- This event has passed.
New York City (Cybersecurity)
October 12, 2016 @ 8:00 am - 5:15 pm
The New York City Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Patrick M. Hayes
Senior Vice President, Global Sales & Managing Director
Relevant Impact: Why Perform Threat Risk Assessments
During this presentation, Patrick Hayes will discuss the business value of performing threat risk assessments. He will illustrate the differences between a business-based versus an asset-based threat risk assessment. The participants will leave with an understanding of the benefits created from contrasting and correlating threat, vulnerability and risk data and the value this brings to prioritizing investment in your security program.
One Step Ahead of CYBER THREATS
Using and leveraging innovative and disruptive technologies can only happen in a highly secured environment. Learn how prevention and architecture are the keys to providing the most advanced cyber security. As the IT environment continues to evolve fast, and is now spreading into mobile, cloud and “internet of things”, your security must be One Step Ahead.
CTO & Founder
A New Way to Look at IT Security with Endpoint Modeling
Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling critical defense measures and visibility into endpoints and the network. With great accuracy, endpoint modeling discovers and tracks the role of each device in a way that emits actionable security intelligence when roles change in notable ways. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others.
Director of Ops and Support
Stop Juggling Cats: Email and File Transfer Security Tactics That Work
Security policies and tools aren’t worth their mettle if employees ignore them when sending sensitive info from their desktops. In this session, the secure data delivery experts at DataMotion will provide tactics to reduce the odds a rogue worker lands your org on the front page of the NY Times for a data breach (and your butt in a sling).
We will review four tactics to
- Minimize user error and omission
- Improve the recipient experience
- Make security part of the workflow
- Ensure a secure mobile experience
Channel Consulting Engineer – North America
International Channel Director
Security analytics for Digital Resilience.
RedSeal provides a cybersecurity analytics platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives. RedSeal’s advanced analytics engine creates functioning network models, tests networks to identify security risks, Measure needed actions, and provides critical information to quickly Prioritize issues. The result: reduced cybersecurity risk and lower incident response and maintenance costs.
VP Americas, Pre-Sales System Engineer
DNS and Data Exfiltration
DNS security, DNS data exfiltration, understanding what it is, how hackers get information out of your company, and what to do to stop it.
Victor Danevich is a Vice President at Infoblox where he manages the America’s Pre-Sales System Engineer team. He is an established Network Architect and Design Engineer with specialization in DNS, DHCP and IPAM (DDI) for large scale cloud and virtualization infrastructure technologies. His background and experience have helped hundreds of companies design and build highly secure DDI network services while reducing the risk and operational complexity. Prior to joining Infoblox, Mr. Danevich has held senior management positions at Storage Networks, International Network Services, Ernst & Young LLP, Harvard University and Lockheed Sanders.
Network Access Control (NAC) 101
Friend or Foe?
Mobile devices, cloud technology, IoT and virtual work alternatives have changed how organizations operate. With over 21 billion new devices accessing networks by 2020 according to Gartner, how can organizations prepare today for the increase in devices without undermining the security posture?
A strong perimeter defense no longer offers complete protection. Organizations need to address the entire security lifecycle to adequately protect digital assets and intellectual property, even as network access grows. This presentation will address the evolving security threat landscape, cover the three critical keys to network security – visibility, control and automated response, and provide tips and best practices to shrink your attack surface and secure your network now and for the future.
Your DDos Opportunity
Director of Product Marketing
Your Day Will Come:
Preparing for the Inevitable Breach with Proactive Incident Response
We all know that successful attacks are happening faster than ever before and they are more difficult to detect. A recent reports indicate that 90% of attackers compromise their target in days or less. Yet it takes on average 206 days to discover the attack. Even after discovery, it can take weeks to effectively respond. As guardians of valuable information assets, how do you close that window of exposure? Despite even the most robust fortress of traditional, signature-based security tools, security breaches seem more inevitable than ever. 43% of incident response engagements were a result of malware being missed by prevention tools. While important, endpoint defenses alone won’t prevent motivated attackers using modern malware and zero-day attacks. Giving up isn’t an option. Preparation and swift response is key in today’s environment. So what are you to do?
Carbonite was scheduled to speak today, however, due to a conflict they are unable to attend altogether. For more information about Carbonite, please contact Sara Harold at email@example.com, or (617) 927-1905.
Xirrus Networks was scheduled to speak today, however, due to a conflict they are unable to attend altogether. For more information about Xirrus Networks, please contact Lorna Pierno at Lorna.firstname.lastname@example.org or (805) 262-1652.
|Nexum, Inc. is unable to speak today, however, you can still stop by their table for more information.|