Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Session One9:00 am - 9:30 am
One Platform for IT Resilience — simple, scalable, and always available.
Successful businesses are embracing digital transformation – harnessing the power of technology to drive efficiencies, create new experiences, and ultimately beat the competition. These business leaders are relying on their IT organizations to make it happen. Challenged to maximize IT resources and faced with the complexity of protecting the business while modernizing and transforming, IT leaders are shifting to an IT resilience strategy. IT resilience is the ability to seamlessly adapt to new technology and drive IT transformation, while mitigating the risks of downtime, ensuring an always-on business and the best customer experience.
Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto combines disaster recovery, backup and cloud mobility in a simple, converged platform. With enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds.
Session Two9:30 am - 10:00 am
We help organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products.
We help customers protect their businesses and meet compliance needs. And all our customers benefit from the expertise of our threat analysts located around the world. Their research is at the heart of everything we do. They quickly find the latest threats and update protection for our customers automatically. Plus, our support engineers are experts on all our products, and they’re available whenever you need them.
We make our products easy to install and use so you spend less time managing security. With Sophos you can focus on the needs of your business because we’re securing your entire organization.
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
About Attivo Networks
Attivo Networks® is the leader in deception for cyber security defense. Founded in 2011, Attivo Networks provides a comprehensive deception platform that in real-time detects inside-the-network intrusions in networks, public and private data centers, and specialized environments such as Industrial Control System (ICS) SCADA, Internet of Things (IoT), and Point of Sale (POS) environments.
Founded on the premise that even the best security systems cannot prevent all attacks, Attivo provides the required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Unlike prevention systems, Attivo assumes the attacker is inside the network and uses high-interaction decoys and endpoint, server, and application deception lures placed ubiquitously across the network to deceive threat actors into revealing themselves.
Session Four11:00 am - 11:30 am
Security breaches, data leaks and email-based attacks are a real threat to your organization. Now, more than ever, you need a new approach to email security and management. Don’t let the limitations of traditional technologies prevent you from protecting email and corporate information.
We have made it our mission to mitigate the risks you face from email, and support you in reducing the cost and complexity of protecting yourself by moving this workload to the cloud. We live and breathe cloud technology. We developed our proprietary cloud architecture to offer you comprehensive email security, service continuity and archiving in a single subscription service. Our goal is to make it easier for you to protect your business in today’s fast-changing security and risk environment.
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Keynote Session12:00 pm - 12:45 pm
Using DHS Resources to Build a Resilient Cyber Landscape
Resilience is the ability to remain viable and sustainable during times of stress. Identification of organizational resilience are expressed in protection and sustainment requirements. The Department of Homeland Security will describe their cybersecurity resources used to support organizations in identifying, defining, and measuring resiliency capabilities.
Ms. Gilbeau serves as Cybersecurity Advisor, Region IX, for the Division of the Cybersecurity and Infrastructure Security Agency (CISA). She supports the Department of Homeland Security (DHS) mission of strengthening the security and resilience of the nation’s critical infrastructure. She manages a program to coordinate cyber preparedness, risk mitigation and incident response, and provides cybersecurity resources, including assessments, to the nation’s 16 critical infrastructure sectors and state, local, tribal, and territorial government entities.
An experienced federal government employee for over 31 years, Ms. Gilbeau was previously the Chief of National Cyber Exercise and Planning Program (NCEPP) within the National Cybersecurity and Communications Integration Center (NCCIC). Operationally-focused, her team prepared partners to respond in a coordinated fashion to complex scenarios. Her diverse background includes capabilities honed in the Department of Defense (DoD): Army – Information Assurance Branch Chief and Command Privacy Official, Strategic Planner, Information Technology Manager, COOP Planner, and Program Analyst; Marine Corps – Regional Program Manager for Navy/Marine Corps Internet (NMCI) transition, Network Administrator and Program Manager; and Navy – Human Capital Manager, Budget Analyst and Network Administrator.
A graduate of Harvard’s Kennedy School, Senior Executive Fellows Program, Ms. Gilbeau holds a Computer Science degree and has the following certifications: CISM; GIAC; CEH; and Security+.
Break12:45 pm - 1:15 pm
Break / Vendor Booth Time
Session Six1:15 pm - 1:45 pm
Cybercrime Tactics and Techniques Report
A significant uptick in threats aimed at businesses were reported in Q1 2019 from the same time last year. Companies need to take control against these increases in cyberthreats by remediating at scale, quickly mitigating attack impacts through isolation, and proactively hunting for threats before they execute.
- Significant increases in overall threats, Emotet, ransomware, and its impact on your enterprise
- How Mac, mobile malware, and especially adware are on the rise
- User concern about the safety of their personal information, and how organizations are failing to protect their data
- What it takes to create a resilient enterprise
Malwarebytes’ Sr. Engineer, Ibrahim Al-Islam, possess over 30 years of professional experience in Information Technology, IT Security and Network Infrastructure. Worked in systems engineering roles for the world’s largest security and network infrastructure vendors, including McAfee Security, Cisco Systems, Juniper Networks, Blue Coat Systems and Ericsson. Supported both domestic and international Fortune 1-500 Enterprises, Service Providers and Federal DOD/Civilian Agencies (NIST 800-53/FISMA/FedRAMP) with their design and implementation of security and network infrastructure solutions.
Session Seven1:45 pm - 2:15 pm
A new approach to email security for Office 365
For hackers, Microsoft Office 365 is the new black! Because a simple set of Office 365 credentials can unlock a treasure trove of sensitive documents, applications and confidential business information, Office 365 is now the #1 target for cybercriminals looking to make a fast and healthy profit. Each day these hackers implement new and ever-more creative phishing and spear phishing attacks that easily bypass traditional email security solutions. Discover the latest threats and techniques, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
Trey King is a Solutions Architect with Vade Secure and has more than ten years in various aspects of security (systems, networking, software development, and email). He loves code, surfing, understanding things on a granular level to solve complex problems, and thinks he is funnier than he really is.
Break2:15 pm - 2:30 pm
Break / Vendor Booth Time
Session Eight2:30 pm - 3:00 pm
About Trend Micro
250+ million endpoints. 500,000+ companies worldwide. One security software company.
For over 30 years, Trend Micro’s unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats.
The depth of our experience remains unmatched. From the endpoint to the network to the cloud, we’ve got you covered with a connected threat defense recognized by analysts, customers, and industry gurus of all kinds.
8:30 am - 4:00 pm2001 Point West WaySacramento CA 95815916-929-8855