Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS
Session One8:45 am - 9:15 am
About Respond Software
Respond Software delivers instant ROI to organizations in their battle against cyber crime. With its patent-pending intelligent decision engine, PGO, Respond Software’s product uniquely combines the best of human expert judgement with the scale, thoroughness, and consistency of software. This quick-to-implement, cyber-security decision automation software delivers the equivalent of a virtual, best-of-breed analyst team that dramatically increases capacity and improves monitoring and triage capabilities at a fraction of the cost.
Respond Software was founded in 2016 by security and software industry veterans.
Session Two9:15 am - 9:45 am
We help organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products.
We help customers protect their businesses and meet compliance needs. And all our customers benefit from the expertise of our threat analysts located around the world. Their research is at the heart of everything we do. They quickly find the latest threats and update protection for our customers automatically. Plus, our support engineers are experts on all our products, and they’re available whenever you need them.
We make our products easy to install and use so you spend less time managing security. With Sophos you can focus on the needs of your business because we’re securing your entire organization.
Session Three10:15 am - 10:45 am
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions.
Over 5,150 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio trust Okta to securely connect their people and technology.
Session Four10:45 pm - 11:15 pm
About Silent Break Security
Silent Break Security is a leading provider of penetration testing and information security services. Silent Break Security was built on the belief that organizations need custom, specialized information security services. Generic compliance and vulnerability testing was not getting the job done, and traditional risk assessments did not properly account for actual threats. Our goal is not to simply fulfill the engagement. Our goal is to help our clients successfully defend against attacks. To accomplish that goal, the traditional approach to securing organizations needed to change.
Session Six1:00 pm - 1:30 pm
About OneNeck IT Solutions
At OneNeck® IT Solutions, our commitment is to be an expert provider of hybrid IT solutions tailored for mid-market and enterprise companies and to provide high-touch customer service. Through a single point of accountability, OneNeck offers end-to-end, enterprise-class IT solutions, including cloud and hosting solutions, managed services, enterprise application management, professional services, IT hardware and top tier data centers.
Session Seven1:30 pm - 2:00 pm
About Attivo Networks
Attivo Networks® is the leader in deception for cyber security defense. Founded in 2011, Attivo Networks provides a comprehensive deception platform that in real-time detects inside-the-network intrusions in networks, public and private data centers, and specialized environments such as Industrial Control System (ICS) SCADA, Internet of Things (IoT), and Point of Sale (POS) environments.
Founded on the premise that even the best security systems cannot prevent all attacks, Attivo provides the required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Unlike prevention systems, Attivo assumes the attacker is inside the network and uses high-interaction decoys and endpoint, server, and application deception lures placed ubiquitously across the network to deceive threat actors into revealing themselves.
Session Eight2:15 pm - 2:45 pm
The Vera Platform gives developers the power to build advanced data security and control into any business application, extending protections beyond the borders of an organization. Leverage our SDK and REST APIs to encrypt, track, and revoke access to files, and give your security team complete visibility over how confidential information is used, and the tools to manage access anywhere it travels.
Session Nine3:00 pm - 3:30 pm
Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solutions. Malwarebytes completely replaces antivirus with artificial intelligence-powered technology that stops cyberattacks before they can compromise home computers and business endpoints. More than 60,000 businesses and millions of people worldwide trust and recommend Malwarebytes solutions. Our team of threat researchers and security experts process emerging and established threats every day, from all over the globe. Founded in 2008, the company is headquartered in California, with offices in Europe and Asia.