- This event has passed.
San Jose (Cybersecurity)
July 12 @ 8:00 am - 4:30 pm
The San Jose Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Cyber Security Strategies Conference.
Territory Manager – NorCal
Sophos Security – Next-Generation Security for Current Day Threats
Ransomware, zero-day malware, phishing attacks, spam, and so much more. How do you stay ahead of all these threats yet keep some sanity in your security strategy? Sophos will show you how. Sophos Synchronized Security is uniquely designed to bring together Next Gen Network Security and Next Gen Endpoint Solutions to provide a harmonious security strategy for all types of organizations. We will show you how Sophos uses strategies like deep learning, signature less exploit protection and sandstorm across the different layers to protect your environment.
Dee Bhatia serves as territory manager covering the Northern California area for Sophos where he is responsible for territory go-to-market strategy, planning and marketing efforts for the all Sophos security related business. He has more than 15 years of IT and networks security industry experience working with enterprise and mid-market organizations as well as channel security partners.
Prior to joining Sophos, Dee has held similar roles focusing on security at SonicWALL and Dell.
Dee holds a master of business administration in technology management as well as a bachelor’s degree in bio-chemistry.
Reimagining the Possibilities with Hybrid Architecture
Enterprises and service providers are moving towards virtualization of network functions to gain agility and operational efficiencies. However, network functions virtualization (NFV) can be complex, and virtualized servers often fall short when running compute-intensive networking and security functions. All of these adversely impacts adoption and the ability to maintain SLAs for business-critical customers and applications.
What if we can imagine a new hybrid architecture that provides the best of both worlds – the agility of virtualization and the performance of dedicated appliances? What if the new architecture can abstract complexity and take the guesswork out of NFV adoption? What if with this type of architecture data center admins can mix and match different size network functions and can enable intuitive instantiation, service automation and guaranteed performance per virtual network function?
Milind Kulkarni is responsible for strategy, roadmap and GTM of Array’s Network Functions Platform AVX. Milind joined Array from Veriflow, a start-up in Intent-based Networking space, where he led product management and product marketing. Before that Milind was at Oracle where he shaped networking and server products and GTM strategy for Oracle Cloud and Engineered Systems. Prior to Oracle, he held Product Management, Product Marketing, Business Development, and Engineering roles at Brocade and Cisco.
Milind is a co-inventor of nine US Patents and has co-authored three IETF Internet Standards. He brings more than 20 years of varied experience with specialization in Data Center, IP networking, SDN/NFV, and cloud computing.
Milind holds an MBA from the University of California, Berkeley and a Bachelor’s degree in Electronics and Telecommunications Engineering from the College of Engineering, Pune, India.
Sales Development Representative
Cybercrime Tactics and Techniques Report
Don’t get too comfortable—might seem that it was a slow quarter for malware, but new players are making themselves known and wreaking havoc everywhere. Join Malwarebytes Labs for a look at Cybercrime Tactics and Techniques: Q1 2018 Report.
Learning About the New California Cybersecurity Maturity Metrics Assessment
New guidelines for California Cyber security metrics assessment standards have been released so understanding how they will impact security readiness for all companies and state agencies is important. Examples of metrics and guidelines will be presented, as well as a broad overview of solutions that can help with cybersecurity assessment readiness.
Ruchin Gupta joined One Identity to provide architect-level, pre-sales technical expertise and direction for One Identity Customers in California. Over the past 12 years, his work as a security focused field sales engineer has provided a unique insight into common challenges and creative solutions available. His previous stints includes 8 years at Oracle and 4 years with Sun Microsystems during this time he worked with over 15 Security Products in Database Security, Identity Management, Access Management & Privilege Access Management Space
Specific areas of concentration includes channel enablement,working with Product Managers to Align our products capabilities with customer’s requirements and mentoring team members, partners and customers.
Stop the Data Breach – It’s All About the User
The end-user has expectations to have easy access to the resources they need to do their jobs. Many of these resources involve unprotected login events that can be exploited by bad actors, stolen credentials and poor password policies. Users just want to do their jobs. IT Security needs to protect their environment from catastrophic data breaches. How do we bridge this gap? Stay ahead of the competition and breach as it is not a matter of if, but when?
Scott Kaplan is a 25-year technology sales leader with a focus on building sales organizations, channel and startups in the virtualization, systems and security management spaces. Scott understands security challenges within the enterprise and the potential impact to companies, individuals and focuses on compliance. Scott is a member of the South Florida Technology Alliance and volunteers his time to assisting technology startups with go to market strategies and hosts events to educate and grow the South Florida Tech community.
Security Operations without going blind
The Recent Voice of the Analyst report surfaced some hard, cold realizations about Security Operations – most obvious is that it is an unattainable goal to detect complex intrusions by putting security analysts in front of screens 24/7 to monitor and analyze security events. Are Automation and AI solutions the answer? How do you get started without disrupting the infrastructure that you have in place?
The Bots are Coming!
Actually, they are here. They now represent over 50 percent of internet traffic. But not all bots are bad. There are many good bots, such as chat bots and search engine bots, that we rely on in our day-to-day digital lives. You do need to know the difference and take control of your bot traffic—they cannot be ignored and you cannot just block them all. In this presentation, we will look at the growth of bots, good bots versus bad bots, what to look for in a bot mitigation solution and a few use cases.
Collin Woo, Senior Solutions Engineer at Oracle Dyn, is known for collaborating with technology minded individuals who are passionate about web performance and security. After spending over a decade working in Fortune 500 companies implementing and consulting various cloud-based solutions, Collin knows what truly drives customers for the need-for-speed and how best to secure infrastructures of all sizes. In the last year, Collin has evangelized the importance of optimizing web performance while maintaining security at a number of conferences most notably Interop ITX and several regional Data Connectors Cybersecurity conferences across the country.
Chief Solution Architect
A new approach to email security
Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.
Transforming Secure Access
As identity theft and credential-based attacks continue to rise, organizations wonder how this can be when they’re investing so much time and effort deploying identity and access management solutions. Unfortunately, despite their best efforts, Identity has become the most consequential attack vector to the modern enterprise. They are essentially outmatched by increasing identity risks. If you’re feeling the pressure, you can’t afford to miss this presentation. Join Murtaza Hafizji of RSA to learn how to transform the way you secure access in the modern enterprise. You’ll learn how identity intelligence, business context and threat intelligence work together to build a strong foundation for secure access and an overall high degree of identity assurance.
Mike has been focused on Identity Management @ RSA for over 4 years and has proven success in technical sales for enterprise customers for 19+ years in the SF bay area/ Silicon Valley. Over the years, Mike has been involved with projects related to Data Access, Governance, Policy Enforcement, GRC Lifecycle Automation, Cybersecurity, Data Forensics, data center solutions, LAN, WAN/MPLS networks, various hardware deployments, vulnerability assessments, PBX/ VOIP/ QOS systems, secure cloud messaging, cloud security and more.
Mike’s professional goals are to help companies select cost efficient technology solutions that will drastically decrease costs & risk, and increase efficiencies & security.
10 Tips for Effective Endpoint & Mobile Security
With the growing number, sophistication, and impact of cyber attacks such as WannaCry and Petya; defending traditional endpoints, modern devices, mobile and IT assets from emerging threats is critically important for enterprises.
Join this session to learn 10 Tips for Effective Endpoint & Mobile Security.
- Tips to block cyber-attacks with advanced technologies
- How to achieve enhanced visibility into suspicious activity
- Understand the realities of mobile threat defense and why it is different from traditional security
Effectuating Multi-Cloud Access Security
The transition from legacy data centers to hybrid environments brings an array of usability, visibility and protection challenges as users connect to applications and resources across network, cloud and SaaS domains. With accelerated demands to support a mobile workforce and consumerization of IT, “trust but verify” controls are crucial to mitigate malware, data privacy, breach and IoT threats. How can anytime, anywhere access be seamless and while ensuring consistent policy and protection capabilities. Whether your business is fully cloud invested or going on a per app and business case, this session will explore:
- How, why and impact of siloed, work-around secure access mechanisms
- Defining identity, device, security state and information relationships
- Key components of protected connections, appropriate access, and availability
- Considerations to gain intelligence, unify policies and orchestrate workflows
- A reference platform for on-premise and multi-cloud Secure Access
Scott Gordon (CISSP) is the chief marketing officer at Pulse Secure. An infosec expert, advocate and author, he possesses over 20 years’ experience contributing to security infrastructure and risk assessment technologies at innovative startups and large organizations. Previously, Scott was CMO at ForeScout (FSCT). He has also held management roles at AccelOps (acq by Fortinet), Protego (acq by Cisco), Axent (acq by Symantec) and McAfee.