Loading Events

« All Events

  • This event has passed.

Denver (Cybersecurity)

August 17 @ 8:15 am - 3:30 pm

Details

Date:
August 17
Time:
8:15 am - 3:30 pm
Event Category:

Overview

The Denver Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Daniel Budiansky
Sr. Systems Engineer, PacNW

Leverage the Cloud to Minimize the Impact of Ransomware

Download the Presentation

Speaker’s Bio:

After spending the first half of his career in IT, Daniel joined Data Domain in 2006, and has made data protection a core technical focus of his career ever since. Observing firsthand the transformative impact of the cloud, he joined Druva in 2016, and comes to us more excited then ever to bring Druva’s unified data protection solutions to our customers around the world. When away from work, he enjoys traveling with his wife, Mercy, and daughters: Havah (11) & Calliope (7), spending time with friends, and finding adventure in the great outdoors.

9:15am - 9:45amSession Two

Paul Zindell
Channel Sales Engineer

Synchronized Security

Security technologies are constantly evolving, but are they working together to respond to threats? Learn how Sophos defends your endpoints, data, and network and how the Synchronized Security platform enables immediate response.

Download the Presentation

Speaker’s Bio: 

Paul Zindell, Sales Engineer at Sophos, believes that security should be comprehensive, but also extremely reliable and easy to manage. With over 10 years in the security industry, working as a specialist for a large technology VAR and two well-known security manufacturers, he can provide the “insider” knowledge on security solutions.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Duncan McAlynn
Principal Engineer, Security Evangelist

Game of P0WN3Ds: Winter Has Come

Download the Presentation

10:45am - 11:15amSession Four

Mario Engelking 
Sales Director, Southwest Strategic Account

Digital Resilience requires a new approach. It takes actionable intelligence

Providing a cybersecurity analytics platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives Our advanced analytics engine creates functioning model so you can understand and continuously monitor your whole network. Measure resilience with your RedSeal Digital Resilience Score, you can measure, benchmark, and set targets to actively manage the digital resilience of your network and security infrastructure. Verify compliance by revealing configuration errors and discovering unintended access paths, the RedSeal security analytics platform helps you verify compliance with established operating standards, policies and regulations. Accelerate response to security incidents and network vulnerabilities.

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Kevin Kornblith
Sales Engineer

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Erich Kron

Surviving Social Engineering and Ransomware Attacks

Throwing money at a problem doesn’t make it go away. Social engineering methods and the ‘evil genius” cyber criminals behind the attacks are furiously innovating, keeping IT off-guard.

Attackers are moving their focus from attacking the hardened network perimeter to attacking your users. This has made Ransomware and CEO Fraud incidents skyrocket, costing billions of dollars in losses.

How do you keep up and what are the most effective methods for securing your organization to combat cybercrime? This presentation will cover the ransomware and CEO Fraud epidemics and proven methods of protecting your organization against these phishing-based attacks, like creating a “human firewall”.

Download the Presentation

1:00pm - 1:30pmSession Seven

Nate Traiser
Systems Engineer

 

The Enemy Within: Detecting and Mitigating Insider Threats

Ransomware is both scourge and savior. While it’s not typically considered an insider threat, it acts from the inside, using insider identities, encrypting files that insiders have access to on endpoints and file shares. Learn how organizations are using ransomware to identify and confront vulnerabilities that expose them to rogue employees, abusive administrators, and hackers.

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

Scott Taylor
Director of Solutions Engineering

Does Your Time to First Byte Bite?

Join Scott Taylor, Director of Solutions Engineering at Dyn as he provides a high level overview of DNS, the various multi-DNS configurations and how this layer of your infrastructure has everything to do with security. From DDoS to DNS amplification and reflection attacks, it’s all covered including strategies to mitigate, opportunities to architect infrastructure resiliency and tips to improve digital performance.

Download the Presentation

2:15pm - 2:45pmSession Nine

Evan Glaser
Cyber Security Account Executive

 

The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis.

Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, new ‘immune system’ technologies are capable of learning the ‘self’ of an organization. By analyzing every network, device, and user, and modeling them as they go about their day-to-day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behavior. It can therefore spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat.

Rules and signatures are not keeping pace with today’s rapidly evolving cyber attacks. The Enterprise Immune System represents a fundamental step-change in automated cyber defense, is relied upon by organizations around the world, and can cover up to millions of devices.

In this session, learn:

  • How new machine learning and mathematics are automating advanced cyber defense
  • Why 100% network visibility allows you to detect threats as they happen, or before they happen
  • How smart prioritization and visualization of threats allows for better resource allocation and lower risk
  • Real-world examples of unknown threats detected by ‘immune system’ technology”

Speaker’s Bio:

Evan Glaser is a Cyber Security Account Executive at Darktrace, the world’s leading machine learning company for cyber defense. He has worked extensively with clients across numerous industry verticals, from Finance to Oil & Gas helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autonomously responding to early-stage cyber-threats. Evan graduated with a bachelor’s degree from the University of Michigan and has been tasked with helping start Darktrace’s Denver office.

2:45pm - 3:00pmBreak / Vendor Booth Time
Prize Drawings for All in Attendance
3:00pm - 3:30pmSession Ten

Ryan Devendorf
Information Security Engineer

Known or Owned: Understanding Indicators of Compromise

When it comes to detecting breaches, time is of the essence. The longer a threat actor persists in your environment, the more likely they are to establish a foothold, and walk away with your data. Many attackers will follow a similar attack methodology from target to target, or for every attack they carry out for years. This talk will discuss common indicators of compromise, the value of your own threat intelligence, and how you can spot the unusual behavior that your AV, firewall, or IDS can’t.

Speaker’s Bio:

Ryan Devendorf is an Information Security Engineer for RSA Security’s threat detection division and teaches at RSA’s boot camps. Ryan has spoken at a number of security conferences including ISSA and (ISC)2. Prior to RSA, Ryan was a security professional for several universities along with a large healthcare company.

Prize Drawings for All in Attendance

Sponsors