Loading Events

« All Events

Phoenix (Cybersecurity)

November 29 @ 8:00 am - 5:00 pm

Event Navigation

Details

Date:
November 29
Time:
8:00 am - 5:00 pm
Event Category:

Venue

TBD

Overview

The Phoenix Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cyber Security Strategies Conference.

8:45am - 9:15amSession One
9:15am - 9:45amSession Two
9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three
10:45am - 11:15amSession Four

Bob Anderson  

Solved: Your Shared Responsibility for Security In the Cloud

When you moved your data to the cloud, your liability for its security did not go with it. Cloud vendors call it the “Shared Responsibility Model” and it describes where their Service Level Agreement stops and your responsibility starts. To make sure there are no gaps between their technology and yours, you need to deploy many of the same tools you would deploy in your own datacenter. You need to deploy them across all your SaaS and you need to manage them across all your cloud assets.

Avanan, The Cloud Security Platform, protects data in any SaaS or IaaS. Partnering with the industry’s most trusted security vendors, it offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, insider threats and more. The cloud-based platform is completely out-of-band and can be deployed in one click. It is the next generation of cloud security.

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five
12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six
1:00pm - 1:30pmSession Seven
1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight
2:15pm - 3:00pmSession Nine
3:00pm - 3:15pmBreak / Vendor Booth Time
3:15pm - 3:45pmSession Ten

Sponsors