Loading Events

« All Events

Toronto

May 11 @ 8:15 am - 5:00 pm

Event Navigation

Details

Date:
May 11
Time:
8:15 am - 5:00 pm

Venue

Hyatt Regency Toronto
370 King Street West
Toronto,OntarioM5V 1J9Canada
Phone:
1-416-343-1234
Website:
http://torontoregency.hyatt.com/en/hotel/home.html?src=agn_mls_hr_lclb_blocal_torrt

Overview

The Toronto Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:30amSession One

Pete Morrison
Sr. Director, Solution Sales

Enabling Business Growth with Trusted Digital Relationships 

The Application Economy is changing everything. Traditional business models are shifting, digital disrupters are gaining ground, and customers want fast, reliable secure transactions. This means that organizations need to enhance customer relationships through new digital channels.

This session will talk about how the app economy is increasing the pressure and changing the way users are interacting with and buying from your company. Every company, regardless of industry, must make the pivot to appeal to those new buying patterns and ways that customers are engaging. Your Board and your CEO are expecting these new services and applications to be delivered. Listen to examples of how the leaders in the industry have done it.

9:30am - 10:00amSession Two
10:00am - 10:30amBreak / Vendor Booth Time
10:30am - 11:15amSession Three
11:15am - 11:45amSession Four
11:45am - 12:15pmBreak / Vendor Booth Time / Lunch
12:15pm - 12:45pmSession Five
12:45pm - 1:00pmBreak / Vendor Booth Time
1:00pm - 1:30pmSession Six

Keep Ransomware Out.  How you can stop ransomware and exploits before they strike

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

·        Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
·        Detect: quickly and easily detect and isolate attacks
·        Respond: laser in on critical alerts and address them with simple to understand security intelligence

 

1:30pm - 2:00pmSession Seven

David Hood
Director of Technology Marketing

There Will be Attacks – Improve your Email Defenses  

If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes.  If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.

In this session, you’ll learn:

  • How your email can be used as an entry point for multiple types of attack
  • The damaging impact attacks have on organizations
  • Why your employees could be the weakest link in your email security
  • How to enhance your email security and thus your overall cyber resilience

Download the Presentation

2:00pm - 2:15pmBreak / Vendor Booth Time
2:15pm - 2:45pmSession Eight

Elaine Poellhuber
Business Development and Client Service

Email threat landscape – report from the trenches

Email is still the number one vulnerability in any organization’s security system. Today’s IT Security experts are most concerned about ransomware and SpearPhishing. Both threats are on the rise and constantly evolving into new, harder to detect forms. Several real life examples of both types of threats will be examined with some detailed explanations about cybercriminal’s modus operandi. Prevention solutions and strategies will also be discussed.

Speaker Bio:

Elaine Poellhuber is a partner at ZEROSPAM Security. In her sales and channel leaderhip role, she has been involved in solving customer’s email headaches for 9 years. She has an in-depth understanding not only of customer needs but also of all email related protocols and best practices. She has played a key project management role in implementing ZEROSPAM with enterprise accounts in the energy, insurance and legal sector

2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:45pmSession Nine

3:45pm - 4:15pmSession Ten

Terry Zoryk
Sales Director, Canada

4:15pm - 4:45pmSession Eleven

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one.  Backup solutions don’t solve these problems as they are not true disaster recovery for the business.  What types of disasters will impact the business?  Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience.  Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

Sponsors