Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Session One9:00 am - 9:30 am
About Tempered Networks
Our Proven Solution is Unlike Any Other
Originally developed for a global Fortune 50 manufacturer, our technology enabled the company to increase its competitive edge by modernizing their production network and increasing production output, while safeguarding them against cyber breaches. Today, IDN is available to the broader market and we’re uniquely positioned to help you overcome your thorniest networking challenges. We understand the significant burden created by complex, time-consuming, and costly work-arounds – not to mention the distressing security trade-offs.
Our identity-based solution leverages the IETF-ratified Host Identity Protocol (HIP), an industry breakthrough for secure communications. With HIP, your devices can be identified using strong cryptographic identities, rather than an IPv4 or IPv6 address. This means your networked devices can change location yet retain their strong ‘verifiable’ cryptographic identity.
Our simple to use policy-based orchestration means anyone can manage IDN overlays. Our point-and-click orchestration tool sets and distributes network policies, making manual and tedious IP address management a thing of the past. It’s time to say good-bye to antiquated addressed-defined networking and welcome identity defined networking.
Session Two9:30 am - 10:00 am
Nyotron has turned the security paradigm upside down by focusing on the damage stage or the intended outcome behind the attack. Traditional as well as next-generation endpoint security technologies attempt to prevent attacker’s entry into the enterprise, whether at the perimeter or the endpoint, acting like gates that can be bypassed. We assume that given enough time targeted and unknown threats will bypass your existing security controls. Our engine has mapped legitimate operating system behavior, so when an attack attempts to delete, exfiltrate or encrypt files, we know the actions shouldn’t be allowed and stop the damage from executing.
Founded in 2012, Nyotron is headquartered in Santa Clara, CA with R&D in Israel. Nyotron has earned a top score of 5 stars from SC Magazine in its review of Endpoint Security Platforms, won GOLD in the 2017 IT World Awards for Endpoint Security and was designated as the 2017 HOT COMPANY in Endpoint Security by Cyber Defense Magazine.
Break10:00 am - 10:30 am
Break / Vendor Booth Time
Session Three10:30 am - 11:00 am
We help organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products.
We help customers protect their businesses and meet compliance needs. And all our customers benefit from the expertise of our threat analysts located around the world. Their research is at the heart of everything we do. They quickly find the latest threats and update protection for our customers automatically. Plus, our support engineers are experts on all our products, and they’re available whenever you need them.
We make our products easy to install and use so you spend less time managing security. With Sophos you can focus on the needs of your business because we’re securing your entire organization.
Session Four11:00 am - 11:30 am
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
Lunch11:30 am - 12:00 pm
Break / Vendor Booth Time / Lunch
Keynote Session12:00 pm - 12:45 pm
Keynote Details Coming Soon
Break12:45 pm - 1:15 pm
Break / Vendor Booth Time
Session Six1:15 pm - 1:45 pm
Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solutions. Malwarebytes completely replaces antivirus with artificial intelligence-powered technology that stops cyberattacks before they can compromise home computers and business endpoints. More than 60,000 businesses and millions of people worldwide trust and recommend Malwarebytes solutions. Our team of threat researchers and security experts process emerging and established threats every day, from all over the globe. Founded in 2008, the company is headquartered in California, with offices in Europe and Asia.
Session Seven1:45 pm - 2:15 pm
Sertainty enables you to build from a new foundation. Our technology makes it easy to configure and mix intelligence into ordinary data-files empowering its ability to act and react.
Sertainty shifts data control and risk mitigation from an indirect/re-active paradigm to a direct/active paradigm by driving governance, provenance and protection INTO YOUR DATA and technology solutions. We call this Data: Empowered.
Break2:15 pm - 2:30 pm
Break / Vendor Booth Time
Session Eight2:30 pm - 3:00 pm
The Vera Platform gives developers the power to build advanced data security and control into any business application, extending protections beyond the borders of an organization. Leverage our SDK and REST APIs to encrypt, track, and revoke access to files, and give your security team complete visibility over how confidential information is used, and the tools to manage access anywhere it travels.
Session Nine3:00 pm - 3:20 pm
Protecting Your Digital Supply Chain
The Zero Trust Imperative of Third-Party Risk
It’s been estimated that more than 60% of the most severe breaches in recent years were a result of compromised third party suppliers, customers, and partners. The overwhelming need to share critical business information across the extended enterprise combined with a complete lack of control over third party security creates a fragmented and exponentially expanding threat surface that permeates the digital supply chain of every industry. In 2019, there is no such thing as a trusted third party. How do you protect your business, when you don’t know who you can trust?
CISO PANEL3:30 pm - 4:30 pm
Secrets of Superstar CISO Success
CISOs aren’t born, they’re made. And tested. Constantly. With obligations like protecting employees and digital assets from data breaches, and demonstrating compliance with a daunting number of internal policies and industry regulations, CISOs have a lot on their plate. So, what’s the secret to CISO success? Similarly, what differentiates a strategic CISO from a tactical CISO?
This panel, “Secrets of Superstar CISO Success,” will seek to answer these questions with perspectives on:
- How to prepare today for the threats of tomorrow
- Charting a security strategy that protects and supports the business
- How to earn a seat at the executive table
- What you know now that you wish you knew then
We hope you’ll join us for this informative and enlightening panel.