Loading Events

« All Events

  • This event has passed.

New Jersey (Cybersecurity)

March 15 @ 8:00 am - 5:00 pm

Details

Date:
March 15
Time:
8:00 am - 5:00 pm
Event Category:

Venue

The Imperia Banquet & Conference Center
1714 Easton Avenue
Somerset, NJ 08873
United States
  + Google Map
Phone:
732-469-2522
Website:
https://www.theimperia.com/

Overview

The New Jersey Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

8:45am - 9:15amSession One

Garrett Bechler
Senior Systems Engineer, Menlo Security

The Internet and Email are Evil and The Alerts Have Made Us Numb

Security practitioners are facing the most difficult of times. They are confronted by a broad range of challenges including the constant flow of headlines highlighting security breaches, declining efficacy of legacy products, and a talent crisis for hiring and retaining security professionals. Web and Phishing Isolation provides a shift in the security landscape to address these challenges. Isolation technology also provides a dramatic reduction in security alerts, relieving the burden on overtaxed security and operations staff. This is the shift in the security landscape that many organizations are welcoming.

9:15am - 9:45amSession Two

Todd O’Boyle
Director of Product Management

 

The Power of Your People: How to Rally Your Troops Against Phishing

This presentation will walk you through how to build a phishing protection program for your company. We reach beyond technical solutions to provide tips on getting management buy-in and how to architect the program so that it’s both effective and engaging. We wrap with some simple steps you can kick off as soon as you get back to the office!

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Joe Lubelczyk
Senior Account Manager

Securing your organization and containing the insider threat 

Despite increasing investment in the cybersecurity market, we continue to see a rise in data breaches and their related costs, specifically those relating to the insider threat (accidental loss and malicious insider). Despite these types of incidents contributing approximately 50% of all breaches, CIO focus remains on the external threat.

In this presentation, we will question whether a new approach to data security needs to be applied: one that recognizes data security can’t be tackled in silo and instead a holistic more strategic approach must be taken to protect and secure data throughout its lifecycle in order to contain the insider threat and maintain compliance.

10:45am - 11:15amSession Four

Anurag Singh
Channel Sales Engineer

Intercepting Advanced Threats

Download the Presentation

Speaker’s Bio:

Sophos SE : NJ & DE, 10+ years of IT Security experience, CCIE Security – 28308, Sophos Certified Architect

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

James Saarikko
Distinguished Systems Engineer

The Top 5 Wi-Fi Security Mistakes and How to Avoid Them

Attend our Wi-Fi security presentation and see how to avoid the top 5 deployment mistakes that leave managers and their networks open to compromise.

As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.

So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:

  • The top 5 Wi-Fi security mistakes
  • Viewing exactly what’s happening on your network
  • Building an authentication and encryption model that doesn’t force user workarounds
    • Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
  • Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Carrie Hennessey Rose
Enterprise Account Manager

Win Big with IT Resilience

In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.

1:00pm - 1:30pmSession Seven

Chris Bacco
Solution Engineer

Kevin Quinn
Territory Manager

Cyber Exposure – The Next Frontier

The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program.

Join our session to learn how CISOs can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.

Download the Presentation

Speaker’s Bio:

Chris Bacco has been with Tenable for two years, first as a Project Manager in Information Technology Services and, most recently, as a Solution Engineer. Chris specializes in implementing security solutions in the modern IT environment so that customer’s can gain the critical level of insight required to manage their cyber exposure.

Kevin Quinn is a Territory Manager for Philadelphia, South New Jersey, and Delaware. For seven years, he has worked closely with clients helping them evaluate and acquire the right cybersecurity solution for their critical business initiatives. Currently, his focus is on helping customers reduce risk by bringing greater awareness to their cyber exposure gap.

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:30pmSession Eight


Michael Dalton

Senior Identity Engineer

 

Business-Driven Security, Identity and the New Age of Risk

In the constantly changing landscape of cyber risk, security and risk management teams (including executives and board members) are increasingly forced to take ownership of and accountability relating to digital risks. Yet, many lack the critical knowledge to make effective risk management decisions and incorporate them into their overall business strategy. This inevitably leads to security strategies which are ineffective and reactionary. This presentation will outline RSA’s Business-Driven Security strategy, and will focus particularly on the importance of leveraging identity and access management (IAM) as a key tool in the battle against adversaries both within and outside your environment.

Speaker’s Bio:

Michael Dalton is a Sr Identity Engineer at RSA, the Security Division of Dell/EMC.  Over the past 25 years, his work as a security focused field sales engineer has provided a unique insight into common challenges and creative solutions available.

Michael published Network Computing magazine articles on Preparing for a Network Audit, Content Monitoring Suites to prevent Traffic Scams, Identity and Access Management product reviews and wrote the Audit and Monitoring section of the Syngress SSCP Study Guide. He lives in West Hartford, CT with his phenomenal wife Kim, sons Ben and Clark and loves to go hiking!

2:30pm - 3:00pmSession Nine

Rick Pither
Global Security Sales and OEM

 

Shifting to AI/ML/NLP Endpoint Protection- Should organization stay with legacy endpoint security stack, migrate to NGAV, or something else?   

Download the Presentation

Speaker’s Bio:

Rick Pither runs global security sales for SparkCognition. In this role, he is responsible for driving sales of the cutting-edge AI-powered cybersecurity platform the company deploys.
Areas of specialty include IT cybersecurity, virtualization, hybrid cloud, protocol analysis and network management.
Prior to SparkCognition, Pither held various executive positions at McAfee, VMware, and Secureworks over his 24 year career. He has spoken at numerous conferences and summits, most recently at the Association of Anti-Money Laundering Specialists conference.
Pither earned his bachelor’s degree in management and marketing from Purdue University.

3:00pm - 3:15pmBreak / Vendor Booth Time
3:15pm - 3:45pmSession Ten

Jared Branda
Regional Sales Director – East

Neil Lucey
Solution Engineer

Demystifying the Future – NextGen Solutions From A to Z

From ransomware, extortionware and nation-state attacks to emerging underground services like malware and hacking as a service, there’s no limit to the number of risks enterprises and individuals deal with every day. In the face of these vulnerabilities, what is a “NextGen” endpoint solution? Why do legacy solutions continue to lose ground against both traditional malware threats and the advanced attacks? Join this session to hear about the various “Next Gen” tools in the market space and learn how to see past the hype and make an informed decision for your enterprise.

3:45pm - 4:15pmSession Eleven

Shawn Reilly
Executive Director, Sales

Next Generation Threat Hunting “Malware Analysis Simplified”

Infocyte HUNT is a dissolvable agent based cyber security software solution that is easy-to-use, yet powerful to limit risk and eliminate dwell time by enabling an organization’s own IT and security professionals to proactively discover malware and persistent threats, active or dormant, that have successfully breached existing defenses.  HUNT will assume all endpoints are compromised, spend a few minutes on each and then use Forensic State Analysis (FSA) to find definitive proof.

Download the Presentation

Speaker’s Bio:

When organizations are faced off with the complex task of securing their data, networks and applications many decisions take place on who, what, when, where, why and how. Shawn’s 17 years of experience in technology has seasoned him into a sales leader that helps companies make these decisions.  He also demonstrates a keen ability to assess the marketplace and uncover how customers need to deploy solutions to solve needs.  Additionally, he excels at educating customers and team members on complex products to ensure they are well educated about the service offerings and associated value Infocyte brings to the table.

Shawn is currently the Executive Director Sales at Infocyte.  Prior to this he held positions at SonicWall, Dell, Brocade Communications, Array Networks and Lincoln Computer Services.  Shawn graduated from W Tresper Clarke High School in Westbury, NY where he grew up with his one sibling Bryan.  He went on to attend Nassau Community College studying Business Law and Administration.  Shawn lives in Hicksville, NY with his 4 children and wife Yola.  When not helping his team help customers solve problems you will most likely find him playing with the kids, reading, boating, golfing and or managing the many personalities in the household.

Prize Drawings for All in Attendance
4:15pm - 5:00pmSession Twelve

Adrien Gendre
Chief Solution Architect

A new approach to email security

Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.

Prize Drawings for All in Attendance

Sponsors