Loading Events

« All Events

  • This event has passed.

New York City (Cybersecurity)

October 12, 2016 @ 8:00 am - 5:15 pm

Event Navigation

Venue

New York’s Hotel Pennsylvania
401 Seventh Avenue at 33rd Street
New York,NY10001United States  + Google Map
Phone:
212.736.5000
Website:
http://www.hotelpenn.com/

Overview

The New York City Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am-8:45am Check-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45-9:15Session One

Patrick M. Hayes
Senior Vice President, Global Sales & Managing Director

Relevant Impact: Why Perform Threat Risk Assessments

During this presentation, Patrick Hayes will discuss the business value of performing threat risk assessments. He will illustrate the differences between a business-based versus an asset-based threat risk assessment. The participants will leave with an understanding of the benefits created from contrasting and correlating threat, vulnerability and risk data and the value this brings to prioritizing investment in your security program.

9:15-10:00Session Two

Rick Crane
Area Manager

One Step Ahead of CYBER THREATS

Using and leveraging innovative and disruptive technologies can only happen in a highly secured environment.  Learn how prevention and architecture are the keys to providing the most advanced cyber security. As the IT environment continues to evolve fast, and is now spreading into mobile, cloud and “internet of things”, your security must be One Step Ahead.

10:00-10:30Break / Vendor Booth Time
10:30 - 11:15Session Three

Patrick Crowley
CTO & Founder

A New Way to Look at IT Security with Endpoint Modeling

Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling critical defense measures and visibility into endpoints and the network. With great accuracy, endpoint modeling discovers and tracks the role of each device in a way that emits actionable security intelligence when roles change in notable ways. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others.

11:15-11:30Break / Vendor Booth Time / Lunch
11:30 - 12:00Lunch
12:00-12:30Session Four

Matt Signorello
Director of Ops and Support

Stop Juggling Cats: Email and File Transfer Security Tactics That Work

Security policies and tools aren’t worth their mettle if employees ignore them when sending sensitive info from their desktops. In this session, the secure data delivery experts at DataMotion will provide tactics to reduce the odds a rogue worker lands your org on the front page of the NY Times for a data breach (and your butt in a sling).

We will review four tactics to

  • Minimize user error and omission
  • Improve the recipient experience
  • Make security part of the workflow
  • Ensure a secure mobile experience
12:30-1:00Break / Vendor Booth Time
1:00-1:30Session Five

Bill Totman
Channel Consulting Engineer – North America

Colm Foley
International Channel Director

Security analytics for Digital Resilience.

RedSeal provides a cybersecurity analytics platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives. RedSeal’s advanced analytics engine creates functioning network models, tests networks to identify security risks, Measure needed actions, and provides critical information to quickly Prioritize issues. The result: reduced cybersecurity risk and lower incident response and maintenance costs.

1:30-2:00Session Six

Victor Danevich
VP Americas, Pre-Sales System Engineer

DNS and Data Exfiltration

DNS security, DNS data exfiltration, understanding what it is, how hackers get information out of your company, and what to do to stop it.

Speaker Bio:

Victor Danevich is a Vice President at Infoblox where he manages the America’s Pre-Sales System Engineer team. He is an established Network Architect and Design Engineer with specialization in DNS, DHCP and IPAM (DDI) for large scale cloud and virtualization infrastructure technologies.  His background and experience have helped hundreds of companies design and build highly secure DDI network services while reducing the risk and operational complexity.  Prior to joining Infoblox, Mr. Danevich has held senior management positions at Storage Networks, International Network Services, Ernst & Young LLP, Harvard University and Lockheed Sanders.

2:00-2:15Break / Vendor Booth Time
2:15-2:45Session Seven

JR Jones
Sales Engineer

Network Access Control (NAC) 101

Friend or Foe?

Mobile devices, cloud technology, IoT and virtual work alternatives have changed how organizations operate. With over 21 billion new devices accessing networks by 2020 according to Gartner, how can organizations prepare today for the increase in devices without undermining the security posture?

 

A strong perimeter defense no longer offers complete protection. Organizations need to address the entire security lifecycle to adequately protect digital assets and intellectual property, even as network access grows. This presentation will address the evolving security threat landscape, cover the three critical keys to network security – visibility, control and automated response, and provide tips and best practices to shrink your attack surface and secure your network now and for the future. 

2:45-3:00Break / Vendor Booth Time
Prize Drawings for All in Attendance
3:00-3:30Session Eight

James Benanti

Your DDos Opportunity

Prize Drawings for All in Attendance
3:30-4:15Session Nine

Alan Hall
Director of Product Marketing

Your Day Will Come:

 Preparing for the Inevitable Breach with Proactive Incident Response

We all know that successful attacks are happening faster than ever before and they are more difficult to detect. A recent reports indicate that 90% of attackers compromise their target in days or less. Yet it takes on average 206 days to discover the attack. Even after discovery, it can take weeks to effectively respond. As guardians of valuable information assets, how do you close that window of exposure? Despite even the most robust fortress of traditional, signature-based security tools, security breaches seem more inevitable than ever. 43% of incident response engagements were a result of malware being missed by prevention tools. While important, endpoint defenses alone won’t prevent motivated attackers using modern malware and zero-day attacks. Giving up isn’t an option. Preparation and swift response is key in today’s environment. So what are you to do?

Prize Drawings for All in Attendance

Carbonite was scheduled to speak today, however, due to a conflict they are unable to attend altogether.  For more information about Carbonite, please contact Sara Harold at sharold@carbonite.com, or (617) 927-1905.

Xirrus Networks was scheduled to speak today, however, due to a conflict they are unable to attend altogether.  For more information about Xirrus Networks, please contact Lorna Pierno at Lorna.pierno@xirrus.com or (805) 262-1652.

Nexum, Inc. is unable to speak today, however, you can still stop by their table for more information.

Sponsors