- This event has passed.
August 9 @ 8:00 am - 3:00 pm
About Our Event
The Sacramento Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Cyber Security Strategies Conference.
Enterprise Sales Engineer
Defense in Depth vs. Modern Day Threats
Ransomware, file-less malware, exploits, oh my. How do you stay ahead of all these modern day threats yet keep some sanity in your security strategy? Sophos will show you how. Sophos Synchronized Security is uniquely designed to bring together Next Gen Network Security and Next Gen Endpoint Solutions to provide a harmonious security strategy for all types of organizations. We will show you how Sophos uses strategies like deep learning, signature-less anti-exploit, anti-ransomware protection across different layers of the attack kill chain to protect your environment.
Ben has over 10 years of IT security experience from various roles including Administrator, Tech Support, Consultant and Sales Engineer. Having worked with small, medium and enterprise organizations across various industries and technologies, his diverse experience is well suited to being a trusted advisor in cybersecurity. Ben holds a bachelor’s degree in Computer Science as well as a polytechnic certification in Technology Infrastructure Management.
Why attackers love email and what you can do about it
Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Sr. Sales Engineer
Cybercrime Tactics and Techniques Report
Don’t get too comfortable—might seem that it was a slow quarter for malware, but new players are making themselves known and wreaking havoc everywhere. Join Malwarebytes Labs for a look at Cybercrime Tactics and Techniques: Q1 2018 Report.
What Comes Next in Wi-Fi: 802.11ax & Why Increasing Speed Isn’t Enough
Optimizing user mobile experience requires more than high speed Wi-Fi. IT professionals are facing challenges of capacity, flexibility, security, privacy, and visibility as they evaluate complex combinations of WLAN standards, management, and technology like OFDMA. This session covers 802.11ac and 802.11ax, data analytics, and building robust wireless networks.
Learning Objectives: current & future Wi-Fi trends, how to prepare for the influx of Wi-Fi devices (capacity, visibility, & control), 802.11ac and 802.11ax deep dive
Alexandra Gates is a Senior Product Marketing Manager at Aerohive Networks, where she helps define market strategy and vision for the cloud and WLAN products. She is a CWNA with a comprehensive background in wireless technology, including capacity and management planning, RF design, network implementation, and general industry knowledge.
Chief Solution Architect
A new approach to email security
Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.
Systems Engineer, Northern California
Win Big with IT Resilience
In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.
Premium Support Engineer
Security Leadership and Digital Transformation
As digital disruption sweeps across every major industry, forward-thinking organizations are focusing on how multiple technologies can work together to drive meaningful and measurable impact. At the same time transformation projects are widening the threat landscape providing a green-field for hackers looking to exploit newly formed digital gaps. In addition, compliance and regulations like the new California Data Privacy Act of 2018 dramatically change considerations when designing and securing innovative projects. In this session we will discuss how security practitioners can get ahead of the curve and be a leader in the business discussing both risk and opportunity in transformation projects. We will provide practical means to introduce the NIST framework into high level business discussions. In addition, we will discuss good questions to ask business leaders to help them drive change and understand the relationship between data, applications and identities. Take away slides and ideas that you can use to demonstrate security leadership while balancing risk and empowering your business.