- This event has passed.
New York City (Cybersecurity)
November 9 @ 8:00 am - 5:15 pm
The New York City Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Ransomware – Mitigating the Risk
Just the word conjures up images of systems locked down and businesses coming to grinding halt. This is not a scenario anyone wants to face, but the reality is that thousands of companies will deal with exactly that this year. Once ransomware hits, recovery is your primary focus. Find out in this presentation what you need to do before disaster strikes and find out how other companies have successfully recovered WITHOUT paying the ransom.
How to Choose Your Next Database Audit Solution
Data is the lifeblood of today’s business. As the volume of generated data continues to grow, so does the number of data breaches. It’s more critical than ever for organizations to adopt database audit and protection solutions. But not all solutions are created equal.
What are the key capabilities that IT and security teams should evaluate? Join Terry Ray as he discusses key considerations for selecting a database audit and protection solution.
Channel Sales Engineer
Keep Ransomware Out. How you can stop ransomware and exploits before they strike
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence
Seeing is believing – Hacking the SmartPhone
Spying through smartphones sounds like something out of a James Bond film. However, researchers recently found in the wild a malicious app for Android that listens to users’ phone conversations, steals screenshots, and even intercepts SMS messages. Add the weight of zero-day mobile malware, SMS phishing attacks, and man-in-the-middle attacks and suddenly the lights go on. Lots of criminals want to steal data from smartphones…
Elie Klein is a Security Engineer working with strategic major accounts in the New York City area at Check Point for the last couple of years. Elie has consulted, designed, and overseen the implementation of global network security deployments within Fortune 500 companies across different verticals. Prior to joining Check Point, Elie worked as an Electrical Engineer at Gannett Fleming after serving as a Paratrooper in the IDF.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Security Awareness Advocate
Surviving Social Engineering and Ransomware Attacks
Throwing money at a problem doesn’t make it go away. Social engineering methods and the ‘evil genius” cyber criminals behind the attacks are furiously innovating, keeping IT off-guard.
Attackers are moving their focus from attacking the hardened network perimeter to attacking your users. This has made Ransomware and CEO Fraud incidents skyrocket, costing billions of dollars in losses.
How do you keep up and what are the most effective methods for securing your organization to combat cybercrime? This presentation will cover the ransomware and CEO Fraud epidemics and proven methods of protecting your organization against these phishing-based attacks, like creating a “human firewall”.
Impregnable Brand Protection for Non-Electronic Products
David Bak is the Vice President of ICTK Korea Ltd.
He is the semiconductor market expert who has been working as Vice President (ST Micro Electronics, 1991-2006/ Branch manager of Singapore & France), Director (Samsung Electronics, 1974-1991, South Korea). He has the strong market knowledge and networks for the semi-conductor market. He graduated from Seoul National University (Electrical Engineering, 1970 – 1974).
Automating Endpoint Management: Patching, Deployment and System Building made easy
With increasing demands on IT Managers, new ways for handling security and user requirements are needed. This seminar will show you, how you can automate your patch management, drastically simplify system building, and find out about ways to enroll software while avoiding complex repackaging procedures – inside and outside of your network.
This seminar will show you how you can innovatively automate and structure standard endpoint management tasks and improve security and compliance.
Jonathan Lange is responsible for Sales in the US market. Having advised customers in various countries from small businesses to global enterprises, he is well aware of the challenges IT departments face today in order to keep their infrastructure up-to-date, safe and efficient. Specialized on efficient methods for endpoint management, he has an in-depth knowledge of the baramundi Management Suite and how it can benefit IT departments.
About baramundi software USA
baramundi software USA, Inc. provides companies and organizations with efficient, secure, and cross-platform management of workstation environments. Around the world, over 2,500 customers of all sizes and from every sector benefit from the independent German manufacturer’s many years of experience and outstanding products. These are compiled into an integrated, future-orientated unified endpoint management approach in the baramundi Management Suite: endpoint management, mobile device management, and endpoint security are provided via a shared interface, using a single database, and according to global standards.
Explaining Bitcoins will be the easy part: Email Borne Attacks and How You Can Defend Against Them
If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes. If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.
In this session, you’ll learn:
· How your email can be used as an entry point for multiple types of attack
· The damaging impact attacks have on organizations
· Why your employees could be the weakest link in your email security
· How to enhance your email security and thus your overall cyber resilience
Cybersecurity War Stories: Tales from the Trenches
In today’s world, it’s imperative for organizations of all sizes to have an online presence to succeed in business. But there’s a risk to always being connected—organizations are prime targets for cyber attacks. Recent ransomware strains like Petya and WannaCry demonstrate how business can be brought to a grinding halt by encrypting your business critical data.
Join Jeff Dugan, as he highlights some of the most interesting attacks that Arctic Wolf Networks team has seen in 2017. You’ll also hear why a robust SOC-as-a-service with human augmented machine learning is critical to bolster your defenses against the most advanced of threats.
Senior Manager – Assurance and Advisory Innovation
Establishing a Common Language for Cybersecurity Risk Management Reporting
How can your organization clearly inform investors, customers and other stakeholders about its cybersecurity efforts? In this session, attendees will learn about:
- the need for cybersecurity risk management reporting,
- the value of using a common framework,
- engaging a third party to perform an advisory engagement on a company’s cybersecurity readiness, and
- the key components of a SOC for Cybersecurity attestation engagement.
Chief Technology Officer
Public Cloud Security Mistakes, Solutions, and Best practices
As companies look to transition workloads to the public cloud, what are the security concerns specific to cloud infrastructure? When using a public cloud provider, there are lots of services and controls to learn in order to conform to security best practices. We are going to walk through some example security incidents in the public cloud, the security controls that could have helped avoid those incidents, how to setup monitoring to detect similar threats, and some best practices to keep your cloud secure. We’ll be diving into Amazon Web Services (AWS) specifically, but these concepts apply to other (or multiple) public clouds as well. This discussion will include insights and lessons learned based on Sift Security CSO Colin Estep’s experience working in Incident Response at Netflix (the largest AWS customer).
ControlScan was scheduled to speak today, however, due to a conflict they are unable to attend altogether. For more information about ControlScan, please contact Amanda Parker @ email@example.com.