Loading Events

« All Events

  • This event has passed.

San Diego (Cybersecurity)

February 22 @ 8:00 am - 2:00 pm

Event Navigation


February 22
8:00 am - 2:00 pm
Event Category:


Crowne Plaza San Diego – Mission Valley
2270 Hotel Circle N.
San Diego, CA 92108
United States
  + Google Map


The San Diego Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 9:00amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

9:00am - 9:30amSession One
9:30am - 10:00amBreak / Vendor Booth Time
10:00am - 10:30amSession Two

David Feinglass
Solutions Engineer

Win Big with IT Resilience

In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.

Download the Presentation

10:30am - 11:00amBreak / Vendor Booth Time
11:00am - 11:30amSession Three

Kevin Catalano
Territory Manager, Tenable, Inc.

Cyber Exposure – The Next Frontier

The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program. Join us for dinner to share how CISOs can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.

Speaker’s Bio:

Kevin Catalano serves as the Territory Manager for Tenable’s Cyber Exposure solutions, helping mid-market companies secure their businesses and reputations.

11:30am - 12:00pmBreak / Vendor Booth Time / Lunch
12:00pm - 12:30pmSession Four

Bob Anderson
Territory Account Manager

Solved: Your Shared Responsibility for Security In the Cloud

While you moved your data to the cloud, your liability for its security did not go with it. Cloud vendors call it the “Shared Responsibility Model” and it describes where their Service Level Agreement stops and your responsibility starts. To make sure there are no gaps between their technology and yours, you need to deploy many of the same tools you would deploy in your own datacenter. You need to deploy them across all your SaaS and you need to manage them across all your cloud.

Avanan, The Cloud Security Platform, protects data in any SaaS. Partnering with the industry’s most trusted security vendors, it offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, insider threats and more. The cloud-based platform is completely out-of-band and can be deployed in one click.

It is the next generation of cloud security and the only way to ensure there are no gaps in your cloud security.

Download the Presentation

12:30pm - 1:00pmBreak / Vendor Booth Time
1:00pm - 1:30pmSession Five

Will Coleman
Senior Sales Engineer, SMB, Sales Engineers

Rethink Security with Zero Trust

As today’s attacks become more sophisticated, the pressure to protect access to enterprise systems and applications has grown considerably. Unlike the traditional security perimeter model, a Zero Trust approach dispels the notion of traditional models and moves toward a “Never trust, Always verify” model for protecting access to data.  Zero Trust recognizes that any network, device, user, or application could be compromised, and the credentials associated with them.  As such, in order to better protect sensitive company resources, IT departments need to adjust their mindset and adopt a new way of thinking: that bad actors are already in their environment.  Join us to hear how identity has become the hub of any Zero Trust framework, and discover several guiding principles and paradigms that help define a Zero Trust model.

We’ll examine: The current (broken) state of security and the role identity plays in cyber attacks, the massive rethink underway that redefines security to follow identity, and how Centrify is adopting a Zero Trust model approach with identity at the core, thus uniquely helping reduce risk through the power of identity services.

1:30pm - 2:00pmSession Six

Nick Ellsmore
Co-Founder, Security Colony

Security Fatigue – What It Is & How To Manage It

In 2004 I coined the phrase “security fatigue” in presentations to AusCERT, APEC & the OECD titled “Security Fatigue: Threatening the Culture of Security.”  That presentation discussed whether the ongoing barrage of security related information and warnings to the general public had resulted in a cultural shift towards desensitization and risk tolerance. 14 years on, a Google search for the phrase “security fatigue” today gives thousands of results. NIST recently stated that “security fatigue can cause computer users to feel hopeless and act recklessly”.  The conclusions drawn back in 2004, remain highly valid today:

1. People are often willing to accept risks that are not theirs to accept.

2. Fear is not a compelling driver of action over the long-term.

3. Cultural recognition of the importance of information security is necessary to avoid security fatigue

This presentation will revisit the concept and look again at how it impacts both individual organisations at a very practical level, as well as the broader economy and community.  This presentation will provide highly pragmatic actions to influence organizational culture and ensure ongoing security and attentiveness by all people involved.

Speaker’s Bio:

One of Australia’s best known cyber-security professionals, Nick is Co-founder of Security Colony (www.securitycolony.com) and an Advisor to Bugcrowd and was the recipient of the inaugural “Australian Information Security Association (AISA) Information Security Professional of the Year” Award in 2012 for his contribution to the industry.  Previously a co-founder of SIFT and Stratsec which grew to become the largest cyber security consulting firms in the region before their sale to BAE Systems in 2010, Nick has served on a wide range of industry boards including the Internet Industry Association, Electronic Frontiers Australia and is a past Australian delegate to the APEC TEL Security & Prosperity Steering Group.  He has been engaged by regional governments to review their national cyber-security strategies, and has delivered projects for APEC and the United Nations.

Prize Drawings for All in Attendance