Loading Events

« All Events

  • This event has passed.

Boston (Cybersecurity)

October 12, 2017 @ 8:15 am - 5:00 pm

Event Navigation


October 12, 2017
8:15 am - 5:00 pm
Event Category:


Sheraton Boston Hotel
39 Dalton Street
Boston, MA 02199
United States
  + Google Map


The Boston Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Mike Malone
Sales Engineer

How to Choose Your Next Database Audit Solution

Data is the lifeblood of today’s business. As the volume of generated data continues to grow, so does the number of data breaches. It’s more critical than ever for organizations to adopt database audit and protection solutions. But not all solutions are created equal.

What are the key capabilities that IT and security teams should evaluate? Join Mike Malone as he discusses key considerations for selecting a database audit and protection solution.

9:15am - 9:45amSession Two

Danielle Wood
Director of Advisory Services

Enter The Graph – The Next Generation of Threat Handling

Download the Presentation

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

William Young
Global Security Architecture Team

Tipping the Security Scales – Designing Security Solutions that Close the Effectiveness Gap

Download the Presentation

10:45am - 11:15amSession Four

Tony Rock
Vice President of Business Development

Making Information Security Strategic through GRC

Cyber risk is not only a present danger, but it’s also overwhelming at most organizations. IT departments are inundated with vulnerabilities and unable to analyze them in a timely fashion. Meanwhile, the C-suite is clamoring for evidence to support their risk management decisions.

Governance, risk management, and compliance (GRC) processes allows organizations use cyber risk data strategically for both IT departments and the executive ranks. In this presentation, you’ll learn the areas GRC impacts and how one organization uses a GRC platform to prioritize vulnerabilities, while delivering visibility and accountability. Specifically, you’ll learn:

· The role of information security in your GRC program.
· How GRC processes can make your data actionable, driving better business decisions.
· How one organization employed GRC to strengthen its vulnerability management program.

Download the Presentation

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Mark Townsend
Vice President, Customer Engineering

The Foundation for Digital Resilience – A contextual understanding of risk – AT ALL TIMES

Providing a network modeling and risk scoring platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives. RedSeals advanced analytics engine creates a functioning model of your entire as built network so you can understand and continuously monitor your whole network, accelerate response to security incidents and network vulnerabilities. Measure resilience with your RedSeal Digital Resilience Score, benchmark, and set targets to actively manage the digital resilience of your network and security posture.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Ryan Fitzgibbon
Account Executive

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

1:00pm - 1:30pmSession Seven

Todd O’Boyle
Co-Founder & Chief Technology Officer

Attacker Tactics: How to Get Ahead

In this story-based talk, we’ll share examples of how we’ve all been attacked and then, based upon these stories, talk through ways we all can better protect ourselves. You’ll walk out of the talk with a plan you can use to facilitate cybersecurity awareness across your organization, including talking to your executive team about more resources. If you’d like to get ahead of the game, you can download our incident response plan for small and midsize businesses at http://info.strongarm.io/incident-response-plan/.

Download the Presentation

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:30pmSession Eight

Jonathan Lange
Executive Manager

Automating Endpoint Management:  Patching, Deployment and System Building made easy 

With increasing demands on IT Managers, new ways for handling security and user requirements are needed. This seminar will show you, how you can automate your patch management, drastically simplify system building, and find out about ways to enroll software while avoiding complex repackaging procedures – inside and outside of your network. 

This seminar will show you how you can innovatively automate and structure standard endpoint management tasks and improve security and compliance.

Download the Presentation

Speaker’s Bio:

Jonathan Lange is responsible for Sales in the US market. Having advised customers in various countries from small businesses to global enterprises, he is well aware of the challenges IT departments face today in order to keep their infrastructure up-to-date, safe and efficient. Specialized on efficient methods for endpoint management, he has an in-depth knowledge of the baramundi Management Suite and how it can benefit IT departments.

About baramundi software USA

baramundi software USA, Inc. provides companies and organizations with efficient, secure, and cross-platform management of workstation environments. Around the world, over 2,500 customers of all sizes and from every sector benefit from the independent German manufacturer’s many years of experience and outstanding products. These are compiled into an integrated, future-orientated unified endpoint management approach in the baramundi Management Suite: endpoint management, mobile device management, and endpoint security are provided via a shared interface, using a single database, and according to global standards.

2:30pm - 3:00pmSession Nine

David Hood
Director of Technology Marketing

 Explaining Bitcoins will be the easy part:  Email Borne Attacks and How You Can Defend Against Them

If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes.  If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.

In this session, you’ll learn:

  • How your email can be used as an entry point for multiple types of attack
  • The damaging impact attacks have on organizations
  • Why your employees could be the weakest link in your email security
  • How to enhance your email security and thus your overall cyber resilience

Download the Presentation

3:00pm - 3:15pmBreak / Vendor Booth Time
3:15pm - 4:00pmSession Ten

Sam McLane
Head of Security Engineering

Cybersecurity War Stories: Tales from the Trenches

In today’s world, it’s imperative for organizations of all sizes to succeed to have an online presence to succeed in business. But there’s a risk to always being connected—organizations are prime targets for cyber attacks. Recent ransomware strains like Petya and WannaCry demonstrate how business can be brought to a grinding halt by encrypting your business critical data.

Join the Head of Security Engineering at Arctic Wolf, Sam McLane, as he highlights some of the most interesting attacks that the team of AWN Concierge Security Engineers Arctic Wolf Networks has successfully hunted down in 2017. You’ll also hear why a robust SOC-as-a-service with human augmented machine learning is critical to bolster your defenses against the most advanced of threats.

Speaker’s Bio:

Sam McLane leads Security Engineering team at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for Blue Coat Systems’ Cloud Security Services as well as held various sales leadership roles. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the System Engineering team for the Eastern US. Prior to Lucent, Sam was a Networking Consultant at KPMG and Network Manager at Temple University. Sam holds a Master of Mathematics from Temple University and a Bachelor of Science in Mathematics from Washington and Lee University.

Prize Drawings for All in Attendance
4:00pm - 4:30pmSession Eleven

Todd LaPorte
Channel Account Manager

Reduce Risk Across Hybrid IT

Download the Presentation


Prize Drawings for All in Attendance
4:30pm - 5:00pmSession Twelve

Heather Howland
Vice President, Marketing

Putting Gartner’s CARTA Into Action to Prevent Insider Threats and Security Breaches

Changes in the IT and threat landscape are forcing a sea-change in security. Gartner’s new security framework CARTA (Continuous Adaptive Risk and Trust Assessment) is pushing organizations away from simple black-and-white views of security toward a model that accounts for a broad spectrum of risk and continuously adapts to change in real time. This goal makes obvious sense, but it can be easier said than done in the real world. In this session we will address some of the pitfalls and best practices for bringing a CARTA-style approach to your everyday security practice, including:

  • How to quantify risk in real time
  • Accounting for privileged users and accounts
  • Bringing users into the loop to deliver self-serve security
  • Finally, a policy framework for defining policies that combine identity, risk and behavior for ensuring security, while ensuring the business process is not disrupted
Prize Drawings for All in Attendance