Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session One8:45 am - 9:30 am
About Security Management Partners
Founded in 2001 and headquartered in Waltham, MA, Security Management Partners is a full-service IT assurance firm. We specialize in information security audits, assessments and regulatory compliance consulting for the corporate, healthcare, biopharma, and financial industries. As proven independent counsel to large global enterprises as well as small- to mid-sized businesses, SMP identifies threats and vulnerabilities, quantifies risks and provides remediation strategies for your information assets.
Our highly skilled IT security specialists maintain a singular focus to identify, test and provide concrete solutions that eliminate external and internal information security risks, while working in partnership with you to navigate today’s evolving regulatory compliance rules. SMP is 100% vendor-neutral, which means we do not push integration or managed services, sell hardware or software or act as resellers, which ensures complete objectivity in your IT security engagement.
Let us show you why hundreds of businesses have selected SMP as their cybersecurity provider of choice. We look forward to learning how we can help your organization advance its IT security, policies, practices and processes.
Session Two9:30 am - 10:00 am
About Respond Software
Respond Software delivers instant ROI to organizations in their battle against cyber crime. With its patent-pending intelligent decision engine, PGO, Respond Software’s product uniquely combines the best of human expert judgement with the scale, thoroughness, and consistency of software. This quick-to-implement, cyber-security decision automation software delivers the equivalent of a virtual, best-of-breed analyst team that dramatically increases capacity and improves monitoring and triage capabilities at a fraction of the cost.
Respond Software was founded in 2016 by security and software industry veterans.
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
Nyotron has turned the security paradigm upside down by focusing on the damage stage or the intended outcome behind the attack. Traditional as well as next-generation endpoint security technologies attempt to prevent attacker’s entry into the enterprise, whether at the perimeter or the endpoint, acting like gates that can be bypassed. We assume that given enough time targeted and unknown threats will bypass your existing security controls. Our engine has mapped legitimate operating system behavior, so when an attack attempts to delete, exfiltrate or encrypt files, we know the actions shouldn’t be allowed and stop the damage from executing.
Founded in 2012, Nyotron is headquartered in Santa Clara, CA with R&D in Israel. Nyotron has earned a top score of 5 stars from SC Magazine in its review of Endpoint Security Platforms, won GOLD in the 2017 IT World Awards for Endpoint Security and was designated as the 2017 HOT COMPANY in Endpoint Security by Cyber Defense Magazine.
Session Four11:00 am - 11:30 am
Chicago-based Vaporstream is an entrepreneurial technology company delivering secure communications for next generation business. Built by security, privacy and compliance experts – each with over 30 years of experience in the content management industry – we empower business professionals to communicate with confidence. By securely leveraging one of the most prominent 21st-century communication channels – text messaging – Vaporstream solutions enable your business to increase efficiency, automate workflows and improve business outcomes in a secure, compliant manner.
With privacy and security at the core of our mission, Vaporstream is driven to uniquely solve the business challenges created by smart phone and IoT technology while improving collaboration, decision making and engagement.
Keynote Lunch11:30 am - 12:15 pm
Keynote Details Coming Soon
Break12:15 pm - 12:30 pm
Session Five12:30 pm - 1:00 pm
Founded in 2002 and headquartered in Chicago, Nexum® takes a comprehensive approach to security. Nexum approaches business with one simple statement: “Do what’s right for the customer and success will follow.”
Nexum helps you mitigate risks, protect your data, increase business continuity and meet your unique business objectives by:
Detecting and preventing network threats, intrusions and disruptions
Equipping you with the information, tools, training and resources you need to effectively manage IT risk
Nexum, Latin for an arrangement by which one pledged one’s very liberty as security, Nexum is committed to ensuring your security. At Nexum, We Mean Security®.
Session Six1:00 pm - 1:30 pm
At CSPi we are committed to helping our customers meet some of computing’s most demanding performance, availability and security challenges.
Today’s security teams receive a great deal of real-time information and intrusion alerts, generated from their security equipment and tools; yet, the volumes of data make it make it nearly impossible for incident response teams to validate a data breach. With our Myricom nVoy Series solution we offer our customers a new approach to cyber threat identification and investigation – a rapid breach response solution that identifies alerts associated with a specific asset and provides an extraction of the entire set of conversations associated with that breach.This detailed data is crucial in performing timely and accurate analysis needed to comply with data-privacy regulations such as GDPR, PCI DSS, HIPPA, SOX, and 48 different U.S. state laws related to PII.
Break1:30 pm - 1:45 pm
Break / Vendor Booth Time
Session Seven1:45 pm - 2:15 pm
We are a leader in the Gartner Magic Quadrant and the fastest-growing vendor in this space.
KnowBe4 is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering.
The KnowBe4 platform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Our goal was to design the most powerful, yet easy-to-use platform available. We have tens of thousands of customers worldwide.
Customers of all sizes can get the KnowBe4 platform deployed into production twice as fast as our competitors. Our Customer Success team gets you going in no time, without the need for consulting hours.
Session Eight2:15 pm - 2:45 pm
About Array Networks
Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.
Proven at over 5000 worldwide customer deployments, Array is recognized by leading enterprises and service providers for next-generation technology that takes the guesswork out of NFV deployment and delivers agility at scale.
Break2:45 pm - 3:00 pm
Session Nine3:00 pm - 3:30 pm
About Nordic Backup
For over a decade and thousands of terabytes uploaded, Nordic Backup has never a lost a single byte of customer data. We’ve restored thousands of computers and millions of files, getting businesses back up and running and individuals back to normal.
More than anything else, we believe that says who we are.
Session Ten3:30 pm - 4:00 pm
We are a team of cybersecurity professionals changing how companies protect themselves from today’s—and tomorrow’s—phishing threats. Our mission: to protect organizations from the growing number of phishing attacks occurring outside of email throughout the Web.
Founded by Atif Mushtaq, lead architect of FireEye’s core malware detection technology, we are focused on the biggest vulnerability in cybersecurity: human fallibility. While OS emulation (sandboxing) addressed the .exe malware problem, SlashNext has pioneered the concept of Session Emulation to solve the HTML Attack problem presented by Web-based phishing.
Networking / Happy Hour5:00 pm - 6:00 pm