Data Connectors is proud to host the Cybersecurity Strategies Conference.
CHECK-IN AND OPENING INTRODUCTIONS8:15 am - 8:45 am
Session One8:45 am - 9:15 am
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 5,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions.
Over 5,150 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio trust Okta to securely connect their people and technology.
Session Two9:15 am - 9:45 am
Security breaches, data leaks and email-based attacks are a real threat to your organization. Now, more than ever, you need a new approach to email security and management. Don’t let the limitations of traditional technologies prevent you from protecting email and corporate information.
We have made it our mission to mitigate the risks you face from email, and support you in reducing the cost and complexity of protecting yourself by moving this workload to the cloud. We live and breathe cloud technology. We developed our proprietary cloud architecture to offer you comprehensive email security, service continuity and archiving in a single subscription service. Our goal is to make it easier for you to protect your business in today’s fast-changing security and risk environment.
Break9:45 am - 10:15 am
Break / Vendor Booth Time
Session Three10:15 am - 10:45 am
Sertainty enables you to build from a new foundation. Our technology makes it easy to configure and mix intelligence into ordinary data-files empowering its ability to act and react.
Sertainty shifts data control and risk mitigation from an indirect/re-active paradigm to a direct/active paradigm by driving governance, provenance and protection INTO YOUR DATA and technology solutions. We call this Data: Empowered.
Session Four10:45 am - 11:15 am
It all started when our founders, working for one of the most successful network security companies at that time, were frequently asked by customers how they should implement the same type of security in the cloud. This prompted the realization that the best security technologies for malware detection, data classification, encryption, user management, access control, and so much more already existed. Unfortunately, customers had no way to connect it to their SaaS applications in a unified way, with just a single click.
With that vision in mind, Avanan cloudified the security tools of the industry’s leading vendors and built a platform that could connect these tools to the most widely used enterprise SaaS applications. With everything virtualized, installing these tools on any SaaS is as easy as installing an app on a phone. By simply choosing the security tools from the Avanan security app store, customers can implement multiple security solutions across any or all of their SaaS applications.
Lunch11:15 am - 11:45 am
Break / Vendor Booth Time / Lunch
Keynote Session11:45 am - 12:45 pm
Keynote Details Coming Soon
Break12:45 pm - 1:00 pm
Break / Vendor Booth Time
Session Six1:00 pm - 1:30 pm
Proofpoint is a next-generation cybersecurity company that protects your people, data and brand against advanced threats and compliance risks. Built on the cloud and the world’s most advanced intelligence platform, our solutions help you effectively detect and block targeted attacks and respond quickly to suspected compromises.
• Every day, we detect and block advanced threats in more than 600 million emails, more than 7 million mobile
apps and hundreds of thousands of social media accounts.
• We help customers share large files securely and protect sensitive information as it’s sent, stored, and archived.
• More than half of the Fortune 100 trust Proofpoint to protect their business.