- This event has passed.
March 23 @ 8:15 am - 5:00 pm
The San Jose Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech-Security Strategies Conference.
Chief Operations Officer
Threat Intelligence and Layered Security in the Post-Target Breach Era
The term “Threat Intelligence” is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.
Dir. of Sales, Western Region
If only there was a time machine for my data that would enable me to instantly go back in time to just one second before a ransomware attack. Check!
Through innovation, Reduxio has redefined the economics to achieve flash performance and reinvented data protection on primary storage, far exceeding anything available today. Learn how one can instantly recover data from any point in time and hear an anecdote about a Police Department who leveraged this functionality to recover from a ransomware attack. Reduxio drives efficiency in business processes and has fundamentally changed the way you manage and protect data.
VP of Sales
Counting Down: How to Quickly, Easily and Cost-Effectively Comply with NIST SP800-171
Many government contractors may not realize the clock is ticking and unless they are in compliance with NIST SP800-171 on December 31, 2017, they risk their government contracts. Our speaker will discuss how organizations – in particular contractors to the government – can quickly, easily and cost-effectively implement authentication solutions in compliance with NIST Special Publication 800-171.
Head of Product Marketing
Stop Cyber Threats With Adaptive Micro-Segmentation
Virtualization, the cloud, and the promise of containers have evolved the data center, bringing better application delivery and cost reduction. With these benefits come new risks that include increased East/West traffic and the potential for new cyber threats. Adaptive micro-segmentation is transforming and improving security inside the data center and clouds while speeding up app delivery.
In this session you’ll learn:
- How adaptive micro-segmentation enables security anywhere (on premises, AWS, Azure, etc.) on anything (bare metal, vSphere/KVM/XEN, containers), while eliminating app delivery delays caused by traditional security approaches.
- How customers are using adaptive micro-segmentation to instantly protect high-value apps, separate dev from prod with one rule, take existing security policies to the cloud, and more.
- How live visibility of application traffic and dependencies is making security dead simple for IT operations and security teams.
As Illumio’s Head of Product Marketing, Chris Westphal is responsible for Product Marketing missions as well as technical marketing and technical evangelism. He has spent over 20 years of his career working on emerging products up and down the OSI stack, targeting customers from SMB to some of the largest .coms and service providers. Prior to Illumio, Chris held leading roles in product management and product marketing at Cisco, VMware, Citrix, Puppet and, most recently, at Adallom, a Cloud Access Security Broker (CASB), now part of Microsoft.
Channel Account Executive, Sales
Keep Ransomware Out. How you can stop ransomware and exploits before they strike
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence
Dee Bhatia serves as territory manager covering the Northern California area for Sophos where he is responsible for territory go-to-market strategy, planning and marketing efforts for the all Sophos security related business. He has more than 15 years of IT and networks security industry experience working with enterprise and mid-market organizations as well as channel security partners.
Prior to joining Sophos, Marty has held similar roles focusing on security at SonicWALL and Dell.
Dee holds a master of business administration in technology management as well as a bachelor’s degree in bio-chemistry.
President and Co-Founder
A Layered Security Approach to Enterprise Mobility
This session addresses the New Threat Vector of Mobile Security at the device, app, and network levels. By having a layered security approach, your enterprise is able to secure enterprise data and employee privacy from mobile threats, have a 360° view of your threat environment, and leverage your EMM to realize full value.
Domingo Guerra, Appthority’s president, cofounded the company in 2011 to help the enterprise solve new security challenges in an increasingly mobile, app-centric world. He is the leader of Appthority’s Enterprise Mobile Threat Team, where he specializes in identifying mobile app risks and behavior trends, and advising the enterprise of the business risk associated with data breaches, losses and leakage tied to today’s dynamic workforce.
Domingo has been cited as an expert on enterprise mobile risks including app and device threats, permissions, malware, hacking, and many other cybersecurity topics in key media outlets such as CNBC, Fast Company, Forbes, SC Magazine, TechRepublic, The Guardian, and more.
Regional Sales Director
Corporate Solution Architect Manager
Next Generation Endpoint Protection
In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Jae Kim: Technologist for startups and enterprises, Jae has been in technology for over 20 years and been a sales engineer for the last 4 years with a special focus on server virtualization and data protection. Prior to selling replication at Zerto, Jae sold data protection at EMC.
SECURITY ACCOUNT MANAGER
Enabling Network Access Visibility without Compromise
Jose Fernandez is a computer engineering and software development veteran. He has spent 21 years in the enterprise software industry, with the past 13 focused on cybersecurity. Before joining Cisco through acquisition, Jose was director of Latin America and Sales for Lancope, where he built the company’s presence in the region from scratch and forged relationships with partners and customers. Today, he specializes in Cisco Stealthwatch and how it integrates with other Cisco security solutions.
Explaining Bitcoins will be the easy part: Email Borne Attacks and How You Can Defend Against Them
Security Sales Engineer
How to Block Threats Before, During & After an Attack
With cyber attacks growing at a rapid pace, organizations of all sizes must adopt a layered security strategy, to provide maximum threat protection. In this informative session, you will learn about defense-in-depth strategies, and the “”multiplier”” benefit of combining Cisco Umbrella with Advanced Malware Protection (AMP) for a more robust solution to detect and block malicious domains and files.
Nathan Chu is a Systems Engineer who stands at the forefront of the Cyber Security Realm to help organizations prepare for inevitable intrusions. Prior to joining Cisco’s Cyber Security team, Nathan spent 4 years as a Generalist Systems Engineer, consulting design strategies with clients and improving his technical acumen by acquiring numerous certifications.
Nathan graduated college as an Optical Science Engineer, earned a Master’s Degree in Biomedical Device Engineering, and eventually found his passion in Networking through Cisco’s Sales Associate Program (CSAP). In CSAP, he discovered an avenue that would allow him to help a diverse range of people, processes, and organizations through Cisco’s portfolio that would leave an impacting impression.
Account Manager, NetWitness Specialist
Despite all the money we have invested in security, it’s still too difficult to put security details in business context fast enough. Both security and business leaders want to understand to what degree security incidents impact business continuity, intellectual property, and damage to their reputation, among other things. At RSA we are calling this the “Gap of Grief”. First you need to understand the problem before you can assume to solve it. We will dive into the issues and offer some ideas to close the gap.