- This event has passed.
June 1 @ 8:15 am - 3:15 pm
The Anaheim Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech-Security Strategies Conference.
Channel Sales Engineer
Keep Ransomware Out. How you can stop ransomware and exploits before they strike
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence
Derek Snyder is a veteran in the IT industry. For the past 11 years Derek has worked exclusively in the IT security space providing threat analysis, design, implementation and training for IT security solutions. Derek understands the challenges that IT leaders and administrators face with the evolving complexity of networks and the complexity of the products meant to protect them. The solution to complexity is not more complexity! Derek currently serves as a Sales Engineer and Threat Analysis speaker for Sophos.
Sr. Regional Sales Director
Enterprise Solution Engineer
Next Generation Endpoint Protection
In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.
Sales Director, Southwest Strategic Account
Digital Resilience requires a new approach. It takes actionable intelligence
Providing a cybersecurity analytics platform to Global 2000 organizations helps ensure network and business continuity and accelerates compliance initiatives Our advanced analytics engine creates functioning model so you can understand and continuously monitor your whole network. Measure resilience with your RedSeal Digital Resilience Score, you can measure, benchmark, and set targets to actively manage the digital resilience of your network and security infrastructure. Verify compliance by revealing configuration errors and discovering unintended access paths, the RedSeal security analytics platform helps you verify compliance with established operating standards, policies and regulations. Accelerate response to security incidents and network vulnerabilities.
Dr. Torsten George
Vice President of Products and Global Marketing
A Blueprint for a Modern Enterprise Security Program
One of the biggest challenges in cyber security today is how to manage the volume, velocity, and complexity of data generated by the myriad of IT security tools. The feeds from these disconnected, siloed tools must be analyzed, normalized, and remediation efforts prioritized. The more tools, the more difficult the challenge. This security model requires legions of staff to comb through huge amounts of data to connect the dots and find the needle in the haystack. These efforts can take months, during which time attackers can exploit vulnerabilities and extract data. Rather than adding more tools, organizations need to implement a new, more efficient enterprise security model.
According to analyst firm Gartner, cyber risk management that uses intelligence-driven analytics can help organizations operationalize cyber security practices, break down silos, and enhance security operations tasks through automation. This presentation explores the emerging discipline of intelligence-driven cyber risk management as a response to the mounting cyber-attacks, advanced persistent threats, and insider leaks. It outlines not only today’s cyber security challenges, but provides practical advice of how to operationalize an organization’s cyber security practices across a growing attack surface.
Dr. Torsten George is Vice President of Products and Global Marketing at pro-active cyber risk management software vendor RiskSense. Torsten has more than 20 years of global information security experience. He is a frequent speaker on cyber security and risk management strategies worldwide and regularly provides commentary and byline articles for media outlets, covering topics such as data breaches, incident response best practices, and cyber security strategies. Torsten has held executive level positions with RiskVision (formerly Agiliance), ActivIdentity (now part of HID® Global, an ASSA ABLOY™ Group brand), Digital Link, and Everdream Corporation (now part of Dell).
West Coast Sales Director
Hacking Malware: How to Turn Evasive Malware Strengths into Weaknesses
Developing sophisticated attacks takes time and requires heavy investment. Attackers safeguard their methods by designing malicious software to remain unnoticed by security tools for as long as possible. This educational session discusses some of the common evasive techniques that malware authors incorporate into their creations. Moreover, it will also propose several approaches for turning such capabilities against malware to defend endpoints, turning adversaries’ strengths into weaknesses.
Director of Solutions Engineers
Does Your Time to First Byte Bite?
Join Scott Taylor, Director of Solutions Engineering at Dyn as he provides a high level overview of DNS, the various multi-DNS configurations and how this layer of your infrastructure has everything to do with security. From DDoS to DNS amplification and reflection attacks, it’s all covered including strategies to mitigate, opportunities to architect infrastructure resiliency and tips to improve digital performance.
Scott Taylor is the Director of Solutions Engineering at Dyn. He has been in the network and application performance space for over 15 years, with the last 4 of those years specializing in DNS and Internet analytics. His customer experience includes working with the top banks, social media companies and ecommerce sites.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Chesed Patt is a veteran technology provider with 18 years of experience in a variety of disciplines including data storage, business process automation, security and virtualization software. He has provided these solutions from both the manufacture and integration perspective. Chesed is a proven expert in helping organizations be successful with their business continuity and disaster recovery initiatives.
Securing Your Data from Ransomware and Other Threats
The WannaCry Ransomware attack was just the latest in an epidemic-level series of attacks over the last several years. In fact, in 2016, companies worldwide paid over $1 BILLION due to Ransomware attacks; when you include the cost of downtime caused by these attacks, the total loss to businesses is closer to $50 BILLION. 34% of victimized businesses reported losing revenue due to Ransomware, while 20% had to stop operations completely in the aftermath of a successful data breach. When it comes to a Ransomware attack, or any other type of data breach, the type of backup you have is critical. That’s why having a business continuity solution in place should be a top priority.
Technical Marketing Manager
What’s in your Digital Footprint? A Retrospective on Recent Bank Attacks and High-Profile Vulnerabilities
Organizations have spent massive amounts of money to protect the perimeter of their networks, but if your business exists on the internet, there really is no perimeter. Benjamin Powell, technical marketing manager at RiskIQ, will discuss recent attacks on internet-facing assets, such as those on Polish banks in February, as well as critical vulnerabilities that can turn web servers into your worst enemy, like the Apache Struts vulnerability in March. The speed of business and cyber crime isn’t slowing down, so how can you be prepared to address these types of threats? Attend our session to find out how.