San Diego (Cybersecurity)
February 22 @ 8:00 am - 2:00 pm
The San Diego Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Win Big with IT Resilience
In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.
Territory Manager, Tenable, Inc.
Cyber Exposure – The Next Frontier
The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program. Join us for dinner to share how CISOs can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.
Kevin Catalano serves as the Territory Manager for Tenable’s Cyber Exposure solutions, helping mid-market companies secure their businesses and reputations.
Senior Sales Engineer, SMB, Sales Engineers
Rethink Security with Zero Trust
As today’s attacks become more sophisticated, the pressure to protect access to enterprise systems and applications has grown considerably. Unlike the traditional security perimeter model, a Zero Trust approach dispels the notion of traditional models and moves toward a “Never trust, Always verify” model for protecting access to data. Zero Trust recognizes that any network, device, user, or application could be compromised, and the credentials associated with them. As such, in order to better protect sensitive company resources, IT departments need to adjust their mindset and adopt a new way of thinking: that bad actors are already in their environment. Join us to hear how identity has become the hub of any Zero Trust framework, and discover several guiding principles and paradigms that help define a Zero Trust model.
We’ll examine: The current (broken) state of security and the role identity plays in cyber attacks, the massive rethink underway that redefines security to follow identity, and how Centrify is adopting a Zero Trust model approach with identity at the core, thus uniquely helping reduce risk through the power of identity services.
Co-Founder, Security Colony
Security Fatigue – What It Is & How To Manage It
In 2004 I coined the phrase “security fatigue” in presentations to AusCERT, APEC & the OECD titled “Security Fatigue: Threatening the Culture of Security.” That presentation discussed whether the ongoing barrage of security related information and warnings to the general public had resulted in a cultural shift towards desensitization and risk tolerance. 14 years on, a Google search for the phrase “security fatigue” today gives thousands of results. NIST recently stated that “security fatigue can cause computer users to feel hopeless and act recklessly”. The conclusions drawn back in 2004, remain highly valid today:
1. People are often willing to accept risks that are not theirs to accept.
2. Fear is not a compelling driver of action over the long-term.
3. Cultural recognition of the importance of information security is necessary to avoid security fatigue
This presentation will revisit the concept and look again at how it impacts both individual organisations at a very practical level, as well as the broader economy and community. This presentation will provide highly pragmatic actions to influence organizational culture and ensure ongoing security and attentiveness by all people involved.
One of Australia’s best known cyber-security professionals, Nick is Co-founder of Security Colony (www.securitycolony.com) and an Advisor to Bugcrowd and was the recipient of the inaugural “Australian Information Security Association (AISA) Information Security Professional of the Year” Award in 2012 for his contribution to the industry. Previously a co-founder of SIFT and Stratsec which grew to become the largest cyber security consulting firms in the region before their sale to BAE Systems in 2010, Nick has served on a wide range of industry boards including the Internet Industry Association, Electronic Frontiers Australia and is a past Australian delegate to the APEC TEL Security & Prosperity Steering Group. He has been engaged by regional governments to review their national cyber-security strategies, and has delivered projects for APEC and the United Nations.