Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session One8:45 am - 9:15 am
One Platform for IT Resilience — simple, scalable, and always available.
Successful businesses are embracing digital transformation – harnessing the power of technology to drive efficiencies, create new experiences, and ultimately beat the competition. These business leaders are relying on their IT organizations to make it happen. Challenged to maximize IT resources and faced with the complexity of protecting the business while modernizing and transforming, IT leaders are shifting to an IT resilience strategy. IT resilience is the ability to seamlessly adapt to new technology and drive IT transformation, while mitigating the risks of downtime, ensuring an always-on business and the best customer experience.
Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto combines disaster recovery, backup and cloud mobility in a simple, converged platform. With enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds.
Session Two9:15 am - 9:45 am
We help organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products.
We help customers protect their businesses and meet compliance needs. And all our customers benefit from the expertise of our threat analysts located around the world. Their research is at the heart of everything we do. They quickly find the latest threats and update protection for our customers automatically. Plus, our support engineers are experts on all our products, and they’re available whenever you need them.
We make our products easy to install and use so you spend less time managing security. With Sophos you can focus on the needs of your business because we’re securing your entire organization.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
Founded in 2002 and headquartered in Chicago, Nexum® takes a comprehensive approach to security. Nexum approaches business with one simple statement: “Do what’s right for the customer and success will follow.”
Nexum helps you mitigate risks, protect your data, increase business continuity and meet your unique business objectives by:
Detecting and preventing network threats, intrusions and disruptions
Equipping you with the information, tools, training and resources you need to effectively manage IT risk
Nexum, Latin for an arrangement by which one pledged one’s very liberty as security, Nexum is committed to ensuring your security. At Nexum, We Mean Security®.
Session Four10:45 am - 11:30 pm
About Arctic Wolf
Arctic Wolf was founded not just to make cybersecurity better, but to redefine it. Co-founders Brian NeSmith and Kim Tremblay realized that cybercriminals were innovating faster than the industry, and so a fundamentally new approach was needed. The answer to better cybersecurity is not buying and deploying the newest silver bullet solution but developing a complete program that can adapt to the ever-changing security landscape. Arctic Wolf partners with companies to do this by delivering a unique SOC-as-a-service that is tailored to fit exactly what each customer needs.
About Image Quest
ImageQuest is your premier technology services partner, providing comprehensive Managed IT, Compliance, and Cybersecurity services to clients in Tennessee, Kentucky and across the U.S. Our world-class team of savvy, experienced managers and engineers support your technology and help your organization thrive in a cyber-secure data environment.
Dynamic technology entrepreneur Milton Bartley co-founded ImageQuest in 2007, and it quickly became one of Nashville’s fastest-growing technology companies. ImageQuest delivers managed IT and managed IT compliance services to service-oriented, regulated businesses in the Nashville and Louisville markets that have a compliance or regulatory oversight component to their business. ImageQuest supports their service delivery with an in-house, state-of-the-art Network Operations Center (NOC) and Help Desk, operated by certified IT and security professionals.
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Keynote Session12:00 pm - 12:45 pm
Sheri DonahuePresident Emeritus, InfraGard National
Sheri is the President Emeritus of Infragard National. For over 27 years, she has held various roles within the military and civilian government related to protecting our national critical infrastructures. Recently she managed the cyber security strategic initiatives for Humana.
Sheri has served many years in non-profit leadership roles including 9 years on the National Board of InfraGard, followed by 3 years as the President of InfraGard, and currently serves on the KY InfraGard Board as Sector Chief Coordinator. She is on the Purdue Engineering Alumni Board of Directors and mentors engineering students. She often speaks on cyber security issues and the challenges of homeland security.
Break12:45 pm - 1:15 pm
Break / Vendor Booth Time
Session Six1:15 pm - 1:45 pm
About Attivo Networks
Attivo Networks® is the leader in deception for cyber security defense. Founded in 2011, Attivo Networks provides a comprehensive deception platform that in real-time detects inside-the-network intrusions in networks, public and private data centers, and specialized environments such as Industrial Control System (ICS) SCADA, Internet of Things (IoT), and Point of Sale (POS) environments.
Founded on the premise that even the best security systems cannot prevent all attacks, Attivo provides the required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Unlike prevention systems, Attivo assumes the attacker is inside the network and uses high-interaction decoys and endpoint, server, and application deception lures placed ubiquitously across the network to deceive threat actors into revealing themselves.
Session Seven1:45 pm - 2:15 pm
About Vade Secure
Vade Secure has developed a full set of security features against the most sophisticated email scams such as phishing and spear phishing, malware and ransomware. As a Global company, protecting more than 500 million mailboxes worldwide, we have an accurate vision on worldwide email flow. This allows us to provide the comprehensive solution against all email threats, ensuring a zero-day protection, even on targeted attacks. Our solutions are tailored to deal with a large amount of emails to help ISPs, OEMs, hosting companies and Enterprises.
Break2:15 pm - 2:30 pm
Break / Vendor Booth Time
Session Eight2:30 pm - 3:00 pm
Session Details Coming Soon
8:15 am - 5:00 pm280 W Jefferson StreetLouisville, KY 40202502-627-5045