- This event has passed.
September 29, 2016 @ 8:15 am - 5:00 pm
The Montreal Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech-Security Strategies Conference.
Protecting your World from IoT to the Cloud
Targeted attacks, advanced persistent threats, multi-stage malware—cybercriminals continue to innovate, deceive, and ultimately breach organizations and their existing security solutions. As attacks become more and more advanced and the attack surface continues to expand your business needs cyber threat solutions that are Scalable, Aware, Secure, Actionable and Open. Join us to learn how the Fortinet Security Fabric provides pervasive and adaptive security from IoT to the Cloud and beyond.
Information Security Account Executive
Relevant Impact: Why Threat Risk Assessments
During this presentation, David Caron will discuss the business value of performing threat risk assessments. He will illustrate the differences between a business-based versus an asset-based threat risk assessment. The participants will leave with an understanding of the benefits created from contrasting and correlating threat, vulnerability and risk data and the value this brings to prioritizing investment in your security program.
President & Co-Founder
The Cost of Doing Business as Usual
Sr. Security Engineer
The string of attacks – the exploitation of technical flaws in favor of individual operations
Gartner calls it the “Post-infrastructure Era”. Advanced threats no longer target networks, servers or endpoints: they target users, the data they have access to, and the transactions they facilitate. In particular, security analysts and vendors all agree that email is the new #1 threat vector. Email-based attacks have become more targeted — and harder to detect with conventional tools. Even widespread attacks are challenging to identify and stop as they are short-lived, massive, and complex at the same time.
Email as a threat vector, or as part of a complex attack strategy, is a topic that is more relevant than ever as it evolves at a fast pace and keeps being very lucrative. And the stakes are high: financial fraud, identity theft, extortion, massive exfiltration of sensitive corporate or personal data.
During this session, you will learn:
- The tactics used by the attackers to break through the defenses.
- The social engineering tactics they use to get people to click on a link or execute a macro in an attachment (the Human Factor).
- The techniques used to block attacks before they reach their targets
The controls required for organizations to efficiently mitigate their risks
The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis.
Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, new ‘immune system’ technologies are capable of learning the ‘self’ of an organization. By analyzing every network, device, and user, and modeling them as they go about their day-to-day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behavior. It can therefore spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat.
Rules and signatures are not keeping pace with today’s rapidly evolving cyber-attacks. The Enterprise Immune System represents a fundamental step-change in automated cyber defense, is relied upon by organizations around the world, and can cover up to millions of devices.
In this session, learn:
- How new machine learning and mathematics are automating advanced cyber defense
- Why 100% network visibility allows you to detect threats as they happen, or before they happen
- How smart prioritization and visualization of threats allows for better resource allocation and lower risk
- Real-world examples of unknown threats detected by ‘immune system’ technology
Modeling Resilience – A militarized perspective to network and cyber security
Today’s networks and digital systems must mirror the “military sand table” for effective mission planning and educational purpose. Networks must become an ongoing model of visibility and understanding through quantifiable measurement; a living tract of landscape that lets you continuously and quickly grasp where your high value assets are, how they are at risk and prioritize real-time actionable intelligence of how they can be protected and what must be remediated first. Simply stated, “You can’t manage what you can’t measure”. In this presentation we will share and discuss insights on:
- State of the Nation – Current state, what we’re seeing, what we know
- What’s Next – What cyber chaos lies ahead
How Do We Win – Management through monitoring and measurement of implementation and design, the only way to win the war
Brian Durkin Senior Systems Engineer
You Have a Blind Spot – Exposing The Misuse of The Foundation of Online Security
Adversaries are outsmarting enterprise security strategies by exploiting the foundation of online security. Cyberthreats are becoming more complex and harder to detect. Intel predicts the next big hacker marketplace to be in the sale of digital certificates that are already selling for more than $1000 each on underground marketplaces. Gartner expects 50% of network attacks to use encrypted SSL/TLS in less than 2 years. 100% of organizations have responded to an attack that misuses keys and certificates in the last two years. And an alarming 54% of them can’t determine friend versus foe. What’s to do? The human immune system has evolved to defend and destroy complex and oftentimes overwhelming attacks. What can we learn from it? How can we create a future that’s more resistant as we use more software, more clouds, more apps, and more connected devices?
Manager of North America Channels
Half Protected is Half Not – Platform Approach to Securing Enterprise Identities
The world of Identity Management is dangerously fragmented and needlessly complex. Don’t settle for half a solution when you need full protection for both end users and privileged users.
Centrify secures enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.
In this session, we will discuss Centrify’s platform approach to securing enterprise identities and:
- Discover the new way to protect against the #1 point of attack in data breaches
- Defend both end users & privileged users with a single platform solution
- Centralize authentication, authorization, policy, and auditing for IT resources
- Establish Identity as the new perimeter across cloud, mobile, and data center.
CISSP / KeyData
Put Identity Management at the Center of Your Security Strategy
Corporate networks are disappearing and can no longer provide a safe perimeter for sensitive information. Cloud apps and mobile devices accelerate this trend by requiring that data be accessible to users anytime, anywhere. With the possibility of a data breach lurking, what steps can we take to up level IT security?
Join this session to hear about the 7 tenets of a successful identity and access management strategy. Doug MacPherson, SailPoint and Rosa Caputo, KeyData will define what identity governance is, explain the benefits of taking a governance-based approach and share their experience and best practices enabling customers to put identity at the center of their security strategy.
|PFU – Fujitsu was scheduled to speak today, however, due to a conflict they are unable to attend altogether. For more information about PFU – Fujitsu, please contact Carmine Clementelli at firstname.lastname@example.org, or (408) 992-2944.|