- This event has passed.
New York City (Cybersecurity)
August 23 @ 8:00 am - 5:00 pm
The New York City Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Cyber Security Strategies Conference.
Next-Generation Threat Protection Demystified
In this session, you’ll hear a cybersecurity expert explain the current threat landscape and how threat protection vendors must adapt to protect against modern threats.
Learn how exploits and ransomware can be proactively protected against by leveraging machine learning and behavior analytics and how best to leverage EDR products for post-breach investigation.
We’ll also cover how other technologies such as Unified Endpoint Management (UEM) are important to provide wholistic protection of data in the event of loss or breach.
Andrew is a Security Architect at Sophos, providing new and existing customers with expert insight into the latest threats and advising on strategy across all areas of the Sophos portfolio, including Next Generation protection techniques against malware attacks, data protection/encryption and network security. Andrew brings a wealth of experience working on international projects with some of Sophos’ largest global customers and is excited to share his experience and industry vision.
Erich Kron, CISSP
Security Awareness Advocate
Levers of Human Deception: The Science and Methodology Behind Social Engineering
No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.
Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, as he provides fun and engaging examples of mental manipulation in everyday life: from the tactics used by car dealers, to sophisticated social engineering and online scams. Additionally, he’ll look at how to ethically use the very same levers when educating our users.
- The Perception vs. Reality Dilemma
- Understanding the OODA (Observe, Orient, Decide, Act) Loop
- How social engineers and scam artists achieve their goals by subverting OODA Loop’s different components
- How we can defend ourselves and our organizations
Executive Sales Manager
Innovative Endpoint Management – A Holistic Approach to Vulnerability Management, Patching, OS-Upgrades and Software Distribution
Zero Day Vulnerability, Windows Fall Anniversary Update, Office 365 Migration: Are any of these topics causing your blood pressure to rise? This seminar will show you how you can automate OS-migrations, software deployment projects, and effective security exploit management all from one easy to use Endpoint Management Suite. No university degree or nerd glasses required – buckle up!
Bob Troup is Executive Sales Manager for baramundi Software USA Inc., Headquartered in Framingham, MA,. Bob is a 30-year industry veteran in corporate networking and endpoint management sales and consulting with companies including, Ivanti, VMWare, Auria Corp., and Xyplex. He specializes in solutions and deployment consulting for complex networks and cloud-based software environments.
Information Security, “Outside the box.”
Authentication, encryption, access control, audits and other must-have security measures are all well and fine, but what else can you do to secure your information when users are on the move? Let’s take a step back and explore some less conventional ways to think about information security and mobility. We will cover some simple strategies that are often ignored. These methods might never make exciting news but they can help protect your information against some of the most common threats and, in conjunction with your must-haves, provide more complete protection.
Avi Elkoni has more than 20 years of experience in Software Product development, operations and marketing.Prior to joining the Vaporstream® team, Avi headed US Operations for Equivio, Inc. (acquired by Microsoft in December of 2014). While at Equivio, he oversaw the growth of the company’s Rockville, MD headquarters, developed and delivered industry-acclaimed seminars, and contributed significantly to new business growth.
Prior to joining Equivio, Avi spent most of his 20-year career with software product companies and served as Vice President of Software Development with several companies including the Information Governance Division of CA Inc.
Avi has a Bachelor of Science degree in Computer Science from Bar Ilan University.
Anatomy of a Data Breach
Peter Bamber has an extensive information security background which includes project management for hundreds of public, private and government firms. At Security Management Partners, Mr. Bamber creates and oversees implementation of and methodologies for all of the Company’s service offerings.
Mr. Bamber holds numerous information security vendor and industry certifications and is a member of Information Systems Audit and Control Association, Information Systems Security Association, InfraGard, High Technology Crime Investigation Association and New England Disaster Recovery Information X-Change. Mr. Bamber has a bachelor’s degree from the University of Massachusetts-Amherst and Clark University for Information Technology.
Distinguished Systems Engineer
The Top 5 Wi-Fi Security Mistakes and How to Avoid Them
Attend our Wi-Fi security presentation and see how to avoid the top 5 deployment mistakes that leave managers and their networks open to compromise.
As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.
So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:
- The top 5 Wi-Fi security mistakes
- Viewing exactly what’s happening on your network
- Building an authentication and encryption model that doesn’t force user workarounds
- Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
- Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
Stop the Data Breach – It’s all about the User
In an age where hackers have many different roads to take in undermining corporate infrastructures, none is more prevalent than exploiting the user. This session will focus on the trends that our occurring as it relates to end-user behavior and the “lowest hanging fruit” hackers have access to. The normal habits and trends of employees and consumer provide a target rich environment to conduct massive data breaches, and we explore why this occurs and what can be done about it.
The Bots are Coming!
Actually, they are here. They now represent over 50 percent of internet traffic. But not all bots are bad. There are many good bots, such as chat bots and search engine bots, that we rely on in our day-to-day digital lives. You do need to know the difference and take control of your bot traffic—they cannot be ignored and you cannot just block them all. In this presentation, we will look at the growth of bots, good bots versus bad bots, what to look for in a bot mitigation solution and a few use cases.
A new approach to email security
Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.
The security-educated workforce: Utopia or a reality?
Data loss is only the symptom. The root of the problem is with the unpredictable nature of humans. Strong security measures can create a forcefield, but it only takes a minute for an imprudent employee to circumvent them. Learn how to leverage behavioral context and AI to condition employees into security-sustainable habits.
Josh Whitham is passionate about introducing companies to new and innovative technologies that challenge the status quo and have proven to disrupt established markets. Josh has 10+ years of experience at Enterprise IT companies and tech startups such as TANDBERG, Cisco, Acano and Jazz Networks. As Account Executive, he is responsible for helping organizations secure their sensitive data against insider threats and outsider attacks by leveraging the Jazz Networks Platform.
Key Account Manager – North America
9 Pitfalls To Avoid When Implementing an IAM Solution
IAM implementations are fraught with both technical and career challenges and dangers. In this 30-minute briefing, we’ll review some of the most common pitfalls encountered by teams implementing IAM solutions and review the best practices in order to avoid them – and be a hero.
Win Big with IT Resilience
In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.