Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS
Session One8:45 am - 9:15 am
About Carolinas IT
Since 1996, we’ve been supporting and guiding our clients to help them leverage technology to be more successful. Officially, we design, implement, and support business computer networking systems, but we understand that the most important aspect is exceeding your expectations every time you work with us. From cloud-based, fully outsourced and managed networks, to advanced technology projects and support, we will provide you with the same peace of mind that has our clients singing our praises.
Session Two9:15 am - 9:45 am
About Respond Software
Respond Software delivers instant ROI to organizations in their battle against cyber crime. With its patent-pending intelligent decision engine, PGO, Respond Software’s product uniquely combines the best of human expert judgement with the scale, thoroughness, and consistency of software. This quick-to-implement, cyber-security decision automation software delivers the equivalent of a virtual, best-of-breed analyst team that dramatically increases capacity and improves monitoring and triage capabilities at a fraction of the cost.
Respond Software was founded in 2016 by security and software industry veterans.
Session Three10:15 am - 10:45 am
About Tempered Networks
Our Proven Solution is Unlike Any Other
Originally developed for a global Fortune 50 manufacturer, our technology enabled the company to increase its competitive edge by modernizing their production network and increasing production output, while safeguarding them against cyber breaches. Today, IDN is available to the broader market and we’re uniquely positioned to help you overcome your thorniest networking challenges. We understand the significant burden created by complex, time-consuming, and costly work-arounds – not to mention the distressing security trade-offs.
Our identity-based solution leverages the IETF-ratified Host Identity Protocol (HIP), an industry breakthrough for secure communications. With HIP, your devices can be identified using strong cryptographic identities, rather than an IPv4 or IPv6 address. This means your networked devices can change location yet retain their strong ‘verifiable’ cryptographic identity.
Our simple to use policy-based orchestration means anyone can manage IDN overlays. Our point-and-click orchestration tool sets and distributes network policies, making manual and tedious IP address management a thing of the past. It’s time to say good-bye to antiquated addressed-defined networking and welcome identity defined networking.
Session Four10:45 am - 11:15 am
One Platform for IT Resilience — simple, scalable, and always available.
Successful businesses are embracing digital transformation – harnessing the power of technology to drive efficiencies, create new experiences, and ultimately beat the competition. These business leaders are relying on their IT organizations to make it happen. Challenged to maximize IT resources and faced with the complexity of protecting the business while modernizing and transforming, IT leaders are shifting to an IT resilience strategy. IT resilience is the ability to seamlessly adapt to new technology and drive IT transformation, while mitigating the risks of downtime, ensuring an always-on business and the best customer experience.
Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto combines disaster recovery, backup and cloud mobility in a simple, converged platform. With enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds.
Session Five11:45 am - 12:15 pm
We help organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products.
We help customers protect their businesses and meet compliance needs. And all our customers benefit from the expertise of our threat analysts located around the world. Their research is at the heart of everything we do. They quickly find the latest threats and update protection for our customers automatically. Plus, our support engineers are experts on all our products, and they’re available whenever you need them.
We make our products easy to install and use so you spend less time managing security. With Sophos you can focus on the needs of your business because we’re securing your entire organization.
Session Six12:30 pm - 1:00 pm
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions. Over 5,150 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio trust Okta to securely connect their people and technology.