- This event has passed.
New Jersey (Cybersecurity)
March 9 @ 8:15 am - 5:15 pm
The New Jersey Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech-Security Strategies Conference.
Data Storage & Security
Understand how your data storage systems helps or hinders your security objectives. Gain an understanding of storage technology security factors and how storage innovations can enhance your current data protection, provide constant RPOs, allow for immediate data recovery after data attacks, lower data management costs and improve service levels and compliance.
Sr. Systems Engineer
Identifying Security Gaps
Exploring techniques for identifying architecture security gaps. A high-level review of current security technologies and understanding their strengths and limitations. Why behavior analytics, coupled with machine learning science offers the best approach in filling the security gap.
Securing your organization and containing the insider threat
Despite increasing investment in the cybersecurity market, we continue to see a rise in data breaches and their related costs, specifically those relating to the insider threat (accidental loss and malicious insider). Despite these types of incidents contributing approximately 50% of all breaches, CIO focus remains on the external threat.
In this presentation, we will question whether a new approach to data security needs to be applied: one that recognizes data security can’t be tackled in silo and instead a holistic more strategic approach must be taken to protect and secure data throughout its lifecycle in order to contain the insider threat.
Co-founder of Egress Software Technologies, Tony currently serves as CEO, overseeing all aspects of the business growth and innovation.
Prior to Egress, Tony held executive management positions at Reflex Magnetics, Pointsec Mobile Technologies, and Check Point Software Technologies. A frequent technology and industry speaker, Tony holds a Bachelor of Politics degree, a Software Engineering Master’s and is a certified BCS Fellow. Tony sits on industry committees including Intellect’s Government Management and Defence & Security Groups.
Network Access Control (NAC) 101 – Transforming Network Security through Visibility, Control & Response
Mobile devices, cloud technology, IoT and virtual work alternatives have changed how organizations operate. With over 21 billion new devices accessing networks by 2020 according to Gartner, how can organizations prepare today for the increase in devices without undermining the security posture?
A strong perimeter defense is no longer sufficient to prevent cyber threats. Organizations need to address the entire security lifecycle to adequately protect digital assets and intellectual property, even as network access grows. This presentation will address the evolving security threat landscape, cover the three critical aspects of network security – visibility, control and automated response to augment existing security controls, and provide tips and best practices to shrink your attack surface and secure your network now and for the future.
Rapid Threat Containment:
Defending Against Ransomware
Regional Sales Director, Federal, Mid-Atlantic & Carolinas
Stop Attackers in their Tracks: How to Incorporate Smart Detection Strategies
Attackers leverage a variety of tools to break into networks and expand their footprint. LightCyber’s Behavioral Attack Detection platform educates you on the tools that are used to perform command and control, reconnaissance, lateral movement and data exfiltration. Using these tools, attackers can remain undetected for months.
Attend an informative presentation to gain a quantitative view of attack tools based on the findings from LightCyber’s Cyber Weapons Report. You’ll probably be surprised how little of the attack tools are malware.
During the session, LightCyber security expert, Steve Costolo will explain:
- The top malware, hacking, admin, and remote desktop tools associated with attacks and risky behavior
- How each type of attack tool maps back to stages in the Cyber Kill Chain
- How LightCyber Magna Behavioral Attack Detection can help you find active attackers in your network
Channel Sales Engineer
Keep Ransomware Out. How you can stop ransomware and exploits before they strike
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence
Anurag Singh, Sophos SE, 10+ years of experience specifically in IT Security.
A Layered Security Approach to Enterprise Mobility
This session addresses the New Threat Vector of Mobile Security at the device, app, and network levels. By having a layered security approach, your enterprise is able to secure enterprise data and employee privacy from mobile threats, have a 360° view of your threat environment, and leverage your EMM to realize full value.
Regional Sales Director – East
Next Generation Endpoint Protection
In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Channel Sales Manager
The Impact of DDoS Attacks
Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk.
Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.
Director of Customer Experience
We Lost the Battle Against Intrusions — Are We Left to Raise Our Hands in Defeat?
Enterprises are pouring billions of dollars into preventing threat actors from infiltrating the organization. Yet, the rising level of breaches shows that dedicated threat actors will penetrate the organization. Perhaps then the problem is not a technological one, but is rather one of strategy in dealing with cyber-threats?
In this session, we’ll propose a new defense approach. This strategy assumes that the environment is already compromised and focuses on preventing the real risk to the enterprise: the actual exfiltration and hijacking of data. We’ll show how adopting such a strategy enables organizations to streamline security and align with the business operations as they investigate and remediate a threat.
This session will discuss:
- New and effective strategies to combat today’s advanced threats;
- Removing the OpEx associated with security solutions;
- Real-life cases of successful enterprises challenging their security status quo.
Defense in depth, sense in breadth
An effective security strategy requires an organization to balance the fundamental dichotomy of locking down an environment versus user freedom. Ivanti security delivers a defense in depth approach reducing the impact on the end user while implementing effective security controls.