- This event has passed.
November 1 @ 8:15 am - 3:30 pm
The Calgary Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech Security Strategies Conference.
Business Development Manager
How to Build an Effective Identity Management Program
Micro Focus, a global leader in Identity Management, will share best practices on “ How to Build an Effective Identity Management Program”. We’ll present identity management concepts and components; developing an effective strategy and roadmap; implementation success factors; the IDM operational model; and governance and technical best practices. You’ll learn how organizations across Canada are using identity management to reduce risk, improve compliance, maximize efficiency, and grow revenue.
Gino Levine is the Western Canada Business Development Manager for Micro Focus’ Identity Management practice. He has over 15 years of experience consulting, selling and implementing Identity Management solutions. Micro Focus is recognized as a Leader in the Identity Management space.
Solution Account Director, Security
Enabling Business Growth with Trusted Digital Relationships
The Application Economy is changing everything. Traditional business models are shifting, digital disrupters are gaining ground, and customers want fast, reliable secure transactions. This means that organizations need to enhance customer relationships through new digital channels.
This session will talk about how the app economy is increasing the pressure and changing the way users are interacting with and buying from your company. Every company, regardless of industry, must make the pivot to appeal to those new buying patterns and ways that customers are engaging. Your Board and your CEO are expecting these new services and applications to be delivered. Listen to examples of how the leaders in the industry have done it.
Disaster Happens – Don’t Be Held Hostage
Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest additions to their arsenal – EVault & DoubleTake. We’ll also cover best practices for backing up your data and how you can take your defenses to the next level with DRaaS.
What CISOs fear, and why
According to independent Industry reports, the Internet is the source of the majority of data breaches, and the Internet is also becoming the de-facto corporate WAN. Zscaler will explore the challenges resulting from these realities, and will present an architectural approach to providing achievable security for all users in the Enterprise, whether at the office, or elsewhere.
Country Manager – Canada
The Foundation for Digital Resilience – A contextual understanding of risk – AT ALL TIMES
Providing a network modeling and risk scoring platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives. RedSeals advanced analytics engine creates a functioning model of your entire as built network so you can understand and continuously monitor your whole network, accelerate response to security incidents and network vulnerabilities. Measure resilience with your RedSeal Digital Resilience Score, benchmark, and set targets to actively manage the digital resilience of your network and security posture.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Cyber Security Regional Director
The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis.
Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, new ‘immune system’ technologies are capable of learning the ‘self’ of an organization. By analyzing every network, device, and user, and modeling them as they go about their day-to-day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behavior. It can therefore spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat.
Rules and signatures are not keeping pace with today’s rapidly evolving cyber attacks. The Enterprise Immune System represents a fundamental step-change in automated cyber defense, is relied upon by organizations around the world, and can cover up to millions of devices.
In this session, learn:
· How new machine learning and mathematics are automating advanced cyber defense
· Why 100% network visibility allows you to detect threats as they happen, or before they happen
· How smart prioritization and visualization of threats allows for better resource allocation and lower risk
· Real-world examples of unknown threats detected by ‘immune system’ technology
Lauren Koenig is a Cyber Security Regional Director at Darktrace, the world’s leading machine learning company for cyber defense. She has worked extensively with clients across numerous industry verticals, from utilities to education, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autonomously responding to early-stage cyber-threats. Lauren graduated with a master’s degree from the University of Edinburgh and from the London School of Economics. She is based out of Darktrace’s Vancouver office.
VP of Business Development
Identity and the Internet of Things: Knowing Your Device is Securing Your Device
The new rule for the future, anything that can be connected, will be connected. In this evolving world of IoT, digital certificates offer a layer of security that is not only cost-effective and efficient, but that also works well for devices with small power footprints and IoT systems that need to scale to meet high volume requirements. Public Key Infrastructure (PKI) is a trust framework composed of hardware, software, people, policies and procedures needed to securely create, manage, distribute, store and revoke trusted digital certificates and manage public key encryption. A PKI supporting the issuance of trusted certificates in the expanding market of IoT devices differs significantly from typical enterprise PKI.
Judah Aspler is Vice President of Business Development at Certified Security Solutions (CSS). Mr. Aspler is responsible for IoT strategy as well as strategic alliances and channel. Headquartered in Cleveland, Ohio, CSS is a leading cybersecurity company that builds software platforms to securely connect people, applications and devices to business ecosystems. CSS cloud platforms facilitate the ability to identify, authenticate, secure and manage digital assets across the Enterprise and the Internet of Things (IoT). Mr. Aspler joined CSS in 2014, and has focused on expanding the company’s digital identity and security footprint into the world of IoT, courtesy of its CMS VerdeTTo solutions designed for the unique requirements of devices and platforms in the Internet of Things. Prior to joining CSS, Mr. Aspler spent 15 years working in the digital security world, including 8 years at Microsoft, focused on the North American Identity & Security and Mobile Device Management business units.
It’s 4:21am – do You know what’s on YOUR network?