- This event has passed.
San Diego ()
April 14, 2016 @ 8:15 am - 5:00 pm
The San Diego Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Why Auditing is a Must-Have Element in Your Security Strategy
In this session, we’ll look into why today’s IT realities, such as the explosion of endpoint devices, demand a new security model: Organizations must continue to focus on incident prevention but also take a fresh look at strategies and solutions for incident detection and attack response. We’ll show how proper IT auditing can strengthen your ability to uncover vulnerabilities and react immediately to insider threats, cyberattacks, and data leaks — while also helping you meet compliance requirements and optimize IT operations.
Jagat Shah CTO
Defend Your Network Now: The Top 5 Things You Need to Know
Bad guys are lurking in your network neighborhood and testing entry points all the time. Threatscape 2016 is evolving rapidly, but your resources and staff may not be enough to meet these challenges. Most IT security heads and admins are so busy managing operations and ensuring ongoing security efforts that “detection deficit” sets in and they miss key indicators that their network has been compromised.
In this webinar, Jagat Shah, CTO of award-winning EventTracker, shows you how a blend of technology, experts and process simplify your already complex life. Learn about:
-Rogue process detection
Territory Account Manager
Wi-Fi Security Assessment: 5 Steps to Securing Evolving BYOD & IoT Challenges
Description: Whether it’s Bring Your Own Device (BYOD), Internet of Things (IoT) or education 1:1 initiatives, it is clear there are a lot more devices showing up on your Wi-Fi network. This poses significant risk to organizations and IT departments are forced to straddle the line between simplified access managing the onslaught of potential security threats. Wi-Fi security attacks, hacking, stolen mobile devices – are these things keeping you awake at night? You may be surprised that Wi-Fi networks can be at least on par, if not more secure than your wired networks? Join this session to learn about the wireless security capabilities available to you and some best practice security checklist to evaluating your Wi-Fi infrastructure.
Sophos Cloud Strategist
MX Logic Discontinuance – What Now?
With McAfee’s announcement of discontinuing their MX Logic Cloud Email solution, many are left searching for a replacement. Shaun Lowe, Sophos Cloud Strategist, will share how organizations can meet their needs for secure communications AND risk mitigation. Reflexion Cloud, a Sophos company, blocks spam and viruses before they ever get to the corporate network. Archiving, discovery, and recovery services allow fast search and retrieval capabilities, while encryption services ensure that email communications are only readable by intended recipients. In addition, Reflexion offers business continuity services to ensure uninterrupted business communications in the event of an outage – all managed via the cloud. The alternative, traditional approach of on-premise management requires you to build and maintain infrastructure to manage security across your environment. Sophos Cloud is the only integrated and comprehensive security solution with a simple way to manage security.
Security analytics for Digital Resilience
RedSeal provides a cybersecurity analytics platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives. RedSeal’s advanced analytics engine creates functioning network models, tests networks to identify security risks, Measure needed actions, and provides critical information to quickly Prioritize issues. The result: reduced cybersecurity risk and lower incident response and maintenance costs.
Company Insiders are your Biggest Security Threats: Learn to Reduce the Risks
In today’s increasingly complex threat landscape, no business is safe from IT security vulnerabilities. While external hacks continue to make headlines, there’s a more imminent danger to businesses: human error. As cyber criminals become more sophisticated, they are shifting their focus from penetrating corporate networks, to targeting end users. In fact, a recent report from Carbonite demonstrates that IT decision makers at small businesses are actually more concerned with internal threats, such as those propagated by their own employees, rather than outside forces.
Why? Because employees don’t need to be malicious to be a threat. As malware and specific ransomware exploits, such as CryptoLocker, become more pervasive, even inadvertent actors are responsible for enabling breaches that could lead to irrevocable data loss.
It’s time you protect your business… from itself! During this session you will learn:
– The common types of security vulnerabilities damaging small and midsize businesses
– Simple human errors that make the good guys turn bad
– The steps that all organizations should take to mitigate insider threats and protect data
Johnathan Ferrick holds a B.S in Business Management with a concentration in Information Systems from Boston College in Chestnut Hill, Massachusetts and has over 10 years’ experience in IT. Johnathan’s career started in technical support which opened his eyes to the world of Product Management and the opportunity to fix the root cause of issues rather than resolving the same issues over and over for different people. Mr. Ferrick works as a Product Manager at Carbonite for their Server Backup product.
Stop Attackers in their Tracks: How to Incorporate Smart Detection Strategies
If an attacker was on your network would you know? How long would the breach go undetected? Statistics show that attackers can remain hidden on a network up to 200 days before being detected, and cause untold damage in that time period.
And while it’s accepted that perimeter defenses cannot provide 100% protection against attacker’s technology that lets you find attackers quickly and efficiently has been a challenge.
LightCyber delivers on the promise of just that. Accurate, efficient detection of attackers after they have breached your network, providing you clarity about the attacker from network intelligence combined with added context detailing using our ability to access critical device data. Combined together, LightCyber lets you quickly zero in on the exact device accessed by the attacker, which allows fast remediation to stop damage before it happens.
Jim Thor has over 20 years of IT experience, including roles focused on Information Security, Network Engineering and Communications, and Systems Administration. Jim has worked directly for Fortune 100 companies, and has consulted with companies of all sizes. Jim thoroughly understands not only the network and applications that traverse it, but also the procedures and controls that help to promote the security and stability of the corporate infrastructure. Jim possesses certifications from (ISC)², Cisco, Microsoft, Checkpoint, and others.
Mind the Gaps: Leveraging “Security as a Service” to Gain Cyber Advantage
New technologies offer businesses opportunities to differentiate, create a unique customer experience, and make step change improvements in performance. Unfortunately, adoption continues to outpace the ability to maintain security best practices, thereby creating gaps that are being exploited by innovative cyber attackers. Security as a Service (SECaaS) offers an opportunity to strategically apply outside experience and discipline to close these gaps and strengthen the organization’s overall security posture. Attendees will understand the potential gaps in their security strategy, how to build a case for leveraging SECaaS, and factors to consider in implementation.
Steve Robb has worked in the high-tech sector throughout his career, holding various positions in both product and services companies. He joined ControlScan in January of 2009 as Vice President of Operations and assumed his current responsibilities in mid-2013, leading product strategy and marketing to meet the security and compliance needs of the mid-sized business market.
Before joining ControlScan, Steve led software development operations for more than 30 different product groups at Infor Global Solutions, a $2.2 billion acquirer and consolidator of business software applications. Steve’s experience also spans a range of functions including marketing, customer service and support, product management and professional services for companies such as Accenture, RR Donnelley & Sons and XcelleNet (now a part of SAP).
Steve has participated in several Payment Card Industry Security Standards Council (PCI SSC) Special Interest Groups tasked with publishing compliance guidance papers for the payments industry. He is also an active member of the Technology Association of Georgia (TAG). Steve holds an MBA from the Kellogg School of Management at Northwestern University and a B.S.E. degree in Electrical Engineering from the University of Michigan.
The Enterprise Immune System- A New Approach to Cyber Defense
Fast-evolving threats call for a transition in the nature of cyber security, one that can protect information assets in a world more interconnected than ever. Fundamental advances in mathematics and machine learning developed at the University of Cambridge have allowed us to move away from perimeter-based approaches to security and toward a new model of self-learning cyber defense. With the insight of government intelligence officials and leading mathematicians, the Enterprise Immune System was created. As is known, the human immune system continuously monitors the entirety of an organism, and makes apparent even those anomalies that have not previously been identified. Similarly, this innovation allows organizations to spot even the subtlest deviations in behavior and enables them therefore to mitigate threats before they become a crisis. Rather than rely on signatures or restrictive firewalls, it gains a sense of ‘self’, and can clarify what is abnormal for every user, device and network in an organizations. It takes a proactive stance of cyber defense, and utilizes the latest technological advances as a way of getting ahead of the most sophisticated forms of cyber security breaches, including insider threat.
Network Visibility And Security In The Era Of Mobility & Advanced Threats
Hack attacks – and in particular Advanced Persistent Threats (APTs) – are on the rise, eroding reputations and looting organizational assets with disturbing regularity. With mobility the new norm and mobile security in its relative infancy, are BYOD enterprises inviting APT attacks? Mobile devices potentially open the organizational network to a new set of security risks that challenge IT professionals to plan strategically. This session examines effective new approaches to redefine network perimeter, gain real time network visibility into who and what is on it, and control access automatically. Importantly, the session offers strategies for preventing and controlling APTs and other infections.
Corey White, CISSP, CISM
VP, Professional Services, Threat Zero, Threat Analysis
How To Do Your Own Compromise Assessment
The primary objective of a compromise assessment is to identify ongoing compromises, uncover the extent of malicious access and usage of the environment. Learn how to hunt for hosts that exhibit anomalous or suspicious behaviors and investigate related threat actor activities on hosts.
Understand what to look for in the following specific areas:
· Identify ways to determine data exfiltration and sabotage
· Identify command and control activities Identify compromised accounts
· Identify malware and persistence mechanisms
· Identify the latest techniques to compromise credentials
· Review hacking techniques used by hackers
Architecting the Holy Grail of Network Security –
Can you block ports 80 and 443 to secure your organization’s web browsing and live to tell the tale?
Trying to secure Internet access for an organization’s users has proven to be a nightmare for IT security professionals. The web browser is THE primary attack vector we all struggle to master. Despite the best efforts of the industry to improve security, browser vulnerabilities continue to proliferate with 25 vulnerabilities in Internet Explorer and four in Microsoft Edge patched in November 2015.
Wouldn’t it be nice if we could just set our perimeter firewalls to block port 80 and 443 without having our users break out the torches and pitchforks? This discussion explores new approaches to network security—like how to block inbound and outbound web browsing traffic allowing you to say goodbye to browser patching forever.
Scott has 20 years experience building high-performance Information Security and Enterprise Network Infrastructures.
Scott has served in critical roles helping organizations develop standards, processes, information security policies, and creating core IT infrastructures to bring these organizations into a leadership position within their industries.
At Spikes Security, he is responsible for supporting the company’s expanding operations with the same demands for high performance, highly secure infrastructure. He also leads Spikes Security’s customer service and support operations. Previously, Scott has held key IT leadership roles at Tesla and Symantec.
A10 Networks was scheduled to speak today, however, due to a conflict they are unable to attend altogether. For more information about A10 Networks, please contact Tracy Schriver, email@example.com, (408) 643-8283.