- This event has passed.
November 30, 2017 @ 8:15 am - 4:00 pm
The Seattle Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech-Security Strategies Conference.
Channel Sales Engineer
Threat Landscape & Sophos Synchronized Security
Take a walk with Sophos down the Treat Landscape Lane. We’ll chat about Exploits and Ransomware providing insights to the pervasiveness of the threats and the latest variants we’ve seen at Sophos Labs. We will conclude the conversation with Solutions and Strategies on how to protect your networks and you end-users through the Synchronized Security System.
A New Way to Look at IT Security with Endpoint Modeling
Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling results and visibility into all network Endpoint behavior. With great accuracy, extremely low noise, and supporting evidence, endpoint modeling discovers and tracks the regular behavior of each device in a way that makes possible the automatic recognition of potentially harmful activities. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others.
Recovering from Ransomware in Minutes
Learn about how to protect your business from one of its biggest threats. This session includes Best Practice guidelines for preventing infection in the first place, followed by details of how Zerto can be used to re-wind and recover as if the infection never happened.
Email Security – growing in threats, quickening in pace
Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?
In this session, you’ll learn:
· How your email can be used as an entry point for multiple types of attack
· The damaging impact attacks have on organizations
· Why your employees could be the weakest link in your email security
· How to enhance your email security and thus your overall cyber resilience
Aurel Crisan is an email security and governance enthusiast, helping organizations build resilient messaging environments. He champions the idea that strong email resilience requires protections, continuity preparedness, and remediation planning. As an advocate and account manager, Aurel helps make email safer for commercial, education, and public sector organizations in the Pacific Northwest. Aurel is a PNW local, and graduated from from the University of Portland in 2008.
A Blueprint for a Modern Enterprise Security Program
One of the biggest challenges in cyber security today is how to manage the volume, velocity, and complexity of data generated by the myriad of IT security tools. The feeds from these disconnected, siloed tools must be analyzed, normalized, and remediation efforts prioritized. The more tools, the more difficult the challenge. This security model requires legions of staff to comb through huge amounts of data to connect the dots and find the needle in the haystack. These efforts can take months, during which time attackers can exploit vulnerabilities and extract data. Rather than adding more tools, organizations need to implement a new, more efficient enterprise security model.
According to analyst firm Gartner, cyber risk management that uses intelligence-driven analytics can help organizations operationalize cyber security practices, break down silos, and enhance security operations tasks through automation. This presentation explores the emerging discipline of intelligence-driven cyber risk management as a response to the mounting cyber-attacks, advanced persistent threats, and insider leaks. It outlines not only today’s cyber security challenges, but provides practical advice of how to operationalize an organization’s cyber security practices across a growing attack surface.
Miguel Sampo is a 15+ year cybersecurity practioner and has worked with many industries and verticals including government entities. His career background with Symantec, EMC and Dell Security Secureworks has provided a deep understanding of known security practices and developing security programs in accordance to industry controls and frameworks. His vast security experience has enabled him to help many organizations strategically build solutions to improve security programs and initiatives. He is regarded as an expert in the field.
Enterprise Solution Engineer
Next Generation Endpoint Protection – What you need to know
In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.
Manager Solutions Engineering
Does Your Time to First Byte Bite?
Join Scott Taylor, Director of Solutions Engineering at Dyn as he provides a high level overview of DNS, the various multi-DNS configurations and how this layer of your infrastructure has everything to do with security. From DDoS to DNS amplification and reflection attacks, it’s all covered including strategies to mitigate, opportunities to architect infrastructure resiliency and tips to improve digital performance.
Scott Taylor is the Director of Solutions Engineering at Dyn. He has been in the network and application performance space for over 15 years, with the last 4 of those years specializing in DNS and Internet analytics. His customer experience includes working with the top banks, social media companies and ecommerce sites.
Director of Solutions Architecture
How “Data When” changes everything. Business Optimization through improved Temporal Data Access
Rob Terlizzi is a 27 year technology veteran. His “train” to being an Imaging Scientist was derailed when the draw of the 90’s Pier to Pier evolution/revolution became overwhelming. The momentum of IP driven infrastructure pushed him to focus the last 17 years of his career on the IP Storage Sector. Rob is a Storage Technology Veteran who has spent years at NetApp, Isilon, EMC, IBM and now Reduxio.
Rob follows a “Data First” philosophy around systems design and architecture. This approach allows for flexible, simplified and repeatable business solutions to be developed and deployed within customer/partner environments.
Rob was the 2nd US member of the Reduxio Team, and is currently their Director of Solutions Architecture.
Principal Systems Engineer
Hunting Methodology: A key to the labyrinth of network forensics
Proactive hunting is the newest cybersecurity strategy and promises great potential. But where is one to start in the world of network forensics? This presentation proffers a methodology for exactly that. It walks through the maze of network protocols with a spool of thread; discussing the protocols of interest, what to look for in each protocol, and how to find the cheese.
Sean Ennis is a Principal Systems Engineer at RSA with over 13 years of experience designing and building security solutions for organizations across North America. With previous tenures at Bell Canada, Cisco (IronPort), and HP (TippingPoint), Sean has been at RSA for the last 7 years, working on design and architecture of tools and processes within security operations & incident response programs, most recently focused on threat hunting and response.
Security Project Manager
A Year in the Life of A Security Awareness Program
Security isn’t just a technical problem. It’s also a people problem. This means you’ve got to arm your people with the right level of security know-how to detect and prevent data loss. Enter the comprehensive security awareness program. This talk brings best practice recommendations in developing, deploying, and maintaining a year-long security awareness program, and offers insight into awareness initiatives at the world’s most risk-aware organizations.
I’m an experienced program manager, project manager, technical and creative writer, instructional designer, editor and trainer. Over the past six years, I’ve successfully managed creative teams on dozens of web-based training development and localization projects for MediaPro clients including Boeing, Microsoft, S&P Global, Expedia, McKesson, Western Union, RBC, and Fannie Mae. In addition to my program and project management responsibilities, my additional focus is supporting MediaPro’s enterprise clients with planning and deployment of their cyber security training, and reinforcement. I spent four + seasons giving back to my community as CEO (and occasional second trombonist) with the Walla Walla Symphony. I also did an extended stint with Microsoft as senior technical writer and user assistance manager, and web services director at Coffey Communications. I’m a published author with a number of award-winning children’s books to my credit — “Elizabeth’s Song,” “Seattle Blues,” “Stringz,” “Stinky Dog” and others. I’m also the author of the best-selling e-book novel, “The Last Eagle,” available at Amazon.com, Smashwords.com, and elsewhere. Specialties include: project management (experienced Microsoft Project and Wrike user), privacy and information security training and delivery, instructional design, and writing (technical, marketing, creative, and web)
|ControlScan was scheduled to speak today, however, due to a conflict they are unable to attend altogether. For more information about ControlScan, please contact Amanda Parker @ firstname.lastname@example.org.