- This event has passed.
Salt Lake City
February 23 @ 8:15 am - 3:00 pm
The Salt Lake City Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Sr. Systems Engineer, PacNW
Unifying data protection, leveraging the power of the cloud
Keep Ransomware Out. How you can stop ransomware and exploits before they strike
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence
Senior Director, Technical Marketing
Next Generation Endpoint Protection
In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.
Senior Sales Engineer
Cyber Hunting on Steroids: How Machine Learning Accelerates Cyber-Hunting
No matter how well an organization is protected, a network breach will eventually occur. A talented, persistent group of hackers will eventually be able to bypass your prevention methods, given enough time.
The good news is that hackers always leave behind some faint traces that can be spotted and triaged. Automated hunting technologies, based on machine learning, make this approach accessible for any security team, at any size and with any level of skills.
Join our session to learn:
1 – The importance of implementing a proactive approach to security
2- The basics of cyber-hunting
3 – How machine learning makes cyber-hunting within reach
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Principal Product Manager
Defense in depth, sense in breadth
An effective security strategy requires an organization to balance the fundamental dichotomy of locking down an environment versus user freedom. Ivanti security delivers a defense in depth approach reducing the impact on the end user while implementing effective security controls.
Senior Product Marketing Manager
Explaining Bitcoins will be the easy part: Email Borne Attacks and How You Can Defend Against Them
National Channel Sales Director
Visibility isn’t enough! It takes Actionable Intelligence!!
Providing a cybersecurity analytics platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives. Our advanced analytics engine creates functioning network models, tests networks to identify security risks, Measure needed actions, and provides critical information to quickly Prioritize issues. The result: reduced cybersecurity risk and lower incident response and maintenance costs.
LogRhythm is unable to speak today, however, you can still stop by their table for more information.