New Jersey (Cybersecurity)
March 15 @ 8:00 am - 5:00 pm
The New Jersey Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Channel Sales Engineer
Intercepting Advanced Threats
Sophos SE : NJ & DE, 10+ years of IT Security experience, CCIE Security – 28308, Sophos Certified Architect
The Top 5 Wi-Fi Security Mistakes and How to Avoid Them
Attend our Wi-Fi security presentation and see how to avoid the top 5 deployment mistakes that leave managers and their networks open to compromise.
As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.
So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:
- The top 5 Wi-Fi security mistakes
- Viewing exactly what’s happening on your network
- Building an authentication and encryption model that doesn’t force user workarounds
- Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
- Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
Business-Driven Security, Identity and the New Age of Risk
In the constantly changing landscape of cyber risk, security and risk management teams (including executives and board members) are increasingly forced to take ownership of and accountability relating to digital risks. Yet, many lack the critical knowledge to make effective risk management decisions and incorporate them into their overall business strategy. This inevitably leads to security strategies which are ineffective and reactionary. This presentation will outline RSA’s Business-Driven Security strategy, and will focus particularly on the importance of leveraging identity and access management (IAM) as a key tool in the battle against adversaries both within and outside your environment.
Michael Dalton is a Sr Identity Engineer at RSA, the Security Division of Dell/EMC. Over the past 25 years, his work as a security focused field sales engineer has provided a unique insight into common challenges and creative solutions available.
Michael published Network Computing magazine articles on Preparing for a Network Audit, Content Monitoring Suites to prevent Traffic Scams, Identity and Access Management product reviews and wrote the Audit and Monitoring section of the Syngress SSCP Study Guide. He lives in West Hartford, CT with his phenomenal wife Kim, sons Ben and Clark and loves to go hiking!
Global Security Sales and OEM
Shifting to AI/ML/NLP Endpoint Protection- Should organization stay with legacy endpoint security stack, migrate to NGAV, or something else?
Rick Pither runs global security sales for SparkCognition. In this role, he is responsible for driving sales of the cutting-edge AI-powered cybersecurity platform the company deploys.
Areas of specialty include IT cybersecurity, virtualization, hybrid cloud, protocol analysis and network management.
Prior to SparkCognition, Pither held various executive positions at McAfee, VMware, and Secureworks over his 24 year career. He has spoken at numerous conferences and summits, most recently at the Association of Anti-Money Laundering Specialists conference.
Pither earned his bachelor’s degree in management and marketing from Purdue University.
Regional Sales Director – East
Demystifying the Future – NextGen Solutions From A to Z
From ransomware, extortionware and nation-state attacks to emerging underground services like malware and hacking as a service, there’s no limit to the number of risks enterprises and individuals deal with every day. In the face of these vulnerabilities, what is a “NextGen” endpoint solution? Why do legacy solutions continue to lose ground against both traditional malware threats and the advanced attacks? Join this session to hear about the various “Next Gen” tools in the market space and learn how to see past the hype and make an informed decision for your enterprise.