- This event has passed.
June 7 @ 8:00 am - 2:30 pm
The Seattle Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Why attackers love email and what you can do about it
Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Zach joined Mimecast in 2017, as an Enterprise Sales Engineer in Denver, CO.
Previously, Zach worked in the enterprise space for AirWatch by VMware, where he focused on cloud-based Mobile Device Management solutions involving mobile security, content management, and email management. Most recently, he worked for Fuze, Inc., a $1 billion UCaaS startup, based in Boston, MA. There, Zach was on the enterprise sales engineering team assigned to the southeast U.S. and focused on enterprise communications, specializing in verticals where data encryption and security were key requirements.
Zach is a graduate of Brigham Young University-Idaho and is based in Denver, CO.
Solved: Your Shared Responsibility for Security In the Cloud
When you moved your data to the cloud, your liability for its security did not go with it. Cloud vendors call it the “Shared Responsibility Model” and it describes where their Service Level Agreement stops and your responsibility starts. To make sure there are no gaps between their technology and yours, you need to deploy many of the same tools you would deploy in your own datacenter. You need to deploy them across all your SaaS and you need to manage them across all your cloud assets.
Avanan, The Cloud Security Platform, protects data in any SaaS or IaaS. Partnering with the industry’s most trusted security vendors, it offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, insider threats and more. The cloud-based platform is completely out-of-band and can be deployed in one click. It is the next generation of cloud security.
Greg Taylor Brown
Security Operations without going blind
The Recent Voice of the Analyst report surfaced some hard, cold realizations about Security Operations – most obvious is that it is an unattainable goal to detect complex intrusions by putting security analysts in front of screens 24/7 to monitor and analyze security events. Are Automation and AI solutions the answer? How do you get started without disrupting the infrastructure that you have in place?
A new approach to email security
Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.
Identity – The good, the bad and the Ugly (boy is it ugly!)
With the number of breaches and Identity thefts last year and the statistic that an identity is stolen every 8 seconds we need to understand what has happened, what is coming and what we can do about it. Let’s talk about some theories on the upcoming year and what the impact will be with a conversation on how we can solve the problem going forward. Learn the concepts of a Risk based approach to authentication using Identity Assurance and Continuous Authentication to balance the user experience versus the security concerns.
James is the Field CTO of Identity with RSA Security and has worked with some of the largest companies pre and post breach. He has provided guidance to organizations on methods to build out a secure access and Identity plan during these times of consistently evolving security landscapes. James is a standing member of the High Tech Criminal Investigations Association and volunteers with police investigations in high tech crimes.
Securing Cloud-Native Applications
As more of our applications move to the cloud, legacy security approaches are beginning to lose relevance and security teams are compromising on the control and visibility they’ve been accustomed to with perimeter-based security. The adoption of cloud-native architectures are compounding the problem because technologies like microservices, containers and serverless , which enable game-changing speed and innovation, are completely blind to traditional, network-centric security. In this session, we will examine the complete requirements for securing microservices and container-based applications across the stack and propose a future-proof security layer that spans and scales from datacenter to public cloud.
Jason Schmitt, CEO of Aporeto, is a product-oriented business leader with more than 20 years of experience in bringing enterprise products to market, with most of that time in information security. Before Aporeto, Jason was Vice President of Enterprise Security Products at Hewlett Packard Enterprise, where he led product and go-to-market strategy for the application security, security operations, and data protection portfolios. During his time at HPE, he was also VP and General Manager of the Fortify and ArcSight business units. In this role, he was responsible for driving the growth of Fortify’s market-leading application security software and SaaS businesses and ArcSight’s security operations solutions, while managing all operational functions within the group.
Identifying & Tracking CyberCriminals To Stop Breaches, Zero Day, Malware Attacks