- This event has passed.
September 6 @ 8:00 am - 5:00 pm
About Our Event
The Montreal Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Channel Sales Engineer
Stop unknown threats with Intercept X
Today’s cyberthreat landscape is becoming increasingly complex, with previously unseen malware, zero-day exploits, ransomware and file-less attacks posing significant threats to corporate and personal digital assets. At Sophos, we are at the forefront of protecting against today’s cyberthreats, with our Intercept X anti-exploit and anti-ransomware technology – designed to leverage the power of deep learning – offering comprehensive server and endpoint security. Join me as we discuss these threats and technologies in detail.
Autonomous Cyber Defense: AI and the Immune System Approach
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network – before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
In this session, learn:
- How new machine learning and mathematics are automating advanced cyber defense
- Why full network visibility allows you to detect and autonomously respond to threats
- How smart prioritization and visualization of threats allows for better resource allocation and lower risk
- Real-world examples of unknown threats detected by ‘immune system’ technology
Georgia Hamilton is a Cyber Security Account Executive at Darktrace, the world’s leading machine learning company for cyber defense. She has worked extensively with clients across numerous industry verticals, from utilities to retail helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autonomously responding to early-stage cyber-threats. Hamilton graduated with a bachelor’s degree from McGill University and is based out of Darktrace’s Ottawa, ON.
Cyber Exposure – The Next Frontier
The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program. Join us for a discussion on how companies can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.
Why attackers love email and what you can do about it
Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
How do you defend against privileged user breaches and losses?
Whether they are obtained maliciously or leveraged inappropriately by a valid user, exploited privileged user accounts are the common thread of most data breaches. And as your environment grows increasingly complex, so does the challenge of defending against ever more sophisticated—and damaging—attacks.
This session will discuss what is a privileged account, where would you find them in your organization, and best practices for managing and controlling these accounts. We will conclude with some recommendations for a privileged access management program.
Better Solutions for Privileged Access Protection
In this presentation, you will learn:
- Why businesses are adopting a “zero trust/BeyondCorp” framework
- How to best take advantage of your existing investments in CyberArk and Duo to improve the security posture of your organization
- What a working implementation of Duo with CyberArk looks like, featuring a live technical demonstration
How stealthier attacks are blurring the lines between cybercrime and statecraft
Join CrowdStrike as we reveal some of the most alarming tactics, techniques and procedures (TTPs) being employed by today’s highly sophisticated adversaries. This session addresses the enhanced risks companies face, how organizations should leverage security capabilities and resources to best defend their assets and how a robust intelligence program separates the strong from the weak in operational security.
- The current global threat landscape and some of the latest cyber trends that have been uncovered by a team of elite intelligence professionals
- Some of the most advanced tactics, techniques and procedures (TTPs) utilized by nation-state actors, which are finding their way into mainstream criminality – these are an indicator of what to prepare for
- Best practice strategies you can implement to best protect your organization from increasingly sophisticated attacks
Ken has been in IT since 1990. In the early days, he was the telecom/BBS/Shareware specialist at Crazy Irving’s. As the year 2000 crisis came to an end Ken moved to the field of IT Security. Starting off his career in IT Security at Deloitte (Security Practice). He has since had an illustrious career working for many manufacturers in the field of IT Security, including such companies as Networks Associates (aka McAfee Security), Juniper Networks (NetScreen), Cisco (IronPort), Palo Alto Networks and most recently at CrowdStrike. His passion for security, technology and fighting the good battle against Hackers comes is clearly demonstrated when you talk with him.