- This event has passed.
June 14 @ 8:00 am - 5:00 pm
The Boston Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Cyber Security Strategies Conference.
Creating an automated end to end security Fabric to proactively protect from malicious cyber threats
Join us for a 30 minute technical overview and live demonstration of the importance of having an end to end security fabric – to protect your network, Intellectual property/assets and customer information from APT’s, Zero – Days and Ransomware. Centered around Sandbox and integrated to all ends of your network, including: Mail, FortiGate (firewall), FortiClient (endpoint) and FortiWeb (web application firewall). See how Fortinet’s security fabric, provocatively blocks malware threats before they get to an end user at the mail level, automatically updates FortiGate (firewalls) on the fly and quarantines at the end-point. Also, scanning of east west traffic, on demand, in addition to scheduled File Share scans of NFS/CIFS. 10 Minute overview and 20 minute live demonstration on the interphases.
The Bots are Coming!
Actually, they are here. They now represent over 50 percent of internet traffic. But not all bots are bad. There are many good bots, such as chat bots and search engine bots, that we rely on in our day-to-day digital lives. You do need to know the difference and take control of your bot traffic—they cannot be ignored and you cannot just block them all. In this presentation, we will look at the growth of bots, good bots versus bad bots, what to look for in a bot mitigation solution and a few use cases.
Scott is a technologist with a passion for creating and bringing to market solutions that meet customer requirements and contribute to the financial growth of the business. Scott brings over 28 years of experience in networking, data communications, software, cloud and security solutions to his role at Oracle Dyn. He has held numerous senior level positions in engineering, product management, and product marketing at both startups and fortune 500 companies.
Channel Sales Engineer
A Day in the Life
Executive Sales Manager
Innovative Endpoint Management – A Holistic Approach to Vulnerability Management, Patching, OS-Upgrades and Software Distribution
Zero Day Vulnerability, Windows Fall Anniversary Update, Office 365 Migration: Are any of these topics causing your blood pressure to rise? This seminar will show you how you can automate OS-migrations, software deployment projects, and effective security exploit management all from one easy to use Endpoint Management Suite. No university degree or nerd glasses required – buckle up!
Win Big with IT Resilience
In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.
Information Security “Outside the Box”
Authentication, encryption, access control, audits and other must-have security measures are all well and fine, but what else can you do to secure your information when users are on the move? Let’s take a step back and explore some less conventional ways to think about information security and mobility. We will cover some simple strategies that are often ignored. These methods might never make exciting news but they can help protect your information against some of the most common threats and, in conjunction with your must-haves, provide more complete protection.
Avi Elkoni has more than 20 years of experience in Software Product development, operations and marketing.
Prior to joining the Vaporstream® team, Avi headed US Operations for Equivio, Inc. (acquired by Microsoft in December of 2014). While at Equivio, he oversaw the growth of the company’s Rockville, MD headquarters, developed and delivered industry-acclaimed seminars, and contributed significantly to new business growth.
Prior to joining Equivio, Avi spent most of his 20-year career with software product companies and served as Vice President of Software Development with several companies including the Information Governance Division of CA Inc.
Avi has a Bachelor of Science degree in Computer Science from Bar Ilan University.
Why automated threat analysis and detection is critical for enterprise security
Learn how automated threat analysis and detection can close the gaps in your enterprise security framework. We will walk you through the basics of sandboxing and automated analysis and explain how VMRay Analyzer can be seamlessly integrated into your existing security infrastructure.
Enterprise Solutions Engineer
Advanced Attackers And Evolving Enterprise Defenses
Advanced attackers are always looking for ways to attack organizations. The growing use of traffic encryption — over 50% of Web traffic today is encrypted — provides a simple trick for attackers to hide their threats and communications channels. Exploit kits, malware, adware, callbacks, as well as command & control channels leverage encrypted communications to infiltrate organizations and exfiltrate information. Fileless attacks are also becoming more common as a way to bypass traditional defenses. Come and learn about these emerging threats and what can be done to stop them.
Senior Sales Engineer
Cybercrime Threats & Techniques: State of Malware
In 2017, hackers had a huge impact on businesses, with major outbreaks of ransomware like WannaCry and NotPetya. Join Malwarebytes to look back as we take a deep dive in what threats grabbed not only our attention but the world’s attention and hear our predictions for 2018.
Kevin Kennedy joined Malwarebytes to provide senior-level, pre-sales technical support in the Northeast. Previous stints included Ziften, an Endpoint Detection & Response vendor, and 10 years at Symantec/Veritas. Specific areas of concentration included channel enablement and public sector customers.
Regional Sales Manager
Rethink Security with Zero Trust
Last year $86B was spent on cybersecurity yet a stunning 2/3rds of companies were still breached. And worse, those that were breached averaged five or more separate breaches. Bottom line: Something has to change. Today’s security is not secure.
Product Management Director
The Top 5 Wi-Fi Security Mistakes and How to Avoid Them
Attend our Wi-Fi security presentation and see how to avoid the top 5 deployment mistakes that leave managers and their networks open to compromise.
As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.
So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:
- The top 5 Wi-Fi security mistakes
- Viewing exactly what’s happening on your network
- Building an authentication and encryption model that doesn’t force user workarounds
- Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
- Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
Executive Director, Sales
Next Generation Threat Hunting “Malware Analysis Simplified
Infocyte HUNT is a dissolvable agent based cyber security software solution that is easy-to-use, yet powerful to limit risk and eliminate dwell time by enabling an organization’s own IT and security professionals to proactively discover malware and persistent threats, active or dormant, that have successfully breached existing defenses. HUNT will assume all endpoints are compromised, spend a few minutes on each and then use Forensic State Analysis (FSA) to find definitive proof.
Stop the Data Breach – Its all about the User