- This event has passed.
April 12 @ 8:15 am - 3:00 pm
The San Diego Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Director of Security Product Strategy
Mind the Gaps: Leveraging “Security as a Service” to Gain Cyber Advantage”
Alex Knight has spent his career in the high-tech sector, with more recent focus on product management and product strategy for multi-national managed services providers. As Director of Security Product Strategy at ControlScan, Alex leads the company’s Managed Security Services strategy to service midmarket businesses across multiple verticals. Alex is proud to be a part of the high-growth tech scene in Atlanta, Georgia. You can find him on Twitter at @ak418.
Regional Sales Director, Southwest District
Unifying Data Protection & Lowering Data Risks by Leveraging the Cloud
With data growing in your organization unabated and increasingly becoming fragmented across end-user devices, cloud services and both physical and virtual server environments, the dark specter of data loss or exposure is very real and comes at a high business cost. IT teams are being forced to rethink how to best protect their data without compromising security, compliance or legal requirements. Organizations that can get a few steps ahead in identifying and remediating data risks before they become front page news will more effectively protect their enterprise from exposure and fines.
Join us for this session where we’ll discuss how modern cloud architecture is enabling new innovations for better utility of enterprise data, providing visibility, recoverability and governance capabilities for today’s data landscape, results unattainable with legacy, on premise approaches.
Brian Damschen, Regional Sales Director, Southwest District: With 20 years of sales experience working with IT Professionals across all market segments, Brian has a firm grasp on what it takes to help companies apply unique and differentiated technologies to solve business challenges. He began his career in telecommunications and mobile solutions with Bell South and then Verizon Communications. Data networks and hosted infrastructure managed services were the focus during his time at Qwest and AT&T. He moved on to enterprise storage with Silicon Valley start up BlueArc, a company that specialized in high performance network attached storage which was acquired by Hitachi Data Systems. At Commvault he became well versed in data management and information governance and for the last 2 years he has been responsible for developing the Southwest Region at Druva.
Director – Partners & Soultions Engineering
A New Way to Look at IT Security with Endpoint Modeling
Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling results and visibility into all network Endpoint behavior. With great accuracy, extremely low noise, and supporting evidence, endpoint modeling discovers and tracks the regular behavior of each device in a way that makes possible the automatic recognition of potentially harmful activities. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others.
Channel Sales Engineer, Sales
Keep Ransomware Out. How you can stop ransomware and exploits before they strike
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence
Derek Snyder is a veteran in the IT industry. For the past 11 years Derek has worked exclusively in the IT security space providing threat analysis, design, implementation and training for IT security solutions. Derek understands the challenges that IT leaders and administrators face with the evolving complexity of networks and the complexity of the products meant to protect them. The solution to complexity is not more complexity! Derek currently serves as a Sales Engineer and Threat Analysis speaker for Sophos.
National Channel Sales Director
Digital Resilience requires a new approach. It takes actionable intelligence
Providing a cybersecurity analytics platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives Our advanced analytics engine creates functioning model so you can understand and continuously monitor your whole network. Measure resilience with your RedSeal Digital Resilience Score, you can measure, benchmark, and set targets to actively manage the digital resilience of your network and security infrastructure. Verify compliance by revealing configuration errors and discovering unintended access paths, the RedSeal security analytics platform helps you verify compliance with established operating standards, policies and regulations. Accelerate response to security incidents and network vulnerabilities.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
David Feinglass has been involved in Disaster Recovery solutions engineering for 20 years, starting as a Solutions Engineer with Comdisco, and then SunGard. David has a long track record of helping companies across every industry design, implement and test their Disaster Recovery and Business Continuity strategy and solutions. At Latisys, a multi national managed hosting and cloud service provider, David helped architect the companies cloud based Disaster Recovery as a Service (DRaaS) offering. In his current role as Solutions Engineer for Zerto in Southern California, David helps his clients understand the various options for protecting their critical infrastructure and applications, from not just physical and natural disasters, but also human created issues such as Ransom-ware.
Dir. of Sales, Western Region
If only there was a time machine for my data that would enable me to instantly go back in time to just one second before a ransomware attack. Check!
Through innovation, Reduxio has redefined the economics to achieve flash performance and reinvented data protection on primary storage, far exceeding anything available today. Learn how one can instantly recover data from any point in time and hear an anecdote about a Police Department who leveraged this functionality to recover from a ransomware attack. Reduxio drives efficiency in business processes and has fundamentally changed the way you manage and protect data.
Director, Value Management Office
Cloud Security for the Digital World
Even with a focus on business outcomes, many technology decisions are still made short-sided without ensuring the purchase is future-proof and modular enough to meet future needs. Cloud-based security has inherent flexibility that can meet security objectives while also enabling IT and business strategy.
Secure What Matters in the Public Cloud
Securing the cloud – the virtual world – requires a very different approach to the one that has been successfully used within the physical world. No longer is an application static on one server and connected to one network port. The application is now mobile; it is co-resident with many other applications and the traffic that it generates can appear on any number of network ports as the virtual application moves between physical servers. The data and the traffic within that environment rather than the devices or components that make up the infrastructure is causing IT to consider carefully how to maintain visibility to the ’information in motion‘ within their environment.
Intelligent visibility to the traffic and information within the virtual infrastructure is the next evolution of management and monitoring for IT. Whether you’re dealing with public or hybrid cloud environments, a loss of visibility in the cloud can mean a loss of control over several aspects of IT management and data security. In this briefing we will discuss why Visibility is important and how you can overcome blind spots in your private and public cloud architecture.