Data Connectors is proud to host the Cybersecurity Strategies Conference.
8:15 am - 5:00 pm370 King Street WestToronto, ON M5V 1J9416-343-1234
CHECK-IN AND OPENING INTRODUCTIONS
Session One8:45 am - 9:15 am
At CSPi we are committed to helping our customers meet some of computing’s most demanding performance, availability and security challenges.
Today’s security teams receive a great deal of real-time information and intrusion alerts, generated from their security equipment and tools; yet, the volumes of data make it make it nearly impossible for incident response teams to validate a data breach. With our Myricom nVoy Series solution we offer our customers a new approach to cyber threat identification and investigation – a rapid breach response solution that identifies alerts associated with a specific asset and provides an extraction of the entire set of conversations associated with that breach.This detailed data is crucial in performing timely and accurate analysis needed to comply with data-privacy regulations such as GDPR, PCI DSS, HIPPA, SOX, and 48 different U.S. state laws related to PII.
Session Two9:15 am - 9:45 am
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions.
Over 5,150 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio trust Okta to securely connect their people and technology.
Session Three10:15 am - 10:45 am
ESET began life as a pioneer of antivirus protection, creating award-winning threat detection software.
Now, ESET’s goal is to make sure that everybody can enjoy the breathtaking opportunities that technology offers.
Today, our security solutions allow businesses and consumers in more than 200 countries and territories to make the most of the digital world.
Session Four10:45 am - 11:15 am
As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.
ManageEngine crafts comprehensive IT management software with a focus on making your job easier. Our 90+ products and free tools cover everything your IT needs, at prices you can afford.
From network and device management to security and service desk software, we’re bringing IT together for an integrated, overarching approach to optimize your IT.
Session Six1:00 pm - 1:30 pm
Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solutions. Malwarebytes completely replaces antivirus with artificial intelligence-powered technology that stops cyberattacks before they can compromise home computers and business endpoints. More than 60,000 businesses and millions of people worldwide trust and recommend Malwarebytes solutions.
Our team of threat researchers and security experts process emerging and established threats every day, from all over the globe. Founded in 2008, the company is headquartered in California, with offices in Europe and Asia.
Session Seven1:30 pm - 2:00 pm
CrowdStrike was founded in 2011 to fix a fundamental problem: The sophisticated attacks that were forcing the world’s leading businesses into the headlines could not be solved with existing malware-based defenses. Co-founders George Kurtz and Dmitri Alperovitch realized that a brand new approach was needed — one that combines the most advanced endpoint protection with expert intelligence to pinpoint the adversaries perpetrating the attacks, not just the malware.
Session Eight2:15 pm - 2:45 pmJimmy MillsGlobal, Pre-Sales Engineer Lead
About SSH Communications Security
With our software solutions, companies can orchestrate & monitor privileged access to their mission-critical data and safeguard encrypted data whenever it is in transit.
SSH Communications Security is the market leader in developing advanced security solutions that enable, monitor and manage encrypted networks.
In 1995, the company’s founder, Tatu Ylönen, invented the Secure Shell protocol, which soon became the gold standard for data-in-transit security. Today Secure Shell is one of the most widely used protocols in the world and SSH Communications Security has grown to serve over 3,000 customers around the globe.
Throughout our history, we have developed leading edge security solutions that enable organizations to protect against a rapidly growing threat landscape that includes both internal and external actors. Our platform based approach to Secure Shell deployment and management provides the only solution on the market that addresses the need for security, compliance and operational efficiency in today’s complex enterprise environments.
Session Nine3:00 pm - 3:30 pm
About Micro Focus
Micro Focus is uniquely positioned to help customers maximize existing software investments and embrace innovation in a world of hybrid IT—from mainframe to mobile to cloud.
We are one of the largest pure-play software companies in the world, focused from the ground up on building, selling, and supporting software. This focus allows us to deliver on our mission to put customers at the center of innovation and deliver high-quality, enterprise-grade scalable software that our teams can be proud of. We help customers bridge the old and the new by maximizing the ROI on existing software investments and enabling innovation in the new hybrid model for enterprise IT.
Session Ten3:30 pm - 4:00 pm
The Accellion secure file sharing and governance platform empowers millions of corporate executives, attorneys, healthcare providers, investment advisors, government agents, and other professionals all over the world to share sensitive information with external partners simply, securely, and in compliance.
When users click the Accellion button inside an email, mobile or enterprise app, they know it’s the simplest way to securely share sensitive information with the outside world. By giving users an easy, secure external communication channel, CISOs prevent data leaks, protect against malicious attacks, and eliminate shadow IT.
With on-premise, private cloud, hybrid and FedRAMP deployment options, the Accellion platform provides the security and governance CISOs need to protect their organizations, mitigate risk, and adhere to rigorous compliance regulations such as NIST 800-171, HIPAA, SOX, GDPR, GLBA, FISMA, and others.
Accellion’s solutions have been used by more than 25 million end users and have been installed at more than 3,000 of the world’s leading corporations and government agencies including NYC Health + Hospitals; KPMG; Kaiser Permanente; Latham & Watkins; National Park Service; Umpqua Bank; Cargill; and the National Institute for Standards and Technology (NIST).