Loading Events

« All Events

  • This event has passed.

Boston (Cybersecurity)

October 27, 2016 @ 8:15 am - 3:30 pm

Event Navigation


Boston Convention and Exhibition Center
415 Summer Street
Boston, 02210
United States
  + Google Map
(617) 954-2000

The Boston Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am-8:45am Check-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am-9:15am Session One

Chris Chaves
New England Sales Engineer

Stop Ransomware in its Tracks

Download the Presentation

9:15am-9:45am Session Two

Mark Fullbrook
Vice President of Sales

It’s broken – fix it!   Database security and compliance in the modern world.

Description – Whilst we concentrate on the ever growing number of data breaches that are occurring today, we often overlook the huge numbers of records that are exposed. When we see thousands, hundreds of thousands or even millions of records quoted, we can be sure that somewhere, a database breach has occurred.   

Why is this, when Database Security tools have been around for so long? Why are we still seeing our sensitive data successfully stolen for profit? Why don’t these toolsets support an Enterprises inevitable move to the Cloud?

This presentation will look at the problems with traditional database security tools and explain how utilizing a new approach can provide security for your most sensitive structured data, wherever it is hosted.

9:45am-10:15am Break/Vendor Booth Time
10:15am-11:00am Session Three

Mike Dube
Regional Director, Eastern Region

Securing our connected Future by Staying one Step Ahead

Using and leveraging innovative and disruptive technologies can only happen in a highly secured environment.  Learn how Prevention, Architecture and Extensibility are the keys to providing the most advanced cyber security. As the IT environment continues to evolve fast, and is now spreading into mobile, cloud and “internet of things”, your security must be One Step Ahead.

11:00am-11:30am Session Four

Ruby Grewal
Business Development Manager- US/Canada

Protect Your DNS Services Against Security Threats

Think that a firewall is sufficient protection for your DNS servers? Think again. DDoS DNS attacks are on the rise, and a favorite target of hackers in order to extract sensitive customer data, passwords, and intellectual property. Existing solutions are not enough to protect against attacks, resulting in business downtime and brand reputation damage.

In this session, attendees will learn about: 

  • Applying DNS best practices and architecture designs
  • Mitigating DNS malware
  • Eliminating Single Point of Failure (SPOF)

Download the Presentation

11:30am-12:00am Break/Vendor Booth Time/Lunch
12:00pm - 12:30pmSession Five

Christian Samuel

Insiders Are The New Malware

Nearly every major security breach starts with an insider, or an attacker using an insider’s credentials.

2015 was a banner year for insider threats. It’s estimated that the average organization suffered from 3.8 insider attacks last year and 45% of businesses can’t tell if they’ve suffered a breach.

In order to combat the insider threat, organizations need to shift their focus from the perimeter to their data itself. They need to secure their data from the inside out.

Join us for a live presentation where you’ll learn our 3-phase Inside-Out approach for preventing insider threats.

12:30pm-12:45pm Break/Vendor Booth Time
12:45pm-1:15pm Session Six

Jay Bromander

Security analytics for Digital Resilience.

RedSeal provides a cybersecurity analytics platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives. RedSeal’s advanced analytics engine creates functioning network models, tests networks to identify security risks, Measure needed actions, and provides critical information to quickly Prioritize issues. The result: reduced cybersecurity risk and lower incident response and maintenance costs.

1:15pm - 1:45pmSession Seven

Ron Bernier
Director of nDiscovery, CISSP, MCSE

Forensics: More Than Just Hard Drives

Digital forensics has grown to far more than just hard drive forensic analysis. In this session, Ron Bernier, Director of nDiscovery at Sage Data Security, will review a variety of current techniques in forensic analysis. Ron will cover hard drive forensics, as well as the ever-important practice of proactive network forensics. Rapid detection and response is critical in today’s threat environment, and this session will introduce you to both pre- and post-incident forensics techniques.

Download the Presentation

Speaker Bio:

Director & Chief Architect of nDiscovery

Ron Bernier manages Sage’s nDiscovery practice. As the program’s original technical architect, Ron designs, maintains, and develops all components of the nDiscovery log forensics service. He has over fifteen years of experience in community and international banks within the information technology arena, with expertise in network and security design as well as information security. Ron is a Certified Information Systems Security Professional (CISSP) and a Microsoft Certified Security Systems Engineer, MCSE/Security.

2:00pm - 2:15pmBreak / Vendor Booth Time
2:15pm-2:45pm Session Nine

Greg Arteen
Security Practice Lead

“Modern IT Cybersecurity: Cyber Attacks, The Insider Threat and Emerging Vulnerabilities”

Topics covered will include the insider threat, ransomware and other destructive malware, and asymmetric cyber threats.

The Insider Threat

The term “insider threat” is thrown around a great deal in the security world without much clarity. It’s a great marketing buzzword, but what exactly is an “insider threat”? We will cover various examples and offer deeper insight on how to identify and mitigate this risk.

Ransomware and Destructive Malware

A look at the way malware has been successfully monetized and what you can do to minimize the chances your organization will become the next ‘held for ransom’ news headline.

Asymmetric Cyber Threats

The cyber battlefield is different. First, you don’t need a factory or a military base or physical materials. You don’t need the same sort of education, training, and expertise. All you need is a computer, Internet connection, and the time and patience to learn about software, hardware, and network vulnerabilities. We’ll cover modern cyber threats and how to mitigate risk.

2:45pm-3:00pm Break/Vendor Booth Time
3:00pm-3:30pm Session Nine

Tom Flynn
Product Marketing Manager, BAE Systems

The Security Threat Landscape: Are you prepared to fight back?

The evolution of the threat landscape combined with today’s highly mobile and remote workforces have improved network efficiency and worker productivity, but also significantly increased network complexity and vulnerability. Cyber Criminals are capitalizing on trends like cloud computing, the social web, mobile computing, BYOD, and the resulting collapse of the network perimeter to exploit new attack vectors using highly sophisticated and automated techniques, unleashing drive-by and targeted zero-day attacks from virtually anywhere in the world. In the ever changing threat landscape it’s critical to business success to understand how to effectively defend and respond to these cyber attacks. 

Speaker Bio:

Tom Flynn is a Product Marketing Manager for BAE Systems’ with a focus on Managed Security Services. He has a wide range of technical and business experience to guide security products. Currently he is focusing on encouraging businesses ranging from SMB to Enterprise to enhance their security operations to satisfy their current need while developing their sophistication to adapt to the threat landscape, business requirement, and risk appetite.

Download the Presentation

Prize Drawings for All in Attendance

Spikes Security was scheduled to speak, however, due to a conflict they are unable to attend.  For more information about Spikes Security, please contact William Gardner at wgardner@spikes.com.

Xirrus Networks was scheduled to speak today, however, due to a conflict they are unable to attend altogether.  For more information about Xirrus Networks, please contact Lorna Pierno at Lorna.pierno@xirrus.com or (805) 262-1652.

Vormetric is unable to speak today, however, you may stop by their table for more information.