- This event has passed.
Chicago Suburbs (Cybersecurity)
December 14, 2016 @ 8:15 am - 5:00 pm
The Chicago Suburbs Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Security analytics for Digital Resilience
RedSeal provides a cybersecurity analytics platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives. RedSeal’s advanced analytics engine creates functioning network models, tests networks to identify security risks, Measure needed actions, and provides critical information to quickly Prioritize issues. The result: reduced cybersecurity risk and lower incident response and maintenance costs.
Regional Sales Director, Midwest
Unifying Data Protection & Lowering Data Risks by Leveraging the Cloud
With data growing in your organization unabated and increasingly becoming fragmented across end-user devices, cloud services and both physical and virtual server environments, the dark specter of data loss or exposure is very real and comes at a high business cost. IT teams are being forced to rethink how to best protect their data without compromising security, compliance or legal requirements. Organizations that can get a few steps ahead in identifying and remediating data risks before they become front page news will more effectively protect their enterprise from exposure and fines.
Join us for this session where we’ll discuss how modern cloud architecture is enabling new innovations for better utility of enterprise data, providing visibility, recoverability and governance capabilities for today’s data landscape, results unattainable with legacy, on premise approaches.
Joey Kilaita, Regional Sales Director, Chicago, grew up in the Druva HQ since it’s beginning stages. When Druva opened up a position in his hometown of Chicago he couldn’t resist. His expertise is around the mobile Enterprise, specifically around governance, data collection, and restore and led him to the top of the sales team within Druva. He and Bob Pawloski (his Sales Engineer) cover IL, IN, WI, MI, MO, MN, and IA. He is a huge San Jose Sharks and Golden State Warriors fan, so bonus points if you can relate!
Channel Account Executive
Channel Sales Engineer
Stopping Ransomware at the Door
Unsupervised Machine Learning: A New Approach to Cyber Defense
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’ They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why unsupervised machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
In this session, learn:
•How new machine learning and mathematics are automating advanced cyber defense
•Why full network visibility allows you to detect threats as or before they emerge
•How smart prioritization and visualization of threats allows for better resource allocation and lower risk
•Real-world examples of unknown threats detected by ‘immune system’ technology
Field Sales Manager
What your Top Cybersecurity Threats Have in Common
Cybercriminals have figured out how to monetize their malicious actions and they’re going after the opportunity with ferocity, targeting individuals and corporations alike. But what do these security threats have in common? Join this session to learn more about the top cybersecurity threats facing your organization, and how to block hackers from exploiting your weakest links.
Protecting the Foundation of Online Security
New threats target the trust provided by keys and certificates, and allow bad guys to look legitimate so they can surveil networks, stay undetected, steal data and bypass other security systems. Attacks using SSL/TLS to bypass critical controls is increasing, for instance. Gartner expects that by 2017, more than 50% of network attacks will use encrypted SSL/TLS. The ability to quickly decrypt and inspect SSL traffic in real time and detect threats is imperative.
Trust-based attacks range from exploits of accidental vulnerabilities, like Heartbleed, to APTs designed to circumvent and misuse keys and certificates like Mask, Crouching Yeti, and APT18—to name a few. It’s becoming mission critical to have visibility into and control of key and certificate inventories, enterprise wide, especially given most other IT security technologies depend on the trust they provide.
Rezaul Hasan is a security evangelist who is passionate about educating organizations and raising awareness around security best practices. For 15+ years, Rezaul has served as a Security Architect and a Sr. Security Systems Engineer, responsible for designing and baking security into a wide spectrum of telecommunications products and networks. He has deep industry experience in all domains of security. Rezaul currently works as a Senior Solutions Engineer guiding the largest enterprises in the world in better securing and protecting themselves, especially in the realm of digital keys & certificates.
Data where it should be Throwing conventional storage methods to the curb
Director of Sales
We Lost the Battle Against Intrusions — Are We Left to Raise Our Hands in Defeat?
Enterprises are pouring billions of dollars into preventing threat actors from infiltrating the organization. Yet, the rising level of breaches shows that dedicated threat actors will penetrate the organization. Perhaps then the problem is not a technological one, but is rather one of strategy in dealing with cyber-threats?
In this session, we’ll propose a new defense approach. This strategy assumes that the environment is already compromised and focuses on preventing the real risk to the enterprise: the actual exfiltration and hijacking of data. We’ll show how adopting such a strategy enables organizations to streamline security and align with the business operations as they investigate and remediate a threat.
This session will discuss:
· New and effective strategies to combat today’s advanced threats;
· Removing the OpEx associated with security solutions;
· Real-life cases of successful enterprises challenging their security status quo.
Director, Product Marketing
To SIEM or not to SIEM! Top 5 challenges of SIEM
No company is too small to get attacked. Most large companies protect their business & IT through comprehensive 24×7 security operations through SIEM. However, SIEM creates many other problems such as big data, cost, complexity, and frustration. Let’s find out if you really need a SIEM and what are the alternatives to build a SOC within the budget.
Sridhar Karnam is the Director of Product Marketing at Arctic Wolf Networks
Sri has more than a decade of experience in working with both NOC and SOC customers. He ran the product marketing at HP ArcSight for 5 years and IT operations for 3 years at HP Software.
Manager, Systems Engineering from Infoblox
Harness Context-Aware Security to Combat Threats