- This event has passed.
February 2 @ 8:15 am - 3:00 pm
The Los Angeles Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Dir. of Sales, Western Region
Reduxio Storage: Destroy Ransomware, Destroy Storage Latency
The IT world is flooded with ransomware protection tools, but any time you install a new tool you can be sure a new ransomware technique was just deployed. Clearly, prevention is not enough. Unless you’re anxious to add bitcoin mining to your LinkedIn profile you need a way to mitigate ransomware. The FBI says, “a sound backup system may be the best way to get back to business should a ransomware attack occur.” We agree.
Imagine you had a magic wand that could rewind your data to the exact second before the attack. Reduxio Systems provides this time machine to completely eliminate the risk of ransomware. Please join us to learn about our Storage Magazine and VMworld Storage Product of the Year.
Network Access Control (NAC) 101 – Transforming Network Security through Visibility, Control & Response
Mobile devices, cloud technology,IoT and virtual work alternatives have changed how organizations operate. With over 21 billion new devices accessing networks by 2020 according to Gartner, how can organizations prepare today for the increase in devices without undermining the security posture?
A strong perimeter defense is no longer sufficient to prevent cyber threats. Organizations need to address the entire security lifecycle to adequately protect digital assets and intellectual property, even as network access grows. This presentation will address the evolving security threat landscape, cover the three critical aspects of network security – visibility, control and automated response to augment existing security controls, and provide tips and best practices to shrink your attack surface and secure your network now and for the future.
Head of Product Marketing
Stop Cyber Threats With Adaptive Micro-Segmentation
Virtualization, the cloud, and the promise of containers have evolved the data center, bringing better application delivery and cost reduction. With these benefits come new risks that include increased East/West traffic and the potential for new cyber threats. Adaptive micro-segmentation is transforming and improving security inside the data center and clouds while speeding up app delivery.
In this session you’ll learn:
– How adaptive micro-segmentation enables security anywhere (on premises, AWS, Azure, etc.) on anything (bare metal, vSphere/KVM/XEN, containers), while eliminating app delivery delays caused by traditional security approaches.
– How customers are using adaptive micro-segmentation to instantly protect high-value apps, separate dev from prod with one rule, take existing security policies to the cloud, and more.
– How live visibility of application traffic and dependencies is making security dead simple for IT operations and security teams.
As Illumio’s Head of Product Marketing, Chris Westphal is responsible for Product Marketing missions as well as technical marketing and technical evangelism. He has spent over 20 years of his career working on emerging products up and down the OSI stack, targeting customers from SMB to some of the largest .coms and service providers. Prior to Illumio, Chris held leading roles in product management and product marketing at Cisco, VMware, Citrix, Puppet and, most recently, at Adallom, a Cloud Access Security Broker (CASB), now part of Microsoft.
Channel Sales Engineer, Sales
Keep Ransomware Out. How you can stop ransomware and exploits before they strike
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence.
Nathan has been in the Network and Information Security industry for 20+ years, specializing in Internet and data security. Nathan joined Sophos in 2016 and is excited to be working with the latest in cutting edge information security.
Zerto’s Seamless Recovery — Even From Cryptolocker
Ransomware is now one of the biggest threats to your data. Nobody wants to be in a position of being locked out of all of your data and facing the prospect of having to pay a ransom or accept the impact of data loss and downtime by restoring from backups.
In this session you will learn how to configure your environment with Zerto to ensure you can recover the data from seconds before it was encrypted, minimizing the impact to the business by re-winding to a point in time before the ransomware infection existed. Zerto Virtual Replication (ZVR) integrates at the hypervisor level and causes no performance impact to the protected virtual machines. ZVR replicates without snapshots or agents, allowing for better performance and flexibility DR strategy in your vSphere environment. The virtual awareness understands the needs of resilience capabilities such as HA/DRS/VMotion/Storage VMotion/Storage DRS, etc. and continues replicating consistent data across the application virtual machine groupings.
• Securing & protecting your infrastructure
• Journaling to enable re-wind & recover
• Failover testing to isolated environments
• Recovering from the infection
• Best practices when recovering from ransomware
• Real-world customer story of using Zerto to recover from Cryptolocker
Chesed Patt is a veteran technology provider with 18 years of experience in a variety of disciplines including data storage, business process automation, security and virtualization software. He has provided these solutions from both the manufacture and integration perspective. Chesed is a proven expert in helping organizations be successful with their business continuity and disaster recovery initiatives.
IT and Information Security Risk Management for Competitive Advantage
Learn how companies are transforming their IT and Information Security Risk Management processes into programs that directly help them achieve their goals and beat their competition.
Visibility for the Enterprise Data Center
Today’s virtualized Enterprise data centers lack the IT tools necessary to correlate application to infrastructure performance in order to determine the Root Cause of application performance issues.
A Data Center’s infrastructure components – CPU, Memory, Network and Storage – may have their own management tools but these tools are incapable of providing visibility to the entire Virtual Environment or correlating that information back to a specific application’s performance. As a result, organizations lack the resources to quickly and efficiently perform Root Cause analysis and spend the majority of their valuable time engaged in reactive troubleshooting or inter-departmental finger pointing, rather than proactively improving application delivery.
Join us as we explore these challenges and present a more efficient approach enabling a 360 degree view of your Data Center Infrastructure.
Angelo is a 20 year veteran in the application, network, and virtualization performance industries. He’s held several positions ranging from QA, Technical Support, Product Management, Sales, Systems Engineering in companies such as Network General, Network Associates, ClearSight Networks, and Fluke Networks.
Regional Sales Manager
We Lost the Battle Against Intrusions — Are We Left to Raise Our Hands in Defeat?
Enterprises are pouring billions of dollars into preventing threat actors from infiltrating the organization. Yet, the rising level of breaches shows that dedicated threat actors will penetrate the organization. Perhaps then the problem is not a technological one, but is rather one of strategy in dealing with cyber-threats?
In this session, we’ll propose a new defense approach. This strategy assumes that the environment is already compromised and focuses on preventing the real risk to the enterprise: the actual exfiltration and hijacking of data. We’ll show how adopting such a strategy enables organizations to streamline security and align with the business operations as they investigate and remediate a threat.
This session will discuss:
- New and effective strategies to combat today’s advanced threats;
- Removing the OpEx associated with security solutions;
- Real-life cases of successful enterprises challenging their security status quo.
Securing the Digital Workplace: Adaptive Trust for Mobile and IOT
With users carrying both IT-managed and personal devices, and connecting from anywhere in the network whether wired or wireless to perform work related tasks, IT now has to deal with internal resources (engineering plans, HR information, sales data) being accessed making it onto smart phones, tablets and USB sticks.
Other issues include new threats due to malware specifically targeting mobile apps, zero day attacks being launched due to these apps being used in the office on a regular basis, and the fact that mobile devices are easily shared.
This session will be looking into these concerns and the technologies needed to address them.
A preview is listed here:
• Today’s changing market dynamics
• Top IT considerations
• Securing the evolving landscape
• Leveraging third party integrations