- This event has passed.
October 11 @ 8:00 am - 5:00 pm
The Anaheim Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cybersecurity Strategies Conference
Senior Director, Product Marketing
Wireless Opportunity with Sophos Central
How can you win every opportunity with Sophos Central and Wireless with EP/Mobile integration and Synchronized Security.
Shail is a seasoned product management leader with more than 17 years of experience in Wireless, Mobility and scalable cloud-based infrastructure. He leads Sophos’ Wireless initiative and drives strategy, product-engineering life cycle for wireless product line(s) including UTM/XG + Wireless and Sophos Cloud based Wireless, apps and analytics.
What Comes Next in Wi-Fi: 802.11ax & Why Increasing Speed Isn’t Enough
Optimizing user mobile experience requires more than just high speed Wi-Fi. IT professionals are facing challenges of capacity, flexibility, security, privacy, and visibility as they evaluate complex combinations of WLAN standards, management, and technology like OFDMA. This session covers 802.11ac and 802.11ax, data analytics, and building robust wireless networks.
- Current & future Wi-Fi trends
- How to prepare for an influx of Wi-Fi devices (IoT & others)
- Planning for capacity, visibility, & control
- 802.11ax deep dive
Alexandra Gates is a Principal Product Marketing Manager at Aerohive Networks, where she helps define market strategy and vision for the cloud and WLAN products. She is a CWNA with a comprehensive background in wireless technology, including capacity and management planning, RF design, network implementation, and general industry knowledge.
Regional Account Manager
A new approach to email security for Office 365
For hackers, Office 365 is the new black!
Because a simple set of Office 365 credentials can give you access to sensitive documents, applications and confidential business information, Office 365 is now the go-to place for cybercriminals looking to make a fast and high profit.
Each day these hackers implement new and always more creative phishing and spear-phishing attacks, that easily bypass the traditional email security solutions.
Discover what their techniques are, and learn what you can do to prevent cybercriminals from breaking into your organization with just a single email.
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
Security Global Enablement Manager
Create a Culture of Cyber Security Leadership
In support of National Cyber Security Awareness Month this session will focus on enabling business leaders at your organization to prioritize and discuss security in their transformation initiatives. It’s time to open managers eyes to the fact that while you have implemented security controls and good policy, without proactive measures 1 in 14 employees will fall victim to social engineering attacks. In this interactive session we will discuss how you can help change the culture of your organization to create Cyber Security Champions that integrate security best practices like NIST into business transformation. We will help simplify the security discussion across Software Development, Identity and Information Governance, Access Controls, Data Encryption and Security Monitoring. Leave with actionable ideas and content you can use to change the game and build a culture of Cyber Security Leadership that supports your next business transformation.
- Today’s IT is creating a cyber exposure gap
- Who’s affected?
- How to reduce your cyber exposure gap