- This event has passed.
August 31, 2017 @ 8:15 am - 4:15 pm
The Sacramento Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Next- Gen Threats VS Next- Gen Security
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence
Dee Bhatia serves as territory manager covering the Northern California area for Sophos where he is responsible for territory go-to-market strategy, planning and marketing efforts for the all Sophos security related business. He has more than 15 years of IT and networks security industry experience working with enterprise and mid-market organizations as well as channel security partners.
Prior to joining Sophos, Dee has held similar roles focusing on security at SonicWALL and Dell.
Dee holds a master of business administration in technology management as well as a bachelor’s degree in bio-chemistry.
Rene Anthony Gonzalez
Sales Engineering Manager
Defense in depth, sense in breadth
An effective security strategy requires an organization to balance the fundamental dichotomy of locking down an environment versus user freedom. Ivanti security delivers a defense in depth approach reducing the impact on the end user while implementing effective security controls.
Director – Partners & Solutions Engineering
A New Way to Look at IT Security with Endpoint Modeling
Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling results and visibility into all network Endpoint behavior. With great accuracy, extremely low noise, and supporting evidence, endpoint modeling discovers and tracks the regular behavior of each device in a way that makes possible the automatic recognition of potentially harmful activities. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others.
The Enemy Within: Detecting and Mitigating Insider Threats
Ransomware is both scourge and savior. While it’s not typically considered an insider threat, it acts from the inside, using insider identities, encrypting files that insiders have access to on endpoints and file shares. Learn how organizations are using ransomware to identify and confront vulnerabilities that expose them to rogue employees, abusive administrators, and hackers.
Director, Product Management
Digital Resilience: A Better Cybersecurity Defense Strategy
Providing a cybersecurity analytics platform to Global 2000 organizations helps ensure network and business continuity and accelerates compliance initiatives. Our advanced analytics engine creates a networking model so you can understand and continuously monitor your whole hybrid data center (On-prem/SDN/Cloud). Measure resilience with your RedSeal Digital Resilience Score – you can measure, benchmark, and set targets to actively manage the digital resilience of your hybrid data center and security infrastructure. Verify compliance by revealing configuration errors and discovering unintended access paths. The RedSeal network modeling and risk scoring platform helps you verify compliance with established operating standards, policies and regulations. Accelerate response to security incidents and network vulnerabilities.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Don Rush has worked within the business continuity and disaster recovery space for more than 20 years. His experience comes from both being part of a staff responsible for ensuring successful IT recovery as well as being a trusted advisor for his customers.
Sr. Systems Engineer
Ripped From the Headlines: Ransomware Attack on a Police Department
While endpoint security, antivirus tools, user education and other tools and practice are critical to securing against ransomware / cryptolocker attacks, what do you do when an attack successfully penetrates these defenses? How do you recover the application and data, without paying the ransom? How much down time and data loss will you face?
Learn how the Reduxio solution recovers your data to a point you choose with minimal disruption, and how TimeOS on the HX-550 did it for-real in a true story that sounds like something from a TV show.
Peter Learmonth has 30 years of industry experience as an Instructor, Systems Engineer, Tech Marketing Engineer and Consulting Systems Engineer. US patent holder related to Virtual Machine cloning methodology and VMware Certified Professional 3, 4 and 5, he has presented at VMworld and other large Technical Forums. After almost 16 years at NetApp, he is currently Sr Systems Engineer for Reduxio in Northern California. He is married with 2 children, but still finds time to ski, jump out of airplanes and try not to crash his mountain bike. He earned his private pilot certificate in June 2016.
Cyber Intelligence Update
In this presentation, Carl Neidhardt will share the very latest in cyber intelligence and take attendees on a deep dive of what’s going on with today’s increasingly complex cyber attacks and how they can be prevented. Join this session to understand the impact of malware, propagation of attacks via exploit kits/botnets, forensics, anti-ransomware, phishing and the affect of Cloud on malware response.
Speaker Carl Neidhardt has worked in IT since 1986, for both the public and the private sector, including 10 years at Check Point Software. He holds a B.S. in Business Information Systems as well as the GIAC
Certified Incident Handler and ISC2 CISSP certifications. Carl is a regular presenter on security topics at local forums like the Cyber Security Symposium and the Sacramento ISSA Chapter.
Tas Jalali, Tenable
Sr. Channel Sales Engineer
Reducing Cyber Exposure for the Modern Attack Surface
The IT landscape today has a very different attack surface than the traditional data center. Modern assets like cloud instances, web-based applications, mobile devices, application containers, and others have different characteristics that can affect your security and risk management program if not managed appropriately. You may not think these modern assets affect you, but in this presentation, you’ll learn how common they are in organizations today and the impact they’re having on your attack surface.
Join us as we discuss:
- How the IT landscape is changing and how that creates a cyber exposure gap
- Who in the organization is impacted
- Techniques to reduce your cyber exposure
An accomplished IT security expert and technology leader with over seventeen years of experience, Jalali holds a strong track record of managing complex IT projects for large enterprises, government entities, and managed service providers. He guides organizations as they transform their security with a focus on data protection and infrastructure security. His specialties include: Strategy, Vision, Technology Risk Management, Cyber Security, Regulation, Compliance, Application Security, Architecture, Assessments, Policy, Awareness, Investigations, Security Operations, Vulnerability Management, Enterprise Security Monitoring, Incident Handling and Response, Cybersecurity frameworks – NIST 800-53, 800-190, 800-39, CSF, PCI, and SANS Top 20 Critical Controls.His specialties include: Strategy, Vision, Technology Risk Management, Cyber Security, Regulation, Compliance, Application Security, Architecture, Assessments, Policy, Awareness, Investigations, Security Operations, Vulnerability Management, Enterprise Security Monitoring, Incident Handling and Response, Cybersecurity frameworks – NIST 800-53, 800-190, 800-39, CSF, PCI, and SANS Top 20 Critical Controls.
Mr. Jalali has a Cybersecurity graduate certification from Harvard University, a B.E. in Engineering, and MBA in Technology Management. His certifications include CISSP, CISM, CEH, and SSCP, as well as past certifications for MCSE+I, CCNA, CCSE, CCSA, SNIFFER, GFW, TICSA, FCSE, and TIS. In addition, he is an active member of ISSA and International Information Systems Security Certifications Consortium (ISC)2.
Head of Product & Field Marketing
Reducing Data Breach Risk: Protecting Information Assets from Internal & External Threats
The number of significant data breaches are growing in size and frequency. Some of these are from internal sources while others are through targeted external Cyberattacks. The associated business risk is a growing concern for corporate boards with a recent survey finding over 82% of boards are concerned about Cybersecurity. From a planning perspective one must assume data breaches will occur in your organization. This session will examine methods to protect your information assets even after a breach.