Loading Events

« All Events

New Jersey (Cybersecurity)

March 15 @ 8:00 am - 5:00 pm

Details

Date:
March 15
Time:
8:00 am - 5:00 pm
Event Category:

Venue

The Imperia Banquet & Conference Center
1714 Easton Avenue
Somerset, NJ 08873
United States
  + Google Map
Phone:
732-469-2522
Website:
https://www.theimperia.com/

Overview

The New Jersey Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

8:45am - 9:15amSession One
9:15am - 9:45amSession Two
9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three
10:45am - 11:15amSession Four

Anurag Singh
Channel Sales Engineer

Intercepting Advanced Threats

Download the Presentation

Speaker’s Bio:

Sophos SE : NJ & DE, 10+ years of IT Security experience, CCIE Security – 28308, Sophos Certified Architect

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

The Top 5 Wi-Fi Security Mistakes and How to Avoid Them

Attend our Wi-Fi security presentation and see how to avoid the top 5 deployment mistakes that leave managers and their networks open to compromise.

As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.

So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:

  • The top 5 Wi-Fi security mistakes
  • Viewing exactly what’s happening on your network
  • Building an authentication and encryption model that doesn’t force user workarounds
    • Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
  • Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six
1:00pm - 1:30pmSession Seven
1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:30pmSession Eight


Michael Dalton

Senior Identity Engineer

 

Business-Driven Security, Identity and the New Age of Risk

In the constantly changing landscape of cyber risk, security and risk management teams (including executives and board members) are increasingly forced to take ownership of and accountability relating to digital risks. Yet, many lack the critical knowledge to make effective risk management decisions and incorporate them into their overall business strategy. This inevitably leads to security strategies which are ineffective and reactionary. This presentation will outline RSA’s Business-Driven Security strategy, and will focus particularly on the importance of leveraging identity and access management (IAM) as a key tool in the battle against adversaries both within and outside your environment.

Speaker’s Bio:

Michael Dalton is a Sr Identity Engineer at RSA, the Security Division of Dell/EMC.  Over the past 25 years, his work as a security focused field sales engineer has provided a unique insight into common challenges and creative solutions available.

Michael published Network Computing magazine articles on Preparing for a Network Audit, Content Monitoring Suites to prevent Traffic Scams, Identity and Access Management product reviews and wrote the Audit and Monitoring section of the Syngress SSCP Study Guide. He lives in West Hartford, CT with his phenomenal wife Kim, sons Ben and Clark and loves to go hiking!

2:30pm - 3:00pmSession Nine

Rick Pither
Global Security Sales and OEM

 

Shifting to AI/ML/NLP Endpoint Protection- Should organization stay with legacy endpoint security stack, migrate to NGAV, or something else?   

Download the Presentation

Speaker’s Bio:

Rick Pither runs global security sales for SparkCognition. In this role, he is responsible for driving sales of the cutting-edge AI-powered cybersecurity platform the company deploys.
Areas of specialty include IT cybersecurity, virtualization, hybrid cloud, protocol analysis and network management.
Prior to SparkCognition, Pither held various executive positions at McAfee, VMware, and Secureworks over his 24 year career. He has spoken at numerous conferences and summits, most recently at the Association of Anti-Money Laundering Specialists conference.
Pither earned his bachelor’s degree in management and marketing from Purdue University.

3:00pm - 3:15pmBreak / Vendor Booth Time
3:15pm - 3:45pmSession Ten

Jared Branda
Regional Sales Director – East

Neil Lucey
Solution Engineer

Demystifying the Future – NextGen Solutions From A to Z

From ransomware, extortionware and nation-state attacks to emerging underground services like malware and hacking as a service, there’s no limit to the number of risks enterprises and individuals deal with every day. In the face of these vulnerabilities, what is a “NextGen” endpoint solution? Why do legacy solutions continue to lose ground against both traditional malware threats and the advanced attacks? Join this session to hear about the various “Next Gen” tools in the market space and learn how to see past the hype and make an informed decision for your enterprise.

3:45pm - 4:15pmSession Eleven
4:15pm - 5:00pmSession Twelve

Sponsors