- This event has passed.
October 27, 2016 @ 8:15 am - 3:30 pm
The Boston Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech-Security Strategies Conference.
New England Sales Engineer
Stop Ransomware in its Tracks
Vice President of Sales
It’s broken – fix it! Database security and compliance in the modern world.
Description – Whilst we concentrate on the ever growing number of data breaches that are occurring today, we often overlook the huge numbers of records that are exposed. When we see thousands, hundreds of thousands or even millions of records quoted, we can be sure that somewhere, a database breach has occurred.
Why is this, when Database Security tools have been around for so long? Why are we still seeing our sensitive data successfully stolen for profit? Why don’t these toolsets support an Enterprises inevitable move to the Cloud?
This presentation will look at the problems with traditional database security tools and explain how utilizing a new approach can provide security for your most sensitive structured data, wherever it is hosted.
Regional Director, Eastern Region
Securing our connected Future by Staying one Step Ahead
Using and leveraging innovative and disruptive technologies can only happen in a highly secured environment. Learn how Prevention, Architecture and Extensibility are the keys to providing the most advanced cyber security. As the IT environment continues to evolve fast, and is now spreading into mobile, cloud and “internet of things”, your security must be One Step Ahead.
Business Development Manager- US/Canada
Protect Your DNS Services Against Security Threats
Think that a firewall is sufficient protection for your DNS servers? Think again. DDoS DNS attacks are on the rise, and a favorite target of hackers in order to extract sensitive customer data, passwords, and intellectual property. Existing solutions are not enough to protect against attacks, resulting in business downtime and brand reputation damage.
In this session, attendees will learn about:
- Applying DNS best practices and architecture designs
- Mitigating DNS malware
- Eliminating Single Point of Failure (SPOF)
Insiders Are The New Malware
Nearly every major security breach starts with an insider, or an attacker using an insider’s credentials.
2015 was a banner year for insider threats. It’s estimated that the average organization suffered from 3.8 insider attacks last year and 45% of businesses can’t tell if they’ve suffered a breach.
In order to combat the insider threat, organizations need to shift their focus from the perimeter to their data itself. They need to secure their data from the inside out.
Join us for a live presentation where you’ll learn our 3-phase Inside-Out approach for preventing insider threats.
Security analytics for Digital Resilience.
RedSeal provides a cybersecurity analytics platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives. RedSeal’s advanced analytics engine creates functioning network models, tests networks to identify security risks, Measure needed actions, and provides critical information to quickly Prioritize issues. The result: reduced cybersecurity risk and lower incident response and maintenance costs.
Director of nDiscovery, CISSP, MCSE
Forensics: More Than Just Hard Drives
Digital forensics has grown to far more than just hard drive forensic analysis. In this session, Ron Bernier, Director of nDiscovery at Sage Data Security, will review a variety of current techniques in forensic analysis. Ron will cover hard drive forensics, as well as the ever-important practice of proactive network forensics. Rapid detection and response is critical in today’s threat environment, and this session will introduce you to both pre- and post-incident forensics techniques.
Director & Chief Architect of nDiscovery
Ron Bernier manages Sage’s nDiscovery practice. As the program’s original technical architect, Ron designs, maintains, and develops all components of the nDiscovery log forensics service. He has over fifteen years of experience in community and international banks within the information technology arena, with expertise in network and security design as well as information security. Ron is a Certified Information Systems Security Professional (CISSP) and a Microsoft Certified Security Systems Engineer, MCSE/Security.
Security Practice Lead
“Modern IT Cybersecurity: Cyber Attacks, The Insider Threat and Emerging Vulnerabilities”
Topics covered will include the insider threat, ransomware and other destructive malware, and asymmetric cyber threats.
The Insider Threat
The term “insider threat” is thrown around a great deal in the security world without much clarity. It’s a great marketing buzzword, but what exactly is an “insider threat”? We will cover various examples and offer deeper insight on how to identify and mitigate this risk.
Ransomware and Destructive Malware
A look at the way malware has been successfully monetized and what you can do to minimize the chances your organization will become the next ‘held for ransom’ news headline.
Asymmetric Cyber Threats
The cyber battlefield is different. First, you don’t need a factory or a military base or physical materials. You don’t need the same sort of education, training, and expertise. All you need is a computer, Internet connection, and the time and patience to learn about software, hardware, and network vulnerabilities. We’ll cover modern cyber threats and how to mitigate risk.
Product Marketing Manager, BAE Systems
The Security Threat Landscape: Are you prepared to fight back?
The evolution of the threat landscape combined with today’s highly mobile and remote workforces have improved network efficiency and worker productivity, but also significantly increased network complexity and vulnerability. Cyber Criminals are capitalizing on trends like cloud computing, the social web, mobile computing, BYOD, and the resulting collapse of the network perimeter to exploit new attack vectors using highly sophisticated and automated techniques, unleashing drive-by and targeted zero-day attacks from virtually anywhere in the world. In the ever changing threat landscape it’s critical to business success to understand how to effectively defend and respond to these cyber attacks.
Tom Flynn is a Product Marketing Manager for BAE Systems’ with a focus on Managed Security Services. He has a wide range of technical and business experience to guide security products. Currently he is focusing on encouraging businesses ranging from SMB to Enterprise to enhance their security operations to satisfy their current need while developing their sophistication to adapt to the threat landscape, business requirement, and risk appetite.
Spikes Security was scheduled to speak, however, due to a conflict they are unable to attend. For more information about Spikes Security, please contact William Gardner at firstname.lastname@example.org.
Xirrus Networks was scheduled to speak today, however, due to a conflict they are unable to attend altogether. For more information about Xirrus Networks, please contact Lorna Pierno at Lorna.email@example.com or (805) 262-1652.
Vormetric is unable to speak today, however, you may stop by their table for more information.