
- This event has passed.
Vancouver (Cybersecurity)
June 15, 2017 @ 8:15 am - 5:15 pm
Event Navigation
Overview
The Vancouver Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: sales@dataconnectors.com

Data Connectors is proud to host the Tech Security Strategies Conference.

Gino Levine
Business Development Manager
How to Build an Effective Identity Management Program
Micro Focus, a global leader in Identity Management, will share best practices on “ How to Build an Effective Identity Management Program”. We’ll present identity management concepts and components; developing an effective strategy and roadmap; implementation success factors; the IDM operational model; and governance and technical best practices. You’ll learn how organizations across Canada are using identity management to reduce risk, improve compliance, maximize efficiency, and grow revenue.
Speaker’s Bio:
Gino Levine is the Western Canada Business Development Manager for Micro Focus’ Identity Management practice. He has over 15 years of experience consulting, selling and implementing Identity Management solutions. Micro Focus is recognized as a Leader in the Identity Management space.

Sean Power
Solutions Architect
Evaluating DoS Protection – Old DoS / New Tricks
Denial of Service attacks are evolving. We are seeing more attacks, with a greater variety of techniques than ever before. Modern attacks are skilled at evading detection and wreaking havoc in surprising ways.
This session will take a practical look at denial of service mitigation with respect to modern attacks. Find out what it takes to stop modern attacks and if your current solution still offers all the protection you need.

Alan Hrabinski
Solution Account Director, Security
Enabling Business Growth with Trusted Digital Relationships
The Application Economy is changing everything. Traditional business models are shifting, digital disrupters are gaining ground, and customers want fast, reliable secure transactions. This means that organizations need to enhance customer relationships through new digital channels.
This session will talk about how the app economy is increasing the pressure and changing the way users are interacting with and buying from your company. Every company, regardless of industry, must make the pivot to appeal to those new buying patterns and ways that customers are engaging. Your Board and your CEO are expecting these new services and applications to be delivered. Listen to examples of how the leaders in the industry have done it.

Dave Browne
Solutions Engineer
Disaster Happens; Don’t Be Held Hostage
Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest additions to their arsenal – EVault & DoubleTake. We’ll also cover best practices for backing your data and how you can take your defenses to the next level with DRaaS.

Paul Wilson
Senior Sales Engineer
What CISOs fear, and why
According to independent Industry reports, the Internet is the source of the majority of data breaches, and the Internet is also becoming the de-facto corporate WAN. Zscaler will explore the challenges resulting from these realities, and will present an architectural approach to providing achievable security for all users in the Enterprise, whether at the office, or elsewhere.

Achmad Chadran
Product Marketing Manager
There Will be Attacks – Improve your Email Defenses
If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes. If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience

Sandeep Lota
Systems Engineer
The Game Has Changed…Ready or Not

Ben Hui
Manager of Engineering
The Enemy Within: Detecting and Mitigating Insider Threats
Ransomware is both scourge and savior. While it’s not typically considered an insider threat, it acts from the inside, using insider identities, encrypting files that insiders have access to on endpoints and file shares. Learn how organizations are using ransomware to identify and confront vulnerabilities that expose them to rogue employees, abusive administrators, and hackers.

Charles Ravenhill
Territory Manager
Take Your Security Program to the Next Level with Security Frameworks
There is no “easy button” for security framework implementation. Learn how to get started with the Center for Internet Security’s Foundational Cyber Hygiene controls – the highest pay-off controls which are core to all security frameworks. Understand how control automation can help you understand and communicate risk.
Learning Objectives:
• Why organizations are adopting security frameworks
• Foundational controls to automate first
• What automation must accomplish
• How to build on the foundational controls
Speaker’s Bio:
Charles Ravenhill serves as the Territory Manager for Tenable’s Vulnerability Management solutions, with 15+ years experience helping companies in Western Canada secure their businesses and reputations. Tenable, the founders of Nessus®, is a leader in vulnerability management with a platform for today’s modern assets – cloud, containers, web apps and more.

Matt Berndardt
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Ajay K. Sood
VP, Country Manager
Internet Security Threat Report
Speaker’s Bio:
With over 20 years of real-life, in-the-trenches business experience in the IT security space, Ajay is a seasoned veteran when it comes to introducing disruptive security brands to the Canadian market. He currently serves as the Vice-President and General Manager for Symantec Canada where he is on a mission to evangelize the importance for entities to stay ahead of the curve when it comes to architecting and operating their cyber security defenses.

Jeff Costlow
Director of Security
Machine Learning for Security
Machine learning can be used to detect anomalous behavior in the network. This technical talk will talk about some of the features used in machine learning and directions in applying machine learning to security.

Lauren Koenig
Sales Executive
The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks
With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.
This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.
Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defense, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.
In this session, learn about:
- The new age of silent, stealthy attacks that lie low in networks for weeks and months
- Why legacy approaches, like rules and signatures, are proving inadequate on their own
- How new ‘immune system’ technologies based on advanced mathematics and machine learning are being deployed today
- Real-world examples of subtle, unknown threats that routinely bypass traditional controls