largest and 100 fastest growing IT service providers in North America, IP Pathways helps IT move at the speed of business.
Session Two9:15 am - 9:45 am
About Critical Start
Critical Start is the fastest-growing cybersecurity integrator in North America. Our mission is simple: protect our customers’ brands and reduce their business risk. We do this for organizations of all sizes through our award-winning portfolio of end-to-end security services – from security-readiness assessments using our proven framework (the Defendable Network) to the delivery of managed detection and response, incident response, professional services, and product fulfillment.
Critical Start has been named to the CRN 2018 Tech Elite 250 and top 100 Security MSPs lists.
Session Three10:15 am - 10:45 am
About Respond Software
Respond Software delivers instant ROI to organizations in their battle against cyber crime. With its patent-pending intelligent decision engine, PGO, Respond Software’s product uniquely combines the best of human expert judgement with the scale, thoroughness, and consistency of software. This quick-to-implement, cyber-security decision automation software delivers the equivalent of a virtual, best-of-breed analyst team that dramatically increases capacity and improves monitoring and triage capabilities at a fraction of the cost.
Respond Software was founded in 2016 by security and software industry veterans.
Session Four10:45 am - 11:15 am
About Tempered Networks
Our Proven Solution is Unlike Any Other
Originally developed for a global Fortune 50 manufacturer, our technology enabled the company to increase its competitive edge by modernizing their production network and increasing production output, while safeguarding them against cyber breaches. Today, IDN is available to the broader market and we’re uniquely positioned to help you overcome your thorniest networking challenges. We understand the significant burden created by complex, time-consuming, and costly work-arounds – not to mention the distressing security trade-offs.
Our identity-based solution leverages the IETF-ratified Host Identity Protocol (HIP), an industry breakthrough for secure communications. With HIP, your devices can be identified using strong cryptographic identities, rather than an IPv4 or IPv6 address. This means your networked devices can change location yet retain their strong ‘verifiable’ cryptographic identity.
Our simple to use policy-based orchestration means anyone can manage IDN overlays. Our point-and-click orchestration tool sets and distributes network policies, making manual and tedious IP address management a thing of the past. It’s time to say good-bye to antiquated addressed-defined networking and welcome identity defined networking.
Session Five11:45 am - 12:15 pm
We help organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products.
We help customers protect their businesses and meet compliance needs. And all our customers benefit from the expertise of our threat analysts located around the world. Their research is at the heart of everything we do. They quickly find the latest threats and update protection for our customers automatically. Plus, our support engineers are experts on all our products, and they’re available whenever you need them.
We make our products easy to install and use so you spend less time managing security. With Sophos you can focus on the needs of your business because we’re securing your entire organization.