- This event has passed.
July 19 @ 8:00 am - 3:00 pm
The Hartford Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Key Account Manager – North America
9 Pitfalls To Avoid When Implementing an IAM Solution
IAM implementations are fraught with both technical and career challenges and dangers. In this 30-minute briefing, we’ll review some of the most common pitfalls encountered by teams implementing IAM solutions and review the best practices in order to avoid them – and be a hero.
Executive Sales Manager
Innovative Endpoint Management – A Holistic Approach to Vulnerability Management, Patching, OS-Upgrades and Software Distribution
Zero Day Vulnerability, Windows Fall Anniversary Update, Office 365 Migration: Are any of these topics causing your blood pressure to rise? This seminar will show you how you can automate OS-migrations, software deployment projects, and effective security exploit management all from one easy to use Endpoint Management Suite. No university degree or nerd glasses required – buckle up!
Why attackers love email and what you can do about it
Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Senior Sales Engineer
Cybercrime Threats & Techniques: State of Malware
In 2017, hackers had a huge impact on businesses, with major outbreaks of ransomware like WannaCry and NotPetya. Join Malwarebytes to look back as we take a deep dive in what threats grabbed not only our attention but the world’s attention and hear our predictions for 2018.
Kevin Kennedy joined Malwarebytes to provide senior-level, pre-sales technical support in the Northeast. Previous stints included Ziften, an Endpoint Detection & Response vendor, and 10 years at Symantec/Veritas. Specific areas of concentration included channel enablement and public sector customers.
Principal Security Consultant, SMP
Cyber Security Automation….And where it’s taking us
Jonathan has nearly a decade of experience with working in the Cyber Security Industry. During that time Jonathan has focused on educating himself and organizations on modern threats as well as the best course of action to protect against those threats. Through this methodology, Jonathan has assisted many organizations meet their security goals whether it be on the Endpoint, Network, or in the Cloud.
SecurID Access: Understanding Identity Assurance
Michael Dalton is a Sr Identity Engineer at RSA, the Security Division of Dell/EMC. Over the past 25 years, his work as a security focused field sales engineer has provided a unique insight into common challenges and creative solutions available.
Michael published Network Computing magazine articles on Preparing for a Network Audit, Content Monitoring Suites to prevent Traffic Scams, Identity and Access Management product reviews and wrote the Audit and Monitoring section of the Syngress SSCP Study Guide. He lives in West Hartford, CT with his phenomenal wife Kim, sons Ben and Clark and loves to go hiking!
Security Operations Without Going Blind
Solved: Your Shared Responsibility for Security In the Cloud
When you moved your data to the cloud, your liability for its security did not go with it. Cloud vendors call it the “Shared Responsibility Model” and it describes where their Service Level Agreement stops and your responsibility starts. To make sure there are no gaps between their technology and yours, you need to deploy many of the same tools you would deploy in your own datacenter. You need to deploy them across all your SaaS and you need to manage them across all your cloud assets.
Avanan, The Cloud Security Platform, protects data in any SaaS or IaaS. Partnering with the industry’s most trusted security vendors, it offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, insider threats and more. The cloud-based platform is completely out-of-band and can be deployed in one click. It is the next generation of cloud security.