Loading Events

« All Events

  • This event has passed.

Toronto (Cybersecurity)

May 11 @ 8:15 am - 5:00 pm

Event Navigation

Details

Date:
May 11
Time:
8:15 am - 5:00 pm
Event Category:

Venue

Hyatt Regency Toronto
370 King Street West
Toronto,OntarioM5V 1J9Canada  + Google Map
Phone:
1-416-343-1234
Website:
http://torontoregency.hyatt.com/en/hotel/home.html?src=agn_mls_hr_lclb_blocal_torrt

Full PDF Agenda

Overview

The Toronto Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:30amSession One

Pete Morrison
Sr. Director, Solution Sales

 

Enabling Business Growth with Trusted Digital Relationships 

The Application Economy is changing everything. Traditional business models are shifting, digital disrupters are gaining ground, and customers want fast, reliable secure transactions. This means that organizations need to enhance customer relationships through new digital channels.

This session will talk about how the app economy is increasing the pressure and changing the way users are interacting with and buying from your company. Every company, regardless of industry, must make the pivot to appeal to those new buying patterns and ways that customers are engaging. Your Board and your CEO are expecting these new services and applications to be delivered. Listen to examples of how the leaders in the industry have done it.

Download the Presentation

Speaker’s Bio:

Pete Morrison, a veteran with more than 25 years of enterprise software industry experience, is the Senior Director, of Cybersecurity for Public Sector at CA Technologies. Prior to joining CA, Pete was with Raytheon Trusted Computer Solutions where he was director of DOD Sales. Prior to Raytheon, Pete was Vice President of North America for Credant Technologies where he was responsible for all business in North America and the US Federal Government. Pete has an extensive background in the development of organizations at both the management and territory level. Pete has also served as VP of North America for Imperva, a security software company and was Director of Public Sector at Netegrity, a company that grew to become the leader in Identity Management Solutions (Now CA).

9:30am - 10:00amSession Two

Sean Power
Solutions Architect

Evaluating DoS Protection – Old DoS / New Tricks

Denial of Service attacks are evolving.  We are seeing more attacks, with a greater variety of techniques than ever before.  Modern attacks are skilled at evading detection and wreaking havoc in surprising ways.

This session will take a practical look at denial of service mitigation with respect to modern attacks.  Find out what it takes to stop modern attacks and if your current solution still offers all the protection you need.

Speaker’s Bio: 

Sean has 15 years of experience in the field of information security with the last 3 years as a Solutions Architect at DOSarrest Internet Security.

During his career he has experienced thousands of attacks and helped design mitigation strategies for hundreds of companies.

10:00am - 10:30amBreak / Vendor Booth Time
10:30am - 11:15amSession Three

John Heintz
Director – Partners & Solutions Engineering

A New Way to Look at IT Security with Endpoint Modeling

Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling results and visibility into all network Endpoint behavior. With great accuracy, extremely low noise, and supporting evidence, endpoint modeling discovers and tracks the regular behavior of each device in a way that makes possible the automatic recognition of potentially harmful activities. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others.

11:15am - 11:45amSession Four

Dave Browne
Solutions Engineer

Disaster Happens; Don’t Be Held Hostage

Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest additions to their arsenal – EVault & DoubleTake. We’ll also cover best practices for backing your data and how you can take your defenses to the next level with DRaaS.

Download the Presentation

11:45am - 12:15pmBreak / Vendor Booth Time / Lunch
12:15pm - 12:45pmSession Five

Mike Ruiz
Senior Sales Engineer

What CISO’s fear and why?  Metrics of effective security.

Download the Presentation

12:45pm - 1:00pmBreak / Vendor Booth Time
1:00pm - 1:30pmSession Six

Darryl Maurice
Channel Sales Engineer – Eastern Canada

Keep Ransomware Out.  How you can stop ransomware and exploits before they strike

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

·        Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
·        Detect: quickly and easily detect and isolate attacks
·        Respond: laser in on critical alerts and address them with simple to understand security intelligence

Speaker’s Bio:

Darryl has ten years of experience in the field of IT technical services, and over seven years of experience serving in a highly customer-facing role, performing high-profile partner and enterprise consultations and professional services (around North America and internationally) for the purposes of network security design, integrations, training, maintenance, troubleshooting, pre-sales and post-sales support.

He also has architectural expertise with Check Point, Palo Alto and Sophos security products, VPNs and network security design, with deep understanding of small, medium and large enterprise and non-enterprise environments.

Professional qualifications:

Certified Information Systems Security Professional (CISSP – (ISC)²), Certified in Risk and Information Systems Control (CRISC – ISACA), Certified Information Systems Auditor (CISA – ISACA), Check Point Certified Master Architect (CCMA – Check Point Software Technologies), Certified Ethical Hacker (CEH – EC-Council), Certified Network Security Engineer (CNSE – Palo Alto Networks), Sophos Certified Engineer

1:30pm - 2:00pmSession Seven

David Hood
Director of Technology Marketing

There Will be Attacks – Improve your Email Defenses  

If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes.  If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.

In this session, you’ll learn:

  • How your email can be used as an entry point for multiple types of attack
  • The damaging impact attacks have on organizations
  • Why your employees could be the weakest link in your email security
  • How to enhance your email security and thus your overall cyber resilience

Download the Presentation

2:00pm - 2:15pmBreak / Vendor Booth Time
2:15pm - 2:45pmSession Eight

Elaine Poellhuber
Business Development and Client Service

Email threat landscape – report from the trenches

Email is still the number one vulnerability in any organization’s security system. Today’s IT Security experts are most concerned about ransomware and SpearPhishing. Both threats are on the rise and constantly evolving into new, harder to detect forms. Several real life examples of both types of threats will be examined with some detailed explanations about cybercriminal’s modus operandi. Prevention solutions and strategies will also be discussed.

Download the Presentation

Speaker Bio:

Elaine Poellhuber is a partner at ZEROSPAM Security. In her sales and channel leaderhip role, she has been involved in solving customer’s email headaches for 9 years. She has an in-depth understanding not only of customer needs but also of all email related protocols and best practices. She has played a key project management role in implementing ZEROSPAM with enterprise accounts in the energy, insurance and legal sector

2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:45pmSession Nine

Jon McCarrick
Partner Technology Evangelist from Acronis

 

Defeating the Ransomware Army on Your Doorstep

Ransomware is destined to be a multi-billion dollar problem this year.  Learn some of the proactive measures you can take with your customers to keep them safe from this threat using cloud backup and monitoring products.  Backup has become one of the primary tools for defeating ransomware.  Some of the latest advances using blockchain technology, encryption and proactive monitoring can stop ransomware it its tracks. Also learn how to bundle and cross-sell other products based on your connection to the customer.

3:45pm - 4:15pmSession Ten

Terry Zoryk
Sales Director, Canada

Digital Resilience requires a new approach. It takes actionable intelligence

Redseal provides a cybersecurity analytics platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives Our advanced analytics engine creates functioning model so you can understand and continuously monitor your whole network. Measure resilience with your RedSeal Digital Resilience Score, you can measure, benchmark, and set targets to actively manage the digital resilience of your network and security infrastructure. Verify compliance by revealing configuration errors and discovering unintended access paths, the RedSeal security analytics platform helps you verify compliance with established operating standards, policies and regulations. Accelerate response to security incidents and network vulnerabilities.

4:15pm - 4:45pmSession Eleven

Dmitri Li
Systems Engineer

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one.  Backup solutions don’t solve these problems as they are not true disaster recovery for the business.  What types of disasters will impact the business?  Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience.  Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

Sponsors