Loading Events

« All Events

  • This event has passed.

Orange County (Cybersecurity)

December 7, 2017 @ 8:15 am - 3:00 pm

Event Navigation

Details

Date:
December 7, 2017
Time:
8:15 am - 3:00 pm
Event Category:

Venue

Atrium Hotel at John Wayne Airport
18700 MacArthur Boulevard
Irvine, CA 92612
United States
  + Google Map
Phone:
800-854-3012
Website:
http://atriumhotel.com/

Overview

The Orange County Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

 

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Brian Damschen
Regional Sales Director, Southwest District

Leverage the Cloud to Minimize the Impact of Ransomware

Download the Presentation

Speaker’s Bio:

With 20 years of of sales experience working with IT Professionals across all market segments, Brian has a firm grasp on what it takes to help companies apply unique and differentiated technologies to solve business challenges. He began his career in telecommunications and mobile solutions with Bell South and then Verizon Communications. Data networks and hosted infrastructure managed services were the focus during his time at Qwest and AT&T. He moved on to enterprise storage with Silicon Valley start up BlueArc, a company that specialized in high performance network attached storage which was acquired by Hitachi Data Systems. At Commvault he became well versed in data management and information governance and for the last 3 years he has been responsible for developing the Southwest Region at Druva

9:15am - 9:45amSession Two

Derek Snyder
Channel Sales Engineer

 

Synchronized Security

Security technologies are constantly evolving, but are they working together to respond to threats? Learn how Sophos defends your endpoints, data, and network and how the Synchronized Security platform enables immediate response.

Speaker’s Bio:

Derek Snyder is a veteran in the IT industry.  For the past 11 years Derek has worked exclusively in the IT security space providing threat analysis, design, implementation and training for IT security solutions.  Derek understands the challenges that IT leaders and administrators face with the evolving complexity of networks and the complexity of the products meant to protect them.  The solution to complexity is not more complexity!  Derek currently serves as a Sales Engineer and Threat Analysis speaker for Sophos.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

David Feinglass

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

10:45am - 11:15amSession Four

Lee Wei
VP of Global Solution Engineering

Current state of Ransomware

– Come to find out more about the current state of ransomware
– Discover the multi-layered defense against ransomware on the endpoints
– Stay to see a stealthy ransomware threat in action

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Jim Sortino
VP Global Sales and Operations

Best Practices to Establish and Maintain Robust Security in Public Cloud Environments

Even as the leading public cloud service providers have beefed up their security, customer concerns around securing their cloud environments remain high. According to a recent survey of security practitioners, security is the top barrier to cloud adoption. Organizations deploying workloads on public clouds such as Amazon Web Services (AWS) at scale are faced with new challenges because traditional tools and controls that worked well for security and compliance in the datacenter fail in public cloud environments. In this presentation, we will showcase a new breed of cloud-native security tools that simplify security operations and enable faster time to compliance.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:15pmSession Six

Parker Ashley 
Manager

Autonomous Cyber Defense: AI and the Immune System Approach

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network – before they turn into a full-blown crisis.

Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.

Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.

In this session, learn:

  • How new machine learning and mathematics are automating advanced cyber defense
  • Why full network visibility allows you to detect and autonomously respond to threats
  • How smart prioritization and visualization of threats allows for better resource allocation and lower risk
  • Real-world examples of unknown threats detected by ‘immune system’ technology
1:15pm - 1:45pmSession Seven

Jessica Dungca-Geronimo
Sr. Security Technologist

THE MYTH OF THE EASY BUTTON APPROACH TO INFORMATION SECURITY

Over twenty years of navigating the complexities of the information security (InfoSec) industry a common theme emerges: the fascination with creating the digital panacea, or Easy Button. Marketing departments highlight their product in the best light possible and tell you it will solve all your InfoSec headaches, but understanding the true nature of Incident Response will tell you otherwise.

Speaker’s Bio:

Jessica Dungca-Geronimo is a Sr. Security Technologist at RSA, The Security Division of EMC, and is based in Southern California. She has over 14 years of industry experience with a broad background in IT Management, Information Security, and Systems Engineering. Jessica works with some of the largest Financials, Pharma, and Retail organizations on CyberSecurity issues. Her focus areas include Advanced Security Operations (ASOC), network forensics, and endpoint (malware) analysis.

1:45pm - 2:00pmBreak / Vendor Booth Time
2:00pm - 2:30pmSession Eight

Collin Woo
Solutions Engineer

Does Your Time to First Byte Bite?

Join Collin Woo, Solutions Engineer, at Dyn as he provides a high level overview of DNS, the various multi-DNS configurations and how this layer of your infrastructure has everything to do with security. From DDoS to DNS amplification and reflection attacks, it’s all covered including strategies to mitigate, opportunities to architect infrastructure resiliency and tips to improve digital performance.

2:30pm - 3:00pmSession Nine

Richard Blech
CEO 

Brief History of Pre-Computer Cryptography

Download the Presentation

Prize Drawings for All in Attendance

Sponsors