- This event has passed.
October 12, 2017 @ 8:15 am - 5:00 pm
The Boston Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
How to Choose Your Next Database Audit Solution
Data is the lifeblood of today’s business. As the volume of generated data continues to grow, so does the number of data breaches. It’s more critical than ever for organizations to adopt database audit and protection solutions. But not all solutions are created equal.
What are the key capabilities that IT and security teams should evaluate? Join Mike Malone as he discusses key considerations for selecting a database audit and protection solution.
Director of Advisory Services
Enter The Graph – The Next Generation of Threat Handling
Global Security Architecture Team
Tipping the Security Scales – Designing Security Solutions that Close the Effectiveness Gap
Vice President of Business Development
Making Information Security Strategic through GRC
Cyber risk is not only a present danger, but it’s also overwhelming at most organizations. IT departments are inundated with vulnerabilities and unable to analyze them in a timely fashion. Meanwhile, the C-suite is clamoring for evidence to support their risk management decisions.
Governance, risk management, and compliance (GRC) processes allows organizations use cyber risk data strategically for both IT departments and the executive ranks. In this presentation, you’ll learn the areas GRC impacts and how one organization uses a GRC platform to prioritize vulnerabilities, while delivering visibility and accountability. Specifically, you’ll learn:
· The role of information security in your GRC program.
· How GRC processes can make your data actionable, driving better business decisions.
· How one organization employed GRC to strengthen its vulnerability management program.
Vice President, Customer Engineering
The Foundation for Digital Resilience – A contextual understanding of risk – AT ALL TIMES
Providing a network modeling and risk scoring platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives. RedSeals advanced analytics engine creates a functioning model of your entire as built network so you can understand and continuously monitor your whole network, accelerate response to security incidents and network vulnerabilities. Measure resilience with your RedSeal Digital Resilience Score, benchmark, and set targets to actively manage the digital resilience of your network and security posture.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Co-Founder & Chief Technology Officer
Attacker Tactics: How to Get Ahead
In this story-based talk, we’ll share examples of how we’ve all been attacked and then, based upon these stories, talk through ways we all can better protect ourselves. You’ll walk out of the talk with a plan you can use to facilitate cybersecurity awareness across your organization, including talking to your executive team about more resources. If you’d like to get ahead of the game, you can download our incident response plan for small and midsize businesses at http://info.strongarm.io/incident-response-plan/.
Automating Endpoint Management: Patching, Deployment and System Building made easy
With increasing demands on IT Managers, new ways for handling security and user requirements are needed. This seminar will show you, how you can automate your patch management, drastically simplify system building, and find out about ways to enroll software while avoiding complex repackaging procedures – inside and outside of your network.
This seminar will show you how you can innovatively automate and structure standard endpoint management tasks and improve security and compliance.
Jonathan Lange is responsible for Sales in the US market. Having advised customers in various countries from small businesses to global enterprises, he is well aware of the challenges IT departments face today in order to keep their infrastructure up-to-date, safe and efficient. Specialized on efficient methods for endpoint management, he has an in-depth knowledge of the baramundi Management Suite and how it can benefit IT departments.
About baramundi software USA
baramundi software USA, Inc. provides companies and organizations with efficient, secure, and cross-platform management of workstation environments. Around the world, over 2,500 customers of all sizes and from every sector benefit from the independent German manufacturer’s many years of experience and outstanding products. These are compiled into an integrated, future-orientated unified endpoint management approach in the baramundi Management Suite: endpoint management, mobile device management, and endpoint security are provided via a shared interface, using a single database, and according to global standards.
Director of Technology Marketing
Explaining Bitcoins will be the easy part: Email Borne Attacks and How You Can Defend Against Them
If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes. If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Head of Security Engineering
Cybersecurity War Stories: Tales from the Trenches
In today’s world, it’s imperative for organizations of all sizes to succeed to have an online presence to succeed in business. But there’s a risk to always being connected—organizations are prime targets for cyber attacks. Recent ransomware strains like Petya and WannaCry demonstrate how business can be brought to a grinding halt by encrypting your business critical data.
Join the Head of Security Engineering at Arctic Wolf, Sam McLane, as he highlights some of the most interesting attacks that the team of AWN Concierge Security Engineers Arctic Wolf Networks has successfully hunted down in 2017. You’ll also hear why a robust SOC-as-a-service with human augmented machine learning is critical to bolster your defenses against the most advanced of threats.
Sam McLane leads Security Engineering team at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for Blue Coat Systems’ Cloud Security Services as well as held various sales leadership roles. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the System Engineering team for the Eastern US. Prior to Lucent, Sam was a Networking Consultant at KPMG and Network Manager at Temple University. Sam holds a Master of Mathematics from Temple University and a Bachelor of Science in Mathematics from Washington and Lee University.
Channel Account Manager
Reduce Risk Across Hybrid IT
Vice President, Marketing
Putting Gartner’s CARTA Into Action to Prevent Insider Threats and Security Breaches
Changes in the IT and threat landscape are forcing a sea-change in security. Gartner’s new security framework CARTA (Continuous Adaptive Risk and Trust Assessment) is pushing organizations away from simple black-and-white views of security toward a model that accounts for a broad spectrum of risk and continuously adapts to change in real time. This goal makes obvious sense, but it can be easier said than done in the real world. In this session we will address some of the pitfalls and best practices for bringing a CARTA-style approach to your everyday security practice, including:
- How to quantify risk in real time
- Accounting for privileged users and accounts
- Bringing users into the loop to deliver self-serve security
- Finally, a policy framework for defining policies that combine identity, risk and behavior for ensuring security, while ensuring the business process is not disrupted