Loading Events

« All Events

  • This event has passed.

Vancouver (Cybersecurity)

June 15 @ 8:15 am - 5:15 pm

Details

Date:
June 15
Time:
8:15 am - 5:15 pm
Event Category:

Venue

Fairmont Waterfront
900 Canada Place Way
Vancouver,BCV6C 3L5Canada  + Google Map
Phone:
(604) 691-1991
Website:
http://www.fairmont.com/waterfront-vancouver/

Overview

The Vancouver Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech Security Strategies Conference.

8:45am - 9:30amSession One

Gino Levine
Business Development Manager

How to Build an Effective Identity Management Program 

Micro Focus, a global leader in Identity Management, will share best practices on “ How to Build an Effective Identity Management Program”. We’ll present identity management concepts and components; developing an effective strategy and roadmap; implementation success factors; the IDM operational model; and governance and technical best practices. You’ll learn how organizations across Canada are using identity management to reduce risk, improve compliance, maximize efficiency, and grow revenue.

Download the Presentation

Speaker’s Bio:

Gino Levine is the Western Canada Business Development Manager for Micro Focus’ Identity Management practice. He has over 15 years of experience consulting, selling and implementing Identity Management solutions. Micro Focus is recognized as a Leader in the Identity Management space.

9:30am - 10:00amSession Two

Sean Power
Solutions Architect

Evaluating DoS Protection – Old DoS / New Tricks

Denial of Service attacks are evolving.  We are seeing more attacks, with a greater variety of techniques than ever before.  Modern attacks are skilled at evading detection and wreaking havoc in surprising ways.

This session will take a practical look at denial of service mitigation with respect to modern attacks.  Find out what it takes to stop modern attacks and if your current solution still offers all the protection you need.

10:00am - 10:15amBreak / Vendor Booth Time
10:15am - 11:00amSession Three

Alan Hrabinski
Solution Account Director, Security

 

Enabling Business Growth with Trusted Digital Relationships 

The Application Economy is changing everything. Traditional business models are shifting, digital disrupters are gaining ground, and customers want fast, reliable secure transactions. This means that organizations need to enhance customer relationships through new digital channels.

This session will talk about how the app economy is increasing the pressure and changing the way users are interacting with and buying from your company. Every company, regardless of industry, must make the pivot to appeal to those new buying patterns and ways that customers are engaging. Your Board and your CEO are expecting these new services and applications to be delivered. Listen to examples of how the leaders in the industry have done it.

Download the Presentation

11:00am - 11:30amSession Four

Dave Browne
Solutions Engineer

Disaster Happens; Don’t Be Held Hostage

Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest additions to their arsenal – EVault & DoubleTake. We’ll also cover best practices for backing your data and how you can take your defenses to the next level with DRaaS.

Download the Presentation

11:30am - 12:00pmBreak / Vendor Booth Time / Lunch
12:00pm - 12:30pmSession Five

Paul Wilson
Senior Sales Engineer

What CISOs fear, and why

According to independent Industry reports, the Internet is the source of the majority of data breaches, and the Internet is also becoming the de-facto corporate WAN. Zscaler will explore the challenges resulting from these realities, and will present an architectural approach to providing achievable security for all users in the Enterprise, whether at the office, or elsewhere.

Download the Presentation 

12:30pm - 12:45pmBreak / Vendor Booth Time
12:45pm - 1:15pmSession Six

Achmad Chadran
Product Marketing Manager

There Will be Attacks – Improve your Email Defenses  

If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes.  If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.

In this session, you’ll learn:

  • How your email can be used as an entry point for multiple types of attack
  • The damaging impact attacks have on organizations
  • Why your employees could be the weakest link in your email security
  • How to enhance your email security and thus your overall cyber resilience

Download the Presentation

1:15pm - 1:45pmSession Seven

Sandeep Lota
Systems Engineer

The Game Has Changed…Ready or Not

Download the Presentation

1:45pm - 2:00pmBreak / Vendor Booth Time
2:00pm - 2:30pmSession Eight

Ben Hui 
Manager of Engineering

The Enemy Within: Detecting and Mitigating Insider Threats

Ransomware is both scourge and savior. While it’s not typically considered an insider threat, it acts from the inside, using insider identities, encrypting files that insiders have access to on endpoints and file shares. Learn how organizations are using ransomware to identify and confront vulnerabilities that expose them to rogue employees, abusive administrators, and hackers.

2:30pm - 3:00pmSession Nine

Charles Ravenhill
Territory Manager

Take Your Security Program to the Next Level with Security Frameworks

There is no “easy button” for security framework implementation. Learn how to get started with the Center for Internet Security’s Foundational Cyber Hygiene controls – the highest pay-off controls which are core to all security frameworks. Understand how control automation can help you understand and communicate risk.

Learning Objectives:
• Why organizations are adopting security frameworks
• Foundational controls to automate first
• What automation must accomplish
• How to build on the foundational controls

Speaker’s Bio:

Charles Ravenhill serves as the Territory Manager for Tenable’s Vulnerability Management solutions, with 15+ years experience helping companies in Western Canada secure their businesses and reputations.  Tenable, the founders of Nessus®, is a leader in vulnerability management with a platform for today’s modern assets – cloud, containers, web apps and more.

3:00pm - 3:15pmBreak / Vendor Booth Time
3:15pm - 3:45pmSession Ten

Matt Berndardt

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one.  Backup solutions don’t solve these problems as they are not true disaster recovery for the business.  What types of disasters will impact the business?  Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience.  Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

3:45pm - 4:15pmSession Eleven

Ajay K. Sood
VP, Country Manager

Internet Security Threat Report

Speaker’s Bio:

With over 20 years of real-life, in-the-trenches business experience in the IT security space, Ajay is a seasoned veteran when it comes to introducing disruptive security brands to the Canadian market.  He currently serves as the Vice-President and General Manager for Symantec Canada where he is on a mission to evangelize the importance for entities to stay ahead of the curve when it comes to architecting and operating their cyber security defenses.

4:15pm - 4:45pmSession Twelve

Jeff Costlow
Director of Security

Machine Learning for Security

Machine learning can be used to detect anomalous behavior in the network. This technical talk will talk about some of the features used in machine learning and directions in applying machine learning to security.

 

Prize Drawings for All in Attendance
4:45pm - 5:15pmSession Thirteen

Lauren Koenig
Sales Executive

The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks  

With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.

This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.

Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defense, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.

In this session, learn about:

  • The new age of silent, stealthy attacks that lie low in networks for weeks and months
  • Why legacy approaches, like rules and signatures, are proving inadequate on their own
  • How new ‘immune system’ technologies based on advanced mathematics and machine learning are being deployed today
  • Real-world examples of subtle, unknown threats that routinely bypass traditional controls
Prize Drawings for All in Attendance

Sponsors