Loading Events

« All Events

New Jersey

March 9 @ 8:15 am - 5:00 pm

Details

Date:
March 9
Time:
8:15 am - 5:00 pm

Venue

Westin Princeton at Forrestal Village
201 Village Boulevard
Princeton,NJ08540United States
+ Google Map
Phone:
1-609-452-7900
Website:
http://www.starwoodhotels.com/westin/property/overview/index.html?propertyID=1440

Overview

The New Jersey Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One
9:15am - 9:45amSession Two

Juan Perez
Sr. Systems Engineer

Identifying Security Gaps

Exploring techniques for identifying architecture security gaps. A high-level review of current security technologies and understanding their strengths and limitations. Why behavior analytics, coupled with machine learning science offers the best approach in filling the security gap.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Tony Pepper
CEO

Securing your organization and containing the insider threat 

Despite increasing investment in the cybersecurity market, we continue to see a rise in data breaches and their related costs, specifically those relating to the insider threat (accidental loss and malicious insider). Despite these types of incidents contributing approximately 50% of all breaches, CIO focus remains on the external threat.

In this presentation, we will question whether a new approach to data security needs to be applied: one that recognizes data security can’t be tackled in silo and instead a holistic more strategic approach must be taken to protect and secure data throughout its lifecycle in order to contain the insider threat.

Speaker’s Bio:

Co-founder of Egress Software Technologies, Tony currently serves as CEO, overseeing all aspects of the business growth and innovation.

Prior to Egress, Tony held executive management positions at Reflex Magnetics, Pointsec Mobile Technologies, and Check Point Software Technologies. A frequent technology and industry speaker, Tony holds a Bachelor of Politics degree, a Software Engineering Master’s and is a certified BCS Fellow. Tony sits on industry committees including Intellect’s Government Management and Defence & Security Groups.

10:45am - 11:15amSession Four
11:15am - 11:45amBreak / Vendor Booth Time/Lunch
11:45am - 12:15pmSession Five
12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six
1:00pm - 1:30pmSession Seven

Anurag Singh
Channel Sales Engineer

Keep Ransomware Out.  How you can stop ransomware and exploits before they strike

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

·        Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
·        Detect: quickly and easily detect and isolate attacks
·        Respond: laser in on critical alerts and address them with simple to understand security intelligence

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:30pmSession Eight

John Chester
VP of Sales

Paul Troisi
Chief Customer Officer

A Layered Security Approach to Enterprise Mobility 

This session addresses the New Threat Vector of Mobile Security at the device, app, and network levels.  By having a layered security approach, your enterprise is able to secure enterprise data and employee privacy from mobile threats, have a 360° view of your threat environment, and leverage your EMM to realize full value.

2:30pm - 3:00pmSession Nine
3:00pm - 3:15pmBreak / Vendor Booth Time
3:15pm - 3:45pmSession Ten

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one.  Backup solutions don’t solve these problems as they are not true disaster recovery for the business.  What types of disasters will impact the business?  Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience.  Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

3:45pm - 4:15pmSession Eleven

Ed Lenehan
Channel Sales Manager

The Impact of DDoS Attacks

Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk.

Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.

4:15pm - 4:45pmSession Twelve
4:45pm - 5:15pmSession Thirteen

Sponsors