Loading Events

« All Events

San Francisco (Cybersecurity)

October 19 @ 8:15 am - 5:00 pm

Event Navigation


October 19
8:15 am - 5:00 pm
Event Category:


The San Francisco Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Keep Ransomware Out.  How you can stop ransomware and exploits before they strike

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

·        Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
·        Detect: quickly and easily detect and isolate attacks
·        Respond: laser in on critical alerts and address them with simple to understand security intelligence

9:15am - 9:45amSession Two
9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 11:00amSession Three

John Heintz
Cisco Stealthwatch Cloud

A New Way to Look at IT Security with Endpoint Modeling

Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling results and visibility into all network Endpoint behavior. With great accuracy, extremely low noise, and supporting evidence, endpoint modeling discovers and tracks the regular behavior of each device in a way that makes possible the automatic recognition of potentially harmful activities. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others.

11:00am - 11:30amSession Four
11:30am - 12:00pmBreak / Vendor Booth Time / Lunch
12:00pm - 12:30pmSession Five
12:30pm - 12:45pmBreak / Vendor Booth Time
12:45pm - 1:30pmSession Six

Brian NeSmith
CEO and Founder

Cybersecurity War Stories: Tales from the Trenches

In today’s world, it’s imperative for organizations of all sizes to have an online presence to succeed in business. But there’s a risk to always being connected—organizations are prime targets for cyber attacks. Recent ransomware strains like Petya and WannaCry demonstrate how business can be brought to a grinding halt by encrypting your business critical data.

Join CEO and Founder of Arctic Wolf Networks, Brian NeSmith, as he highlights some of the most interesting attacks that Arctic Wolf Networks team has seen in 2017. You’ll also hear why a robust SOC-as-a-service with human augmented machine learning is critical to bolster your defenses against the most advanced of threats.

1:30pm - 2:00pmSession Seven

Peter Learmonth
Sr. Systems Engineer

Ripped From the Headlines: Ransomware Attack on a Police Department

While endpoint security, antivirus tools, user education and other tools and practice are critical to securing against ransomware / cryptolocker attacks, what do you do when an attack successfully penetrates these defenses?  How do you recover the application and data, without paying the ransom?  How much down time and data loss will you face?

Learn how the Reduxio solution recovers your data to a point you choose with minimal disruption, and how TimeOS on the HX-550 did it for-real in a true story that sounds like something from a TV show.

Speaker’s Bio:

Peter Learmonth has 30 years of industry experience as an Instructor, Systems Engineer, Tech Marketing Engineer and Consulting Systems Engineer. US patent holder related to Virtual Machine cloning methodology and VMware Certified Professional 3, 4 and 5, he has presented at VMworld and other large Technical Forums. After almost 16 years at NetApp, he is currently Sr Systems Engineer for Reduxio in Northern California. He is married with 2 children, but still finds time to ski, jump out of airplanes and try not to crash his mountain bike.  He earned his private pilot certificate in June 2016.

2:00pm - 2:15pmBreak / Vendor Booth Time
2:15pm - 2:45pmSession Eight
2:45pm - 3:15pmSession Nine
3:15pm - 3:30pmBreak / Vendor Booth Time
3:30pm - 4:15pmSession Ten