Loading Events

« All Events

San Diego

April 12 @ 8:15 am - 3:00 pm

Event Navigation

Details

Date:
April 12
Time:
8:15 am - 3:00 pm

Venue

Crowne Plaza Hotel
2270 Hotel Circle North
San Diego,CA92108United States
+ Google Map
Phone:
1-619-2971101
Website:
https://www.ihg.com/crowneplaza/hotels/us/en/san-diego/sancp/hoteldetail

Overview

The San Diego Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One
9:15am - 9:45amSession Two
9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 11:00amSession Three

A New Way to Look at IT Security with Endpoint Modeling

Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling results and visibility into all network Endpoint behavior. With great accuracy, extremely low noise, and supporting evidence, endpoint modeling discovers and tracks the regular behavior of each device in a way that makes possible the automatic recognition of potentially harmful activities. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others.

11:00am - 11:30amSession Four

Keep Ransomware Out.  How you can stop ransomware and exploits before they strike

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

·        Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
·        Detect: quickly and easily detect and isolate attacks
·        Respond: laser in on critical alerts and address them with simple to understand security intelligence

11:30am - 12:00pmBreak / Vendor Booth Time/Lunch
12:00pm - 12:30pmSession Five
12:30pm - 12:45pmBreak / Vendor Booth Time
12:45pm - 1:15pmSession Six

David Feinglass
Solutions Engineer

Speaker’s Bio:

David Feinglass has been involved in Disaster Recovery solutions engineering for 20 years, starting as a Solutions Engineer with Comdisco, and then SunGard.  David has a long track record of helping companies across every industry design, implement and test their Disaster Recovery and Business Continuity strategy and solutions.  At Latisys, a multi national managed hosting and cloud service provider, David helped architect the companies cloud based Disaster Recovery as a Service (DRaaS) offering.  In his current role as Solutions Engineer for Zerto in Southern California, David helps his clients understand the various options for protecting their critical infrastructure and applications, from not just physical and natural disasters, but also human created issues such as Ransom-ware.

1:15pm - 1:45pmSession Seven

If only there was a time machine for my data that would enable me to instantly go back in time to just one second before a ransomware attack. Check!

Through innovation, Reduxio has redefined the economics to achieve flash performance and reinvented data protection on primary storage, far exceeding anything available today. Learn how one can instantly recover data from any point in time and hear an anecdote about a Police Department who leveraged this functionality to recover from a ransomware attack. Reduxio drives efficiency in business processes and has fundamentally changed the way you manage and protect data.

1:45pm - 2:00pmBreak / Vendor Booth Time
2:00pm - 2:30pmSession Eight

Jason Georgi
Director, Value Management Office

 

Cloud Security for the Digital World

Even with a focus on business outcomes, many technology decisions are still made short-sided without ensuring the purchase is future-proof and modular enough to meet future needs. Cloud-based security has inherent flexibility that can meet security objectives while also enabling IT and business strategy.

2:30pm - 3:00pmSession Nine

Sponsors