- This event has passed.
San Francisco (Cybersecurity)
October 19, 2017 @ 8:15 am - 4:30 pm
The San Francisco Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Channel Accounting Executive
Next- Gen Threats Vs. Next-Gen Security
Going to be covering the following four topics:
1. Today’s Threat Landscape
3. Phish Threat
4. Intercept X
Dee Bhatia serves as territory manager covering the Northern California area for Sophos where he is responsible for territory go-to-market strategy, planning and marketing efforts for the all Sophos security related business. He has more than 15 years of IT and networks security industry experience working with enterprise and mid-market organizations as well as channel security partners.
Prior to joining Sophos, Dee has held similar roles focusing on security at SonicWALL and Dell.
Dee holds a master of business administration in technology management as well as a bachelor’s degree in bio-chemistry.
Understanding the Mobile Security Gap
Mobile devices have become ubiquitous in business, permeating every aspect of user productivity and customer experience, yet many of these are also still personal devices, where the user is the administrator and corporate IT is the guest. Considering the vast amounts of sensitive data that are stored on and communicated through these devices, how do we maintain the essential controls, security and privacy that is essential in this new world of the modern mobile operating systems? Learn about why protecting mobile devices is a completely different challenge from protecting traditional endpoints, and what to do about it.
CONSULTING SYSTEMS ENGINEER
A New Way to Look at IT Security with Endpoint Modeling
Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling results and visibility into all network Endpoint behavior. With great accuracy, extremely low noise, and supporting evidence, endpoint modeling discovers and tracks the regular behavior of each device in a way that makes possible the automatic recognition of potentially harmful activities. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Account Executive, Large Accounts
Making Email safer for business
CEO and Founder
Cybersecurity War Stories: Tales from the Trenches
In today’s world, it’s imperative for organizations of all sizes to have an online presence to succeed in business. But there’s a risk to always being connected—organizations are prime targets for cyber attacks. Recent ransomware strains like Petya and WannaCry demonstrate how business can be brought to a grinding halt by encrypting your business critical data.
Join CEO and Founder of Arctic Wolf Networks, Brian NeSmith, as he highlights some of the most interesting attacks that Arctic Wolf Networks team has seen in 2017. You’ll also hear why a robust SOC-as-a-service with human augmented machine learning is critical to bolster your defenses against the most advanced of threats.
Sr. Systems Engineer
Ripped From the Headlines: Ransomware Attack on a Police Department
While endpoint security, antivirus tools, user education and other tools and practice are critical to securing against ransomware / cryptolocker attacks, what do you do when an attack successfully penetrates these defenses? How do you recover the application and data, without paying the ransom? How much down time and data loss will you face?
Learn how the Reduxio solution recovers your data to a point you choose with minimal disruption, and how TimeOS on the HX-550 did it for-real in a true story that sounds like something from a TV show.
Peter Learmonth has 30 years of industry experience as an Instructor, Systems Engineer, Tech Marketing Engineer and Consulting Systems Engineer. US patent holder related to Virtual Machine cloning methodology and VMware Certified Professional 3, 4 and 5, he has presented at VMworld and other large Technical Forums. After almost 16 years at NetApp, he is currently Sr Systems Engineer for Reduxio in Northern California. He is married with 2 children, but still finds time to ski, jump out of airplanes and try not to crash his mountain bike. He earned his private pilot certificate in June 2016.
Vice President, Marketing
Putting Gartner’s CARTA Into Action to Prevent Insider Threats and Security Breaches
Changes in the IT and threat landscape are forcing a sea-change in security. Gartner’s new security framework CARTA (Continuous Adaptive Risk and Trust Assessment) is pushing organizations away from simple black-and-white views of security toward a model that accounts for a broad spectrum of risk and continuously adapts to change in real time. This goal makes obvious sense, but it can be easier said than done in the real world. In this session we will address some of the pitfalls and best practices for bringing a CARTA-style approach to your everyday security practice, including:
- How to quantify risk in real time
- Accounting for privileged users and accounts
- Bringing users into the loop to deliver self-serve security
- Finally, a policy framework for defining policies that combine identity, risk and behavior for ensuring security, while ensuring the business process is not disrupted
Enterprise Solutions Engineer
Does Your Time to First Byte Bite?
Security Engineering Manager
The Future of Cyber Security