- This event has passed.
San Francisco Bay Area (Cybersecurity)
September 13 @ 8:00 am - 5:00 pm
About Our Event
The San Francisco Bay Area Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Cybersecurity Strategies Conference, featuring a Keynote Session by Special Agent Enrique M. Alvarez, Supervisory Special Agent in the Cyber Branch of the FBI.
Sr. Product Marketing Manager
Cyber Exposure – The Next Frontier
The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program. Join us for a discussion on how companies can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.
Senior Product Evangelist
An Overview of WLAN Security
As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.
So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:
- The 5 tenets of WLAN security
- Choosing the proper authentication and encryption model that doesn’t force user workarounds
- Utilizing Private PSK technology
- Device and user access control
- Future challenges for Wi-Fi security and WPA3
Identity and Authentication: Are Passwords Dead? The case for MFA
Passwords are the greatest reason for a breach, but what does a cybersecurity person do? Sure, MFA/2FA is better than passwords, but how does my non-enterprise business leverage the more secure authentication methods without breaking the bank? From flaws in security infrastructure to failure of users adapting to a new way of doing things, businesses need a better option to protect their most important resources.
Join the conversation where we take a look at benefit and bane to using a different type of authentication, multifactor authentication.
Perry is an accomplished, well rounded results driven cyber security solutions leader with 20+ years’ experience in enterprise cybersecurity management, support, sales, commercial and federal cybersecurity consulting, project management, product development and myriad leadership roles. Perry’s easy going interpersonal skills makes him very adept at working with both technical and non-technical personnel at all levels of organizations. He can take the most complicated technical cybersecurity concepts and principles and relate them in understandable terms to myriad audiences. Perry has delivered firewalls, Identity and Access Management (IdAM), Virtual Private Network (VPN), and endpoint protection (EPP) systems for everything from small and medium businesses (SMB) to Fortune 500 enterprises with 40,000+ users as well as state, federal and local governmental bodies. He is passionate about business outcomes and has a strong track record of leading projects that meet and exceed expense and revenue objectives.
Perry demonstrates his knowledge and capabilities via his multiple industry and vendor certifications: (SANS GIAC Security Essentials-Gold (GSEC-Gold), Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), Project Management Professional (PMP), Verizon Lean Six Sigma Black Belt (LSS-BB) and Palo Alto/Sophos. Perry’s knowledge, experience and reputation are well regarded he is a ‘go to’ person when it comes to all things cybersecurity for TIG customers. He is a dedicated cybersecurity professional driving success for the entire TIG customer base.
A new approach to email security
Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.
Cryptojacking and You
Tianyi Lu is Chief Architect for VirtualArmour, a Managed Security Service Provider focusing on advanced networking and security. Before joining the vendor side, Tianyi held multiple high-level network architecture roles at ISPs, mobile operators, and SaaS providers. Tianyi currently works with large enterprises to securely build complex network infrastructures at internet scale. He is the youngest person to hold their JNCIE certification.
When Tianyi is not architecting cutting edge networks he can be found exploring the outdoors on foot or by bike. He is a avid photographer and loves to travel the globe.
How They Bypass Office 365 Security
The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.
During this session, we’ll demonstrate how to protect Office 365 from:
- Email-based phishing, spoofing, and malware
- Account takeover, insider threats, compromised Microsoft credentials
- Loss of sensitive data from OneDrive, SharePoint and Office 365
Security Operations without going blind
The Recent Voice of the Analyst report surfaced some hard, cold realizations about Security Operations – most obvious is that it is an unattainable goal to detect complex intrusions by putting security analysts in front of screens 24/7 to monitor and analyze security events. Are Automation and AI solutions the answer? How do you get started without disrupting the infrastructure that you have in place?
Jeff has spent the last 18 years working in and consulting for large Fortune 500 companies in the IT Security Operations (SecOps) arena. IBM, Honeywell, USAA, Charles Schwab, Cedars-Sinai, Lyft, Maricopa County Government, Experian, and the Department of Defense are just a few of the organizations he has worked with over the course of his career. Jeff started out as a Security Operations Center (SOC) security analyst and worked his way through all the various technical jobs in the Security Operations field including security analysis, incident response, forensics investigation, threat intelligence research, and SIEM content development. He has held several industry certifications, most notably the CISSP, GCIH, and GCFA. His formal education includes a Bachelors in Justice Studies, Masters in IT Security, and Masters in Business Administration.
Jeff has also taught a hands-on lab classes covering topics such as forensic investigations, incident response, intrusion detection systems, vulnerability assessment, and malware analysis for graduate students at Colorado University in Boulder Colorado. Later in his career he moved out of the technical roles and started building and leading high functioning SecOps teams. Jeff’s current focus is on consulting for companies needing a trusted advisor with proven methodologies in meeting the complex requirements of designing, deploying, and evolving the Security Operations functions required to protect company IT data and assets. Prior to getting into defusing computer attacks, Jeff served in the United States Air Force defusing bombs in an EOD unit.
Join Supervisory Special Agent Enrique M. Alvarez of the FBI’s San Francisco Office for a presentation on trending cybersecurity issues and how the FBI investigates cyber intrusion. Enrique will talk about how partnering with the FBI before a breach hardens you as a target. Enrique will also discuss US Government cybersecurity responsibilities, the scope of the cyber threat, attack vectors, who’s doing the hacking, and cyber incident handling.
Enrique M. Alvarez is a Supervisory Special Agent in the Cyber Branch of the Federal Bureau of Investigation’s San Francisco Field Office. Enrique joined the FBI as a Special Agent in November, 2002. At the FBI, Enrique has worked both counterintelligence and cyber national security matters. He currently supervises a cyber intrusion squad at the Oakland Resident Agency.
Prior to the FBI, Enrique worked at various Internet companies in San Francisco during the first dotcom boom, was a defense contractor in Los Angeles, and was an adjunct instructor at the Naval Postgraduate School in Monterey. Enrique also served as a U.S. Navy Reserve intelligence officer and retired in 2013 with the rank of commander. With the Navy, he served a combat tour of duty in Iraq between 2007-2008. Enrique holds an undergraduate degree from Stanford University in International Relations and a master’s degree from the Navy Postgraduate School in National Security Affairs.