Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS
Session One8:45 am - 9:15 am
About Respond Software
Respond Software delivers instant ROI to organizations in their battle against cyber crime. With its patent-pending intelligent decision engine, PGO, Respond Software’s product uniquely combines the best of human expert judgement with the scale, thoroughness, and consistency of software. This quick-to-implement, cyber-security decision automation software delivers the equivalent of a virtual, best-of-breed analyst team that dramatically increases capacity and improves monitoring and triage capabilities at a fraction of the cost.
Respond Software was founded in 2016 by security and software industry veterans.
Session Two9:15 am - 9:45 am
About Tempered Networks
Our Proven Solution is Unlike Any Other
Originally developed for a global Fortune 50 manufacturer, our technology enabled the company to increase its competitive edge by modernizing their production network and increasing production output, while safeguarding them against cyber breaches. Today, IDN is available to the broader market and we’re uniquely positioned to help you overcome your thorniest networking challenges. We understand the significant burden created by complex, time-consuming, and costly work-arounds – not to mention the distressing security trade-offs.
Our identity-based solution leverages the IETF-ratified Host Identity Protocol (HIP), an industry breakthrough for secure communications. With HIP, your devices can be identified using strong cryptographic identities, rather than an IPv4 or IPv6 address. This means your networked devices can change location yet retain their strong ‘verifiable’ cryptographic identity.
Our simple to use policy-based orchestration means anyone can manage IDN overlays. Our point-and-click orchestration tool sets and distributes network policies, making manual and tedious IP address management a thing of the past. It’s time to say good-bye to antiquated addressed-defined networking and welcome identity defined networking.
Session Three10:15 am - 10:45 am
About Axiad IDS
Headquartered in Santa Clara, CA with offices in Canada, and India, Axiad IDS is a Trusted Identity and Access solutions provider for enterprise, government and financial organizations.
The emergence of Axiad IDS as an important player in the Identity Assurance industry is the result of listening to the most critical needs of companies and recognizing that ID security – especially in our increasingly digital world – could no longer be addressed with a patchwork of heterogeneous technologies.
Our approach starts with what customers need from a security and business perspective; we then build solutions that address these needs to safely interact online, access information from anywhere and leverage today’s digital realities.
With Axiad IDS, companies get a single supplier providing an integrated solution without sacrificing security.
Session Four10:45 am - 11:15 am
People friendly. Enterprise tough.
We’re an enterprise SaaS solution that secures all distributed end-user data in our state-of-the-art cloud infrastructure.
Through continuous, automatic collection via a lightweight agent on the device, Code42 secures every file on Mac, Windows, and Linux laptops and desktops. Our platform enables IT, security, and business teams to limit risk, meet data privacy regulations, and recover from data loss, no matter the cause.
Session Five11:45 am - 12:30 pm
About Micro Focus
Micro Focus is uniquely positioned to help customers maximize existing software investments and embrace innovation in a world of hybrid IT—from mainframe to mobile to cloud.
We are one of the largest pure-play software companies in the world, focused from the ground up on building, selling, and supporting software. This focus allows us to deliver on our mission to put customers at the center of innovation and deliver high-quality, enterprise-grade scalable software that our teams can be proud of. We help customers bridge the old and the new by maximizing the ROI on existing software investments and enabling innovation in the new hybrid model for enterprise IT.
Session Six12:45 pm - 1:15 pm
We are a leader in the Gartner Magic Quadrant and the fastest-growing vendor in this space.
KnowBe4 is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering.
The KnowBe4 platform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Our goal was to design the most powerful, yet easy-to-use platform available. We have tens of thousands of customers worldwide.
Customers of all sizes can get the KnowBe4 platform deployed into production twice as fast as our competitors. Our Customer Success team gets you going in no time, without the need for consulting hours.
Session Seven1:15 pm - 1:45 pm
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions.
Over 5,150 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio trust Okta to securely connect their people and technology.
Session Eight2:00 pm - 2:30 pm
About Silent Break Security
Silent Break Security is a leading provider of penetration testing and information security services. Silent Break Security was built on the belief that organizations need custom, specialized information security services. Generic compliance and vulnerability testing was not getting the job done, and traditional risk assessments did not properly account for actual threats. Our goal is not to simply fulfill the engagement. Our goal is to help our clients successfully defend against attacks. To accomplish that goal, the traditional approach to securing organizations needed to change.