Loading Events

« All Events

  • This event has passed.

Seattle (Cybersecurity)

June 7 @ 8:00 am - 2:30 pm

Event Navigation


June 7
8:00 am - 2:30 pm
Event Category:


The Seattle Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 9:00amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

9:00am - 9:30amSession One

Zach Turner
Enterprise Sales Engineer

Why attackers love email and what you can do about it

Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?

In this session, you’ll learn:

  • How your email can be used as an entry point for multiple types of attack
  • The damaging impact attacks have on organizations
  • Why your employees could be the weakest link in your email security
  • How to enhance your email security and thus your overall cyber resilience

Download the Presentation

Speaker’s Bio:

Zach joined Mimecast in 2017, as an Enterprise Sales Engineer in Denver, CO.

Previously, Zach worked in the enterprise space for AirWatch by VMware, where he focused on cloud-based Mobile Device Management solutions involving mobile security, content management, and email management. Most recently, he worked for Fuze, Inc., a $1 billion UCaaS startup, based in Boston, MA. There, Zach was on the enterprise sales engineering team assigned to the southeast U.S. and focused on enterprise communications, specializing in verticals where data encryption and security were key requirements.

Zach is a graduate of Brigham Young University-Idaho and is based in Denver, CO.

9:30am - 10:00amSession Two

Michael Landewe

Solved: Your Shared Responsibility for Security In the Cloud

When you moved your data to the cloud, your liability for its security did not go with it. Cloud vendors call it the “Shared Responsibility Model” and it describes where their Service Level Agreement stops and your responsibility starts. To make sure there are no gaps between their technology and yours, you need to deploy many of the same tools you would deploy in your own datacenter. You need to deploy them across all your SaaS and you need to manage them across all your cloud assets.

Avanan, The Cloud Security Platform, protects data in any SaaS or IaaS. Partnering with the industry’s most trusted security vendors, it offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, insider threats and more. The cloud-based platform is completely out-of-band and can be deployed in one click. It is the next generation of cloud security.

10:00am - 10:30amBreak / Vendor Booth Time
10:30am - 11:00amSession Three

Greg Taylor Brown

Security Operations without going blind

The Recent Voice of the Analyst report surfaced some hard, cold realizations about Security Operations – most obvious is that it is an unattainable goal to detect complex intrusions by putting security analysts in front of screens 24/7 to monitor and analyze security events.  Are Automation and AI solutions the answer?  How do you get started without disrupting the infrastructure that you have in place?

Download the Presentation

11:00am - 11:45amSession Four

Romain Basset

A new approach to email security

Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.

Download the Presentation

11:45am - 12:15pmBreak / Vendor Booth Time / Lunch
12:15pm - 1:00pmSession Five

James Mandelbaum
Field CTO – RSA Identity

Identity – The good, the bad and the Ugly (boy is it ugly!)

With the number of breaches and Identity thefts last year and the statistic that an identity is stolen every 8 seconds we need to understand what has happened, what is coming and what we can do about it.  Let’s talk about some theories on the upcoming year and what the impact will be with a conversation on how we can solve the problem going forward.  Learn the concepts of a Risk based approach to authentication using Identity Assurance and Continuous Authentication to balance the user experience versus the security concerns.

Speaker’s Bio:

James is the Field CTO of Identity with RSA Security and has worked with some of the largest companies pre and post breach.  He has provided guidance to organizations on methods to build out a secure access and Identity plan during these times of consistently evolving security landscapes.   James is a standing member of the High Tech Criminal Investigations Association and volunteers with police investigations in high tech crimes.

1:00pm - 1:30pmBreak / Vendor Booth Time
1:30pm - 2:00pmSession Six

Jason Schmitt

Securing Cloud-Native Applications

As more of our applications move to the cloud, legacy security approaches are beginning to lose relevance and security teams are compromising on the control and visibility they’ve been accustomed to with perimeter-based security. The adoption of cloud-native architectures are compounding the problem because technologies like microservices, containers and serverless , which enable game-changing speed and innovation, are completely blind to traditional, network-centric security. In this session, we will examine the complete requirements for securing microservices and container-based applications across the stack and propose a future-proof security layer that spans and scales from datacenter to public cloud.

Download the Presentation

Speaker’s Bio:

Jason Schmitt, CEO of Aporeto, is a product-oriented business leader with more than 20 years of experience in bringing enterprise products to market, with most of that time in information security. Before Aporeto, Jason was Vice President of Enterprise Security Products at Hewlett Packard Enterprise, where he led product and go-to-market strategy for the application security, security operations, and data protection portfolios. During his time at HPE, he was also VP and General Manager of the Fortify and ArcSight business units. In this role, he was responsible for driving the growth of Fortify’s market-leading application security software and SaaS businesses and ArcSight’s security operations solutions, while managing all operational functions within the group.

2:00pm - 2:30pmSession Seven

Kyle Promes



Identifying & Tracking CyberCriminals To Stop Breaches, Zero Day, Malware Attacks

Download the Presentation

Prize Drawings for All in Attendance