Loading Events

« All Events

  • This event has passed.

Sacramento (Cybersecurity)

August 9 @ 8:00 am - 3:00 pm

Event Navigation

Details

Date:
August 9
Time:
8:00 am - 3:00 pm
Event Category:
Website:
Powered by Eventbrite

 

About Our Event

The Sacramento Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 9:00amCheck-In and Opening Introductions

Data Connectors is proud to host the Cyber Security Strategies Conference.

9:00am - 9:30amSession One

Benjamin Lim
Enterprise Sales Engineer

Defense in Depth vs. Modern Day Threats

Ransomware, file-less malware, exploits, oh my. How do you stay ahead of all these modern day threats yet keep some sanity in your security strategy? Sophos will show you how. Sophos Synchronized Security is uniquely designed to bring together Next Gen Network Security and Next Gen Endpoint Solutions to provide a harmonious security strategy for all types of organizations. We will show you how Sophos uses strategies like deep learning, signature-less anti-exploit, anti-ransomware protection across different layers of the attack kill chain to protect your environment.

Download the Presentation

Speaker’s Bio:

Ben has over 10 years of IT security experience from various roles including Administrator, Tech Support, Consultant and Sales Engineer. Having worked with small, medium and enterprise organizations across various industries and technologies, his diverse experience is well suited to being a trusted advisor in cybersecurity. Ben holds a bachelor’s degree in Computer Science as well as a polytechnic certification in Technology Infrastructure Management.

9:30am - 10:00amBreak / Vendor Booth Time
10:00am - 10:30amSession Two

Alex Chudacoff

Why attackers love email and what you can do about it

Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?

In this session, you’ll learn:

  • How your email can be used as an entry point for multiple types of attack
  • The damaging impact attacks have on organizations
  • Why your employees could be the weakest link in your email security
  • How to enhance your email security and thus your overall cyber resilience
10:30am -11:00amSession Three

Ibrahim Al-Islam
Sr. Sales Engineer

Cybercrime Tactics and Techniques Report

Don’t get too comfortable—might seem that it was a slow quarter for malware, but new players are making themselves known and wreaking havoc everywhere. Join Malwarebytes Labs for a look at Cybercrime Tactics and Techniques: Q1 2018 Report.

11:00am - 11:30amBreak / Vendor Booth Time / Lunch
11:30am - 12:00pmSession Four

Alexandra Gates
Senior Product Marketing Manager

What Comes Next in Wi-Fi: 802.11ax & Why Increasing Speed Isn’t Enough

Optimizing user mobile experience requires more than high speed Wi-Fi. IT professionals are facing challenges of capacity, flexibility, security, privacy, and visibility as they evaluate complex combinations of WLAN standards, management, and technology like OFDMA. This session covers 802.11ac and 802.11ax, data analytics, and building robust wireless networks.
Learning Objectives: current & future Wi-Fi trends, how to prepare for the influx of Wi-Fi devices (capacity, visibility, & control), 802.11ac and 802.11ax deep dive

Speaker’s Bio:

Alexandra Gates is a Senior Product Marketing Manager at Aerohive Networks, where she helps define market strategy and vision for the cloud and WLAN products. She is a CWNA with a comprehensive background in wireless technology, including capacity and management planning, RF design, network implementation, and general industry knowledge.

12:00pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:15pmSession Five

Adrien Gendre
Chief Solution Architect

A new approach to email security

Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.

1:15pm - 2:00pmSession Six

Don Rush
Systems Engineer, Northern California

Win Big with IT Resilience

In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.

Download the Presentation

2:00pm - 2:15pmBreak / Vendor Booth Time
2:15pm - 2:45pmSession Seven

John Calderon
Premium Support Engineer

Security Leadership and Digital Transformation

As digital disruption sweeps across every major industry, forward-thinking organizations are focusing on how multiple technologies can work together to drive meaningful and measurable impact. At the same time transformation projects are widening the threat landscape providing a green-field for hackers looking to exploit newly formed digital gaps.  In addition, compliance and regulations like the new California Data Privacy Act of 2018 dramatically change considerations when designing and securing innovative projects.  In this session we will discuss how security practitioners can get ahead of the curve and be a leader in the business discussing both risk and opportunity in transformation projects.  We will provide practical means to introduce the NIST framework into high level business discussions.  In addition, we will discuss good questions to ask business leaders to help them drive change and understand the relationship between data, applications and identities.  Take away slides and ideas that you can use to demonstrate security leadership while balancing risk and empowering your business.

Prize Drawings for All in Attendance

Sponsors