October 12 @ 8:15 am - 5:00 pm
The Boston Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Automating Endpoint Management: Patching, Deployment and System Building made easy
With increasing demands on IT Managers, new ways for handling security and user requirements are needed. This seminar will show you, how you can automate your patch management, drastically simplify system building, and find out about ways to enroll software while avoiding complex repackaging procedures – inside and outside of your network.
This seminar will show you how you can innovatively automate and structure standard endpoint management tasks and improve security and compliance.
Jonathan Lange is responsible for Sales in the US market. Having advised customers in various countries from small businesses to global enterprises, he is well aware of the challenges IT departments face today in order to keep their infrastructure up-to-date, safe and efficient. Specialized on efficient methods for endpoint management, he has an in-depth knowledge of the baramundi Management Suite and how it can benefit IT departments.
About baramundi software USA
baramundi software USA, Inc. provides companies and organizations with efficient, secure, and cross-platform management of workstation environments. Around the world, over 2,500 customers of all sizes and from every sector benefit from the independent German manufacturer’s many years of experience and outstanding products. These are compiled into an integrated, future-orientated unified endpoint management approach in the baramundi Management Suite: endpoint management, mobile device management, and endpoint security are provided via a shared interface, using a single database, and according to global standards.
Director of Technology Marketing
Explaining Bitcoins will be the easy part: Email Borne Attacks and How You Can Defend Against Them
If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes. If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Head of Security Engineering
Cybersecurity War Stories: Tales from the Trenches
In today’s world, it’s imperative for organizations of all sizes to succeed to have an online presence to succeed in business. But there’s a risk to always being connected—organizations are prime targets for cyber attacks. Recent ransomware strains like Petya and WannaCry demonstrate how business can be brought to a grinding halt by encrypting your business critical data.
Join the Head of Security Engineering at Arctic Wolf, Sam McLane, as he highlights some of the most interesting attacks that the team of AWN Concierge Security Engineers Arctic Wolf Networks has successfully hunted down in 2017. You’ll also hear why a robust SOC-as-a-service with human augmented machine learning is critical to bolster your defenses against the most advanced of threats.
Sam McLane leads Security Engineering team at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for Blue Coat Systems’ Cloud Security Services as well as held various sales leadership roles. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the System Engineering team for the Eastern US. Prior to Lucent, Sam was a Networking Consultant at KPMG and Network Manager at Temple University. Sam holds a Master of Mathematics from Temple University and a Bachelor of Science in Mathematics from Washington and Lee University.