Loading Events

« All Events

  • This event has passed.

San Francisco (Cybersecurity)

December 8, 2016 @ 8:15 am - 5:15 pm

Event Navigation


December 8, 2016
8:15 am - 5:15 pm
Event Category:


Grand Hyatt San Francisco
345 Stockton Street
San Francisco, CA 94108
United States
  + Google Map
+1 415 398 1234

Download the PDF Agenda

The San Francisco Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am-8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am-9:15am Session One

Gabe Meekins

Cyber War Chronicles – Stories from the Virtual Trenches

Cyber-attacks are becoming increasingly complex and persistent, making it difficult for security professionals to protect their organizations as they head into the virtualized, IoT era. In this session, Radware will share real world experiences gathered by its Emergency Response Team and discuss how leading enterprises are using Radware’s integrated Attack Mitigation Systems to successfully defend against the latest generation of attacks.

Download the Presentation

9:15am-9:45amSession Two

Dennis Borin
Senior Solutions Architect

Protect Your DNS Services Against Security Threats

Think that a firewall is sufficient protection for your DNS servers? Think again. DDoS DNS attacks are on the rise, and a favorite target of hackers in order to extract sensitive customer data, passwords, and intellectual property. Existing solutions are not enough to protect against attacks, resulting in business downtime and brand reputation damage.

In this session, attendees will learn about:

· Applying DNS best practices and architecture designs

· Mitigating DNS malware

· Eliminating Single Point of Failure (SPOF)

Download the Presentation

9:45am-10:15amBreak/Vendor Booth Time
10:15am-11:00amSession Three

Patrick Crowley
CTO & Founder

A New Way to Look at IT Security with Endpoint Modeling

Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling critical defense measures and visibility into endpoints and the network. With great accuracy, endpoint modeling discovers and tracks the role of each device in a way that emits actionable security intelligence when roles change in notable ways. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others.

11:00am-11:30amSession Four

Richard Melick 
Product Marketing Manager

Moving Beyond Legacy Endpoint Security Technology

Supporting enterprises in complex and diverse environments requires technologically sophisticated security solutions to combat zero-day threats. Endpoint security providers sell legacy technology in layered formats, focusing on the reactive, as the only solution. Artificial intelligence can secure a system against unknown threats in addition to threats that may hide their malicious behavior while under scrutiny.

Speaker Bio:

Richard Melick is the Technology and Product Evangelist for Cylance. He has over a decade of experience in information security and technology, working in various career functions in the industry that have taken him all over the world. His focus is emerging technology and next generation security.

Cylance is the only company to offer a preventive cybersecurity solution that stops advanced threats and malware at the most vulnerable point: the endpoint. Applying a revolutionary artificial intelligence approach, CylancePROTECT, analyzes the DNA of code prior to its execution to find and prevent threats others can’t, while using a fraction of the system resources associated with antivirus and detect and respond solutions deployed in enterprises today. For more information visit: www.cylance.com

11:30am-12:00pmBreak/Vendor Booth Time/Lunch
12:00pm - 12:30pmSession Five

Chris Frost
Systems Engineer

How to Block Ransomware and Other Threats Before, During, After an Attack with Cisco Umbrella + Cisco’s Advanced Malware Protection

With cyber-attacks growing at a rapid pace, organizations of all sizes must adopt a layered security strategy, to provide maximum threat protection. In this informative session, you will learn from Cisco’s Chris Frost about defense-in-depth strategies, and the “multiplier” benefit of combining OpenDNS Umbrella with Advanced Malware Protection (AMP) and cloud-based security services, delivered at the DNS layer.

OpenDNS Umbrella delivers security at the DNS layer, creating a first layer of defense in your security stack. Umbrella uses the Internet’s existing infrastructure to keep malware from compromising your systems and to stop botnets or phishing from exfiltrating your data. In seconds, this cloud platform displays your global activity from all locations. Instantly, you can identify targeted attacks by comparing your activity—over any port, protocol, or app to the rest of the world.

Cisco AMP provides global threat intelligence, advanced sandboxing, and real-time malware blocking to prevent breaches. But because you can’t rely on prevention alone, AMP continuously analyzes file activity across your extended network, so you can quickly detect, contain, and remove advanced malware.

The combination of the two products gives organizations a highly robust solution to detect and block malicious domains and files, for maximum threat protection.

12:30pm-12:45pmBreak/Vendor Booth Time
12:45pm-1:15pmSession Six

Sean Finn

Visibility isn’t enough! It takes Actionable Intelligence!!

RedSeal provides a cybersecurity analytics platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives. RedSeal’s advanced analytics engine creates functioning network models, tests networks to identify security risks, Measure needed actions, and provides critical information to quickly Prioritize issues. The result: reduced cybersecurity risk and lower incident response and maintenance costs.


1:15pm-1:45pmSession Seven

Duy Pham
Account Executive

Scott Hirsh
Sr. Systems Engineer


Unifying Data Protection & Lowering Data Risks by Leveraging the Cloud

With data growing in your organization unabated and increasingly becoming fragmented across end-user devices, cloud services and both physical and virtual server environments,  the dark specter of data loss or exposure is very real and comes at a high business cost.   IT teams are being forced to rethink how to best protect their data without compromising security,  compliance or legal requirements.  Organizations that can get a few steps ahead in identifying and remediating data risks before they become front page news will more effectively protect their enterprise from exposure and fines.  

Join us for this session where we’ll discuss how modern cloud architecture is enabling new innovations for better utility of enterprise data, providing visibility,  recoverability and governance capabilities for today’s data landscape, results unattainable with legacy, on premise approaches.

Download the Presentation

1:45pm-2:00pmBreak/Vendor Booth Time
2:00pm-2:30pm Session Eight

Sanjit Shah
VP Business Development & Marketing

Network Access Control (NAC) 501 – Transforming Network Security through Visibility, Control & Response

Mobile devices, cloud technology,IoT and virtual work alternatives have changed how organizations operate. With over 21 billion new devices accessing networks by 2020 according to Gartner, how can organizations prepare today for the increase in devices without undermining the security posture?

A strong perimeter defense is no longer sufficient to prevent cyber threats.  Organizations need to address the entire security lifecycle to adequately protect digital assets and intellectual property, even as network access grows.  This presentation will address the evolving security threat landscape, cover the three critical aspects of network security – visibility, control and automated response to augment existing security controls, and provide tips and best practices to shrink your attack surface and secure your network now and for the future.

2:30pm-3:00pm Session Nine

Marty Ward
VP Product Management

Stopping Ransomware at the Door

Ransomware has become one of the most widespread and damaging threats internet users face today. Since CryptoLocker first appeared in 2013, we’ve seen a new era of file-encrypting ransomware variants delivered through spam messages and exploit kits, extorting money from all types of organizations. And in 2016 alone it’s cost over $1 billion. Join us for this informative session to learn about ransomware threats and how to stay secure against them.

3:00pm - 3:15pmBreak / Vendor Booth Time
3:15pm-3:45pm Session Ten

Erik Gordon

Unsupervised Machine Learning: A New Approach to Cyber Defense 

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis.

Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.

Discover why unsupervised machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.

In this session, learn:

  • How new machine learning and mathematics are automating advanced cyber defense
  • Why full network visibility allows you to detect threats as or before they emerge
  • How smart prioritization and visualization of threats allows for better resource allocation and lower risk
  • Real-world examples of unknown threats detected by ‘immune system’ technology
3:45pm - 4:15pmSession Eleven

Duncan McAlynn
Solutions Director, Americas

How to Prevent Ransomware with Microsoft & 3rd Party Technologies

Duncan McAlynn discusses the threats we are facing today with ransomware, APTs, DDoS attacks and advanced phishing schemes to demonstrate how new and evolved Microsoft and third-party solutions can help protect and defend your critical workloads.

Speaker Bio:

Duncan McAlynn is a CISSP-certified, six-time Microsoft MVP and member of the FBI InfraGard division that has a laser focus on helping our nation’s corporations and government agencies expand their use of Microsoft System Center technologies to improve their security posture and compliance.


4:15pm - 4:45pmSession Twelve

Terence Chong
Solutions Engineer

Protecting from tomorrow’s threats today

When combating threats, the biggest challenge is differentiating between safe computer activity and malicious acts. Traditional security defenses such as firewalls, secure email gateways, IPSs, antivirus platforms and other signature based solutions play a key role in a defense-in-depth strategy, but often fall short on protecting against advanced threats. The cyber security industry needs a game changer – a solution that is threat-agnostic and can proactively detect, prevent and analyze threats, known or unknown, regardless of the type of attack, who generated the attack, or how, where or when the attack penetrated the organization.

Prize Drawings for All in Attendance
4:45pm - 5:15pmSession Thirteen
Prize Drawings for All in Attendance

Hexatier was scheduled to speak today, however, due to a conflict they are unable to attend altogether.  For more information about Hexatier, please contact Katie Hayes at katie.hayes@hexatier.com or (617) 959-4617.