Loading Events

« All Events

  • This event has passed.

Boston (Cybersecurity)

June 14 @ 8:00 am - 5:00 pm

Event Navigation

Details

Date:
June 14
Time:
8:00 am - 5:00 pm
Event Category:

Venue

Boston Park Plaza
50 Park Plaza
Boston, MA 02116
United States
  + Google Map
Phone:
617.426.2000
Website:
https://www.bostonparkplaza.com/hotel

Overview

The Boston Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cyber Security Strategies Conference.

8:45am - 9:15amSession One

Michael Mokos
Fortinet

David Leinberry
Fortinet

Creating an automated end to end security Fabric to proactively protect from malicious cyber threats

Join us for a 30 minute technical overview and live demonstration of the importance of having an end to end security fabric – to protect your network, Intellectual property/assets and customer information from APT’s, Zero – Days and Ransomware.  Centered around Sandbox and integrated to all ends of your network, including: Mail, FortiGate (firewall), FortiClient (endpoint) and FortiWeb (web application firewall). See how Fortinet’s security fabric, provocatively blocks malware threats before they get to an end user at the mail level, automatically updates FortiGate (firewalls) on the fly and quarantines at the end-point.  Also, scanning of east west traffic, on demand, in addition to scheduled File Share scans of NFS/CIFS.  10 Minute overview and 20 minute live demonstration on the interphases.

Download the Presentation

9:15am - 9:45amSession Two

Scott Ferguson
Principal Product Marketing Manager

The Bots are Coming!

Actually, they are here. They now represent over 50 percent of internet traffic. But not all bots are bad. There are many good bots, such as chat bots and search engine bots, that we rely on in our day-to-day digital lives. You do need to know the difference and take control of your bot traffic—they cannot be ignored and you cannot just block them all. In this presentation, we will look at the growth of bots, good bots versus bad bots, what to look for in a bot mitigation solution and a few use cases.

Download the Presentation

Speaker’s Bio:

Scott is a technologist with a passion for creating and bringing to market solutions that meet customer requirements and contribute to the financial growth of the business. Scott brings over 28 years of experience in networking, data communications, software, cloud and security solutions to his role at Oracle Dyn. He has held numerous senior level positions in engineering, product management, and product marketing at both startups and fortune 500 companies.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Justin Walker
Channel Sales Engineer

A Day in the Life

10:45am - 11:15amSession Four

Jonathan Lange
Executive Sales Manager

Innovative Endpoint Management – A Holistic Approach to Vulnerability Management, Patching, OS-Upgrades and Software Distribution

Zero Day Vulnerability, Windows Fall Anniversary Update, Office 365 Migration: Are any of these topics causing your blood pressure to rise? This seminar will show you how you can automate OS-migrations, software deployment projects, and effective security exploit management all from one easy to use Endpoint Management Suite. No university degree or nerd glasses required – buckle up!

Download the Presentation

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Dave Senarian
Account Executive

Win Big with IT Resilience

In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.

Download the Presentation

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Avi Elkoni
COO CTO

Information Security “Outside the Box” 

Authentication, encryption, access control, audits and other must-have security measures are all well and fine, but what else can you do to secure your information when users are on the move? Let’s take a step back and explore some less conventional ways to think about information security and mobility. We will cover some simple strategies that are often ignored. These methods might never make exciting news but they can help protect your information against some of the most common threats and, in conjunction with your must-haves, provide more complete protection.

Speaker’s Bio:  

Avi Elkoni has more than 20 years of experience in Software Product development, operations and marketing.

Prior to joining the Vaporstream® team, Avi headed US Operations for Equivio, Inc. (acquired by Microsoft in December of 2014). While at Equivio, he oversaw the growth of the company’s Rockville, MD headquarters, developed and delivered industry-acclaimed seminars, and contributed significantly to new business growth.
Prior to joining Equivio, Avi spent most of his 20-year career with software product companies and served as Vice President of Software Development with several companies including the Information Governance Division of CA Inc.
Avi has a Bachelor of Science degree in Computer Science from Bar Ilan University.

1:00pm - 1:30pmSession Seven

Madeline Brown

 

Why automated threat analysis and detection is critical for enterprise security

Learn how automated threat analysis and detection can close the gaps in your enterprise security framework. We will walk you through the basics of sandboxing and automated analysis and explain how VMRay Analyzer can be seamlessly integrated into your existing security infrastructure.

Download the Presentation

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

Steven Overko
Enterprise Solutions Engineer

Advanced Attackers And Evolving Enterprise Defenses

Advanced attackers are always looking for ways to attack organizations. The growing use of traffic encryption — over 50% of Web traffic today is encrypted — provides a simple trick for attackers to hide their threats and communications channels. Exploit kits, malware, adware, callbacks, as well as command & control channels leverage encrypted communications to infiltrate organizations and exfiltrate information. Fileless attacks are also becoming more common as a way to bypass traditional defenses. Come and learn about these emerging threats and what can be done to stop them.

Download the Presentation

2:15pm - 2:45pmSession Nine

Kevin Kennedy
Senior Sales Engineer

Cybercrime Threats & Techniques:  State of Malware

In 2017, hackers had a huge impact on businesses, with major outbreaks of ransomware like WannaCry and NotPetya.  Join Malwarebytes to look back as we take a deep dive in what threats grabbed not only our attention but the world’s attention and hear our predictions for 2018.

Download the Presentation

Speaker’s Bio:

Kevin Kennedy joined Malwarebytes to provide senior-level, pre-sales technical support in the Northeast.  Previous stints included Ziften, an Endpoint Detection & Response vendor, and 10 years at Symantec/Veritas.  Specific areas of concentration included channel enablement and public sector customers.

2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:30pmSession Ten

John Cilli
Regional Sales Manager

Shawn McCabe
Systems Engineer

 

Rethink Security with Zero Trust

Last year $86B was spent on cybersecurity yet a stunning 2/3rds of companies were still breached. And worse, those that were breached averaged five or more separate breaches. Bottom line: Something has to change. Today’s security is not secure.

Download the Presentation

3:30pm - 4:00pmSession Eleven

Perry Correll
Product Management Director

The Top 5 Wi-Fi Security Mistakes and How to Avoid Them

Attend our Wi-Fi security presentation and see how to avoid the top 5 deployment mistakes that leave managers and their networks open to compromise.

As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.

So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:

  • The top 5 Wi-Fi security mistakes
  • Viewing exactly what’s happening on your network
  • Building an authentication and encryption model that doesn’t force user workarounds
  • Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
  • Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
4:00pm - 4:30pmSession Twelve

Shawn Reilly
Executive Director, Sales

 

Next Generation Threat Hunting “Malware Analysis Simplified

Infocyte HUNT is a dissolvable agent based cyber security software solution that is easy-to-use, yet powerful to limit risk and eliminate dwell time by enabling an organization’s own IT and security professionals to proactively discover malware and persistent threats, active or dormant, that have successfully breached existing defenses.  HUNT will assume all endpoints are compromised, spend a few minutes on each and then use Forensic State Analysis (FSA) to find definitive proof.

Download the Presentation

Prize Drawings for All in Attendance
4:30pm - 5:00pmSession Thirteen

John Dubay
Director

Jerome Tanberg
Security Engineer

Stop the Data Breach – Its all about the User

Download the Presentation

Prize Drawings for All in Attendance

Sponsors