Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS
Session One8:45 am - 9:15 am
About Respond Software
Respond Software delivers instant ROI to organizations in their battle against cyber crime. With its patent-pending intelligent decision engine, PGO, Respond Software’s product uniquely combines the best of human expert judgement with the scale, thoroughness, and consistency of software. This quick-to-implement, cyber-security decision automation software delivers the equivalent of a virtual, best-of-breed analyst team that dramatically increases capacity and improves monitoring and triage capabilities at a fraction of the cost.
Respond Software was founded in 2016 by security and software industry veterans.
Session Two9:15 am - 9:45 am
About Oracle + Dyn
Oracle Corporation is an integrated technology company providing technology solutions for businesses worldwide. Oracle was founded by Larry Ellison and is led by CEOs Mark Hurd and Safra Catz.
Flexibility is vital to modern businesses. Customers are now digital natives and workforces are becoming increasingly mobile. Oracle provides businesses with an integrated range of applications, storage, databases, cloud technologies, and servers to help empower modern businesses.
Oracle technology has been used by more than 420,000 customers across 195 countries to accelerate their digital transformation. Oracle technology has been harnessed by industry leaders in fields such aerospace, insurance, retailers, SaaS providers, universities, and manufacturers.
On November 21, 2016, Oracle announced it had signed an agreement to acquire Dyn. “Dyn’s immensely scalable and global DNS is a critical core component and a natural extension to our cloud computing platform,” stated Thomas Kurian, President of Product Development at Oracle.
Dyn’s best-in-class DNS and email delivery solutions extend the Oracle cloud computing platform, providing enterprise customers with comprehensive solution for Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS).
Session Three10:15 am - 11:00 am
About Micro Focus
Micro Focus is uniquely positioned to help customers maximize existing software investments and embrace innovation in a world of hybrid IT—from mainframe to mobile to cloud.
We are one of the largest pure-play software companies in the world, focused from the ground up on building, selling, and supporting software. This focus allows us to deliver on our mission to put customers at the center of innovation and deliver high-quality, enterprise-grade scalable software that our teams can be proud of. We help customers bridge the old and the new by maximizing the ROI on existing software investments and enabling innovation in the new hybrid model for enterprise IT.
Session Four11:00 am - 11:30 am
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions. Over 5,150 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio trust Okta to securely connect their people and technology.
Keynote Session12:00 pm - 12:45 pmSupervisory Special Agent Justin M. ValleseFBI- Los Angeles
Justin M. Vallese is a Supervisory Special Agent with FBI Los Angeles who manages a computer intrusion squad comprised of Special Agents, Intelligence Analysts and Computer Scientists. This squad is responsible for conducting counterterrorism, counterintelligence and criminal computer intrusion investigations which impact the greater Los Angeles area. SSA Vallese is also responsible for outreach and liaison with private sector partners, as well as interfacing with the FBI’s Cyber Division. SSA Vallese has investigated and managed a variety of the most significant computer intrusion matters including an international hacker-for-hire conspiracy, celebrity hacking and stalking cases, a Chinese-government backed intrusion conspiracy which led to the arrest and US prosecution of Su Bin, the Sony Pictures intrusion, the WannaCry ransomware outbreak and a number of financial institution intrusions. Prior to his work in the cyber arena, SSA Vallese was assigned to work Financial Crimes, Internet Fraud, and Intellectual Property Rights investigations at the FBI Los Angeles.
Session Six1:00 pm - 1:30 pm
We are a team of cybersecurity professionals changing how companies protect themselves from today’s—and tomorrow’s—phishing threats. Our mission: to protect organizations from the growing number of phishing attacks occurring outside of email throughout the Web.
Founded by Atif Mushtaq, lead architect of FireEye’s core malware detection technology, we are focused on the biggest vulnerability in cybersecurity: human fallibility. While OS emulation (sandboxing) addressed the .exe malware problem, SlashNext has pioneered the concept of Session Emulation to solve the HTML Attack problem presented by Web-based phishing.
Session Seven1:30 pm - 2:00 pm
It all started when our founders, working for one of the most successful network security companies at that time, were frequently asked by customers how they should implement the same type of security in the cloud. This prompted the realization that the best security technologies for malware detection, data classification, encryption, user management, access control, and so much more already existed. Unfortunately, customers had no way to connect it to their SaaS applications in a unified way, with just a single click.
With that vision in mind, Avanan cloudified the security tools of the industry’s leading vendors and built a platform that could connect these tools to the most widely used enterprise SaaS applications. With everything virtualized, installing these tools on any SaaS is as easy as installing an app on a phone. By simply choosing the security tools from the Avanan security app store, customers can implement multiple security solutions across any or all of their SaaS applications.
Session Eight2:15 pm - 2:45 pm
Founded in 1982, Symantec has evolved to become the global leader in cyber security, with more than 11,000 employees in more than 35 countries. Operating one of the world’s largest cyber intelligence networks, we see more threats, and protect more customers from the next generation of attacks. We help companies, governments and individuals secure their most important data wherever it lives.
Session Nine3:00 pm - 3:30 pm
At Lepide, there may be more than 130 of us spread out over 3 continents, but it feels like a family. We truly believe that we understand the problems our customers are facing better than any other company; and we have been designing our award-winning solutions with these problems in mind. Let’s take you through our story and share some of the key moments that shaped the history of Lepide.
Session Ten3:30 pm - 4:00 pm
About SSH Communications Security
With our software solutions, companies can orchestrate & monitor privileged access to their mission-critical data and safeguard encrypted data whenever it is in transit.
SSH Communications Security is the market leader in developing advanced security solutions that enable, monitor and manage encrypted networks.
In 1995, the company’s founder, Tatu Ylönen, invented the Secure Shell protocol, which soon became the gold standard for data-in-transit security. Today Secure Shell is one of the most widely used protocols in the world and SSH Communications Security has grown to serve over 3,000 customers around the globe.
Throughout our history, we have developed leading edge security solutions that enable organizations to protect against a rapidly growing threat landscape that includes both internal and external actors. Our platform based approach to Secure Shell deployment and management provides the only solution on the market that addresses the need for security, compliance and operational efficiency in today’s complex enterprise environments.