Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Session One9:00 am - 9:30 am
About Carolinas IT
Since 1996, we’ve been supporting and guiding our clients to help them leverage technology to be more successful. Officially, we design, implement, and support business computer networking systems, but we understand that the most important aspect is exceeding your expectations every time you work with us. From cloud-based, fully outsourced and managed networks, to advanced technology projects and support, we will provide you with the same peace of mind that has our clients singing our praises.
Session Two9:30 am - 10:00 am
About Respond Software
Respond Software delivers instant ROI to organizations in their battle against cyber crime. With its patent-pending intelligent decision engine, PGO, Respond Software’s product uniquely combines the best of human expert judgement with the scale, thoroughness, and consistency of software. This quick-to-implement, cyber-security decision automation software delivers the equivalent of a virtual, best-of-breed analyst team that dramatically increases capacity and improves monitoring and triage capabilities at a fraction of the cost.
Respond Software was founded in 2016 by security and software industry veterans.
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
One Platform for IT Resilience — simple, scalable, and always available.
Successful businesses are embracing digital transformation – harnessing the power of technology to drive efficiencies, create new experiences, and ultimately beat the competition. These business leaders are relying on their IT organizations to make it happen. Challenged to maximize IT resources and faced with the complexity of protecting the business while modernizing and transforming, IT leaders are shifting to an IT resilience strategy. IT resilience is the ability to seamlessly adapt to new technology and drive IT transformation, while mitigating the risks of downtime, ensuring an always-on business and the best customer experience.
Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto combines disaster recovery, backup and cloud mobility in a simple, converged platform. With enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds.
Session Four11:00 am - 11:30 am
We help organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products.
We help customers protect their businesses and meet compliance needs. And all our customers benefit from the expertise of our threat analysts located around the world. Their research is at the heart of everything we do. They quickly find the latest threats and update protection for our customers automatically. Plus, our support engineers are experts on all our products, and they’re available whenever you need them.
We make our products easy to install and use so you spend less time managing security. With Sophos you can focus on the needs of your business because we’re securing your entire organization.
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Session Five12:00 pm - 12:30 pm
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions. Over 5,150 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio trust Okta to securely connect their people and technology.
Break12:30 pm - 12:45 pm
Break / Vendor Booth Time
Keynote Session12:45 pm - 1:30 pm
Keynote Details Coming Soon
Break1:30 pm - 1:45 pm
Session Seven1:45 pm - 2:15 pm
Security breaches, data leaks and email-based attacks are a real threat to your organization. Now, more than ever, you need a new approach to email security and management. Don’t let the limitations of traditional technologies prevent you from protecting email and corporate information.
We have made it our mission to mitigate the risks you face from email, and support you in reducing the cost and complexity of protecting yourself by moving this workload to the cloud. We live and breathe cloud technology. We developed our proprietary cloud architecture to offer you comprehensive email security, service continuity and archiving in a single subscription service. Our goal is to make it easier for you to protect your business in today’s fast-changing security and risk environment.
Session Eight2:15 pm - 2:45 pm
Certificate Management Challenges and How to Overcome Them
Join Kyle Grueninger, Vice President of Sales, The SSL Store™ as he discusses the difficulties businesses face when managing SSL in this new era of data protection. “Certificate Management Challenges and How to Overcome Them” will highlight key factors contributing to the increase in SSL usage, recent real-life examples of certificate expirations and their business impact, common challenges companies must solve to efficiently manage SSL, operational consequences of SSL mis-management and what to look for in effective certificate management solutions.
For a copy of this presentation, please contact Kyle Grueninger @ kyle@theSSLstore.com.
Break2:45 pm - 3:00 pm
Break / Vendor Booth Time
Session Nine3:00 pm - 3:30 pm
PacketViper is deception technology which solves important cybersecurity problems for our clients and produces practical, real-world results, including dynamic network defense, relief of security related operational costs and burdens, and 3rd party risk monitoring with policy enforcement. PacketViper produces relevant intelligence that is automatically applied and supports real-time policy enforcement. Our customers are in both the public and private sectors and cover multiple industries.
Session Ten3:30 pm - 4:00 pm
Sertainty enables you to build from a new foundation. Our technology makes it easy to configure and mix intelligence into ordinary data-files empowering its ability to act and react.
Sertainty shifts data control and risk mitigation from an indirect/re-active paradigm to a direct/active paradigm by driving governance, provenance and protection INTO YOUR DATA and technology solutions. We call this Data: Empowered.
Session Eleven4:00 pm - 4:20 pm
Markku Rossi brings close to 25 years of software engineering and architecture experience to the company. He is responsible for R&D and directs the company’s technology strategy. Markku has extensive knowledge and experience with SSH Communications Security products, having served the company from 1998 through 2005 as Chief Engineer and a major contributor to the SSH software architecture. Prior to rejoining the company in 2015, he co-founded several companies such as Codento and ShopAdvisor and served as CTO at Navicore and Chief Architect at Nokia. He has a Master of Science degree in Computer Science from Aalto University.
CISO Panel4:20 pm - 5:00 pm