Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session One8:45 am - 9:15 am
About Sentinel IPS
Network security isn’t just our business. It’s our passion.
The first iteration of Sentinel Intrusion Prevention Systems began in Dallas, Texas, in 1995, at the dawn of the World Wide Web. Although we started as web developers, we soon shifted our focus to network security, driven by the belief that everyone—and every sized company—has the fundamental right to be secure on the Internet. Small businesses, state and local government entities, and companies with lean IT departments that simply didn’t have the security expertise or the time to put one more thing on their already overflowing plates.
We couldn’t find an integrated solution that checked all the boxes, so, we assembled a team of innovators and developed our own.
Session Two9:15 am - 9:45 am
One Platform for IT Resilience — simple, scalable, and always available.
Successful businesses are embracing digital transformation – harnessing the power of technology to drive efficiencies, create new experiences, and ultimately beat the competition. These business leaders are relying on their IT organizations to make it happen. Challenged to maximize IT resources and faced with the complexity of protecting the business while modernizing and transforming, IT leaders are shifting to an IT resilience strategy. IT resilience is the ability to seamlessly adapt to new technology and drive IT transformation, while mitigating the risks of downtime, ensuring an always-on business and the best customer experience.
Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto combines disaster recovery, backup and cloud mobility in a simple, converged platform. With enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
InNet partners with customers to design, deploy, and support a full suite of advanced technology solutions focusing upon enterprise and mid-market IT organizations and assisting in regards to networks, information security, business continuity, storage, cloud migration, virtualization and performance monitoring. As one of the most trusted solution providers in the Central and Eastern USA, InNet brings many years of valuable experience from a myriad of customer perspectives working with leading enterprise and corporate customers to deliver technology that meets business objectives.
Session Four10:45 am - 11:15 am
Security breaches, data leaks and email-based attacks are a real threat to your organization. Now, more than ever, you need a new approach to email security and management. Don’t let the limitations of traditional technologies prevent you from protecting email and corporate information.
We have made it our mission to mitigate the risks you face from email, and support you in reducing the cost and complexity of protecting yourself by moving this workload to the cloud. We live and breathe cloud technology. We developed our proprietary cloud architecture to offer you comprehensive email security, service continuity and archiving in a single subscription service. Our goal is to make it easier for you to protect your business in today’s fast-changing security and risk environment.
Lunch11:15 am - 11:45 am
Break / Vendor Booth Time / Lunch
Keynote Session11:45 am - 12:45 pm
Special Agent Raymond MartinezFBI - San Antonio
Break12:45 pm - 1:00 pm
Break / Vendor Booth Time
Session Six1:00 pm - 1:30 pm
Founded in 1982, Symantec has evolved to become the global leader in cyber security, with more than 11,000 employees in more than 35 countries. Operating one of the world’s largest cyber intelligence networks, we see more threats, and protect more customers from the next generation of attacks. We help companies, governments and individuals secure their most important data wherever it lives.
Session Seven1:30 pm - 2:00 pm
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
8:15 am - 5:00 pm3233 NW Loop 410San Antonio, TX 78213210-377-3900