- This event has passed.
December 8, 2016 @ 8:15 am - 5:15 pm
The San Francisco Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech-Security Strategies Conference.
Cyber War Chronicles – Stories from the Virtual Trenches
Cyber-attacks are becoming increasingly complex and persistent, making it difficult for security professionals to protect their organizations as they head into the virtualized, IoT era. In this session, Radware will share real world experiences gathered by its Emergency Response Team and discuss how leading enterprises are using Radware’s integrated Attack Mitigation Systems to successfully defend against the latest generation of attacks.
Senior Solutions Architect
Protect Your DNS Services Against Security Threats
Think that a firewall is sufficient protection for your DNS servers? Think again. DDoS DNS attacks are on the rise, and a favorite target of hackers in order to extract sensitive customer data, passwords, and intellectual property. Existing solutions are not enough to protect against attacks, resulting in business downtime and brand reputation damage.
In this session, attendees will learn about:
· Applying DNS best practices and architecture designs
· Mitigating DNS malware
· Eliminating Single Point of Failure (SPOF)
CTO & Founder
A New Way to Look at IT Security with Endpoint Modeling
Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling critical defense measures and visibility into endpoints and the network. With great accuracy, endpoint modeling discovers and tracks the role of each device in a way that emits actionable security intelligence when roles change in notable ways. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others.
Product Marketing Manager
Moving Beyond Legacy Endpoint Security Technology
Supporting enterprises in complex and diverse environments requires technologically sophisticated security solutions to combat zero-day threats. Endpoint security providers sell legacy technology in layered formats, focusing on the reactive, as the only solution. Artificial intelligence can secure a system against unknown threats in addition to threats that may hide their malicious behavior while under scrutiny.
Richard Melick is the Technology and Product Evangelist for Cylance. He has over a decade of experience in information security and technology, working in various career functions in the industry that have taken him all over the world. His focus is emerging technology and next generation security.
Cylance is the only company to offer a preventive cybersecurity solution that stops advanced threats and malware at the most vulnerable point: the endpoint. Applying a revolutionary artificial intelligence approach, CylancePROTECT, analyzes the DNA of code prior to its execution to find and prevent threats others can’t, while using a fraction of the system resources associated with antivirus and detect and respond solutions deployed in enterprises today. For more information visit: www.cylance.com
How to Block Ransomware and Other Threats Before, During, After an Attack with Cisco Umbrella + Cisco’s Advanced Malware Protection
With cyber-attacks growing at a rapid pace, organizations of all sizes must adopt a layered security strategy, to provide maximum threat protection. In this informative session, you will learn from Cisco’s Chris Frost about defense-in-depth strategies, and the “multiplier” benefit of combining OpenDNS Umbrella with Advanced Malware Protection (AMP) and cloud-based security services, delivered at the DNS layer.
OpenDNS Umbrella delivers security at the DNS layer, creating a first layer of defense in your security stack. Umbrella uses the Internet’s existing infrastructure to keep malware from compromising your systems and to stop botnets or phishing from exfiltrating your data. In seconds, this cloud platform displays your global activity from all locations. Instantly, you can identify targeted attacks by comparing your activity—over any port, protocol, or app to the rest of the world.
Cisco AMP provides global threat intelligence, advanced sandboxing, and real-time malware blocking to prevent breaches. But because you can’t rely on prevention alone, AMP continuously analyzes file activity across your extended network, so you can quickly detect, contain, and remove advanced malware.
The combination of the two products gives organizations a highly robust solution to detect and block malicious domains and files, for maximum threat protection.
Visibility isn’t enough! It takes Actionable Intelligence!!
RedSeal provides a cybersecurity analytics platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives. RedSeal’s advanced analytics engine creates functioning network models, tests networks to identify security risks, Measure needed actions, and provides critical information to quickly Prioritize issues. The result: reduced cybersecurity risk and lower incident response and maintenance costs.
Sr. Systems Engineer
Unifying Data Protection & Lowering Data Risks by Leveraging the Cloud
With data growing in your organization unabated and increasingly becoming fragmented across end-user devices, cloud services and both physical and virtual server environments, the dark specter of data loss or exposure is very real and comes at a high business cost. IT teams are being forced to rethink how to best protect their data without compromising security, compliance or legal requirements. Organizations that can get a few steps ahead in identifying and remediating data risks before they become front page news will more effectively protect their enterprise from exposure and fines.
Join us for this session where we’ll discuss how modern cloud architecture is enabling new innovations for better utility of enterprise data, providing visibility, recoverability and governance capabilities for today’s data landscape, results unattainable with legacy, on premise approaches.
VP Business Development & Marketing
Network Access Control (NAC) 501 – Transforming Network Security through Visibility, Control & Response
Mobile devices, cloud technology,IoT and virtual work alternatives have changed how organizations operate. With over 21 billion new devices accessing networks by 2020 according to Gartner, how can organizations prepare today for the increase in devices without undermining the security posture?
A strong perimeter defense is no longer sufficient to prevent cyber threats. Organizations need to address the entire security lifecycle to adequately protect digital assets and intellectual property, even as network access grows. This presentation will address the evolving security threat landscape, cover the three critical aspects of network security – visibility, control and automated response to augment existing security controls, and provide tips and best practices to shrink your attack surface and secure your network now and for the future.
VP Product Management
Stopping Ransomware at the Door
Ransomware has become one of the most widespread and damaging threats internet users face today. Since CryptoLocker first appeared in 2013, we’ve seen a new era of file-encrypting ransomware variants delivered through spam messages and exploit kits, extorting money from all types of organizations. And in 2016 alone it’s cost over $1 billion. Join us for this informative session to learn about ransomware threats and how to stay secure against them.
Unsupervised Machine Learning: A New Approach to Cyber Defense
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why unsupervised machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
In this session, learn:
- How new machine learning and mathematics are automating advanced cyber defense
- Why full network visibility allows you to detect threats as or before they emerge
- How smart prioritization and visualization of threats allows for better resource allocation and lower risk
- Real-world examples of unknown threats detected by ‘immune system’ technology
Solutions Director, Americas
How to Prevent Ransomware with Microsoft & 3rd Party Technologies
Duncan McAlynn discusses the threats we are facing today with ransomware, APTs, DDoS attacks and advanced phishing schemes to demonstrate how new and evolved Microsoft and third-party solutions can help protect and defend your critical workloads.
Duncan McAlynn is a CISSP-certified, six-time Microsoft MVP and member of the FBI InfraGard division that has a laser focus on helping our nation’s corporations and government agencies expand their use of Microsoft System Center technologies to improve their security posture and compliance.
Protecting from tomorrow’s threats today
When combating threats, the biggest challenge is differentiating between safe computer activity and malicious acts. Traditional security defenses such as firewalls, secure email gateways, IPSs, antivirus platforms and other signature based solutions play a key role in a defense-in-depth strategy, but often fall short on protecting against advanced threats. The cyber security industry needs a game changer – a solution that is threat-agnostic and can proactively detect, prevent and analyze threats, known or unknown, regardless of the type of attack, who generated the attack, or how, where or when the attack penetrated the organization.
Hexatier was scheduled to speak today, however, due to a conflict they are unable to attend altogether. For more information about Hexatier, please contact Katie Hayes at firstname.lastname@example.org or (617) 959-4617.