- This event has passed.
Silicon Valley (Cybersecurity)
May 10 @ 8:00 am - 2:00 pm
Without question, data is one of your organization’s most valuable resources and unleashing the untapped potential in that resource demands powerful, cognitive solutions. The Silicon Valley Big Data Solutions Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing the four V’s of Big Data issues: Volume, Velocity, Variety and Value. You'll come away with advice and knowledge so you can start processing, organizing, analyzing and utilizing the high volumes of data in your environment immediately. Your registration will include breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Cyber Exposure – The Next Frontier
The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program. Join us for a discussion on how companies can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.
Kevin Flynn is Sr. Product Marketing Manager at Tenable. With over 25 years of experience in high tech, he has been involved in cyber security technologies for nearly 20 of those years. His high tech experience started at Apple Computer where he was a product manager in Apple’s Advanced Technology Group. Flynn then spent over a dozen years at Cisco as a product manager and marketing manager in their security technology organization. Since leaving Cisco, he has held product marketing roles at Fortinet, Blue Coat and Skybox Security. Flynn is a frequent speaker on cyber security topics at conferences worldwide and has authored numerous articles on cyber security issues.
Dynamic, Fine-Grained Authorization in a Big Data World
Enormous amounts of data is handled in many organizations today. This also means that there is lots of data that shouldn’t get in the wrong hands. Controlling access to data is becoming increasingly more complex in the modern world. On one end data needs to be shared with other organizations, partners and other players in the market. On the other end data needs to be locked down from a security standpoint in order for compliance to be met or to meet other security concerns. In this session we discuss how we can apply dynamic fine grained authorization and data masking to data stored in Hadoop.
Jonas Iggbom, the VP of Sales Engineering in North America for Axiomatics, has over 18 years of experience in product management and technical sales in endpoint security and access control. His expertise lies in encryption technologies, keys, certificates, and SSH, as well as access control solutions for privileged and end user accounts, databases, and applications.
Prior to Axiomatics, Jonas worked as the Director of Product Management at Fox Technologies and as a Product Manager at Check Point Software Technologies, both in California. He also held the position of Senior Sales Engineer/Product Manager at Pointsec Mobile Technologies in Chicago and Sales Engineer at their office in Stockholm, Sweden.
Jonas earned his bachelor’s degree in computer science from the Royal Institute of Technology in Kista, Sweden. Along with his expertise in encryption technologies and access control solutions, Jonas is also knowledgeable in intrusion detection, anti-virus, data leakage prevention, content control, and client virtualization.
Vice President, Product Marketing
How Industry-Leading Organizations Reimagine Data and Redefine Growth
Reducing operational expenses of data is a big piece of any C-level executive’s plan, yet shaving costs is seldom seen as a win with end users and customers. But every example has a counter-example, and so it was when the seventh-largest global telco realized it needed to cut expenses related to managing customer quality-of-experience and service delivery to create new revenue opportunities. This session will demonstrate using data as an asset for savings and growth.
William “Bill” Peterson is Vice President Product Marketing for Logtrust. Prior to Logtrust, Bill was the Senior Director, Industry Solutions for MapR and the Director of Product and Solutions Marketing for CenturyLink. Prior to CenturyLink, Bill ran Product and Solutions Marketing for NetApp’s Analytics and Hadoop solutions. In addition to his marketing role at NetApp, Bill was the Marketing Co-Chair for the Analytics and Big Data committee, SNIA. Bill has also served as a research analyst at IDC and The Hurwitz Group, covering the operating environments, content management and business intelligence markets.
Mark Barragan has over 20 Years in IT holding roles with IBM/IGS starting with Desktop Support, Managing Desktop support, Network Engineering Operations and Security. Then went to Dialink launched worlds first hosted iPBX and Data services for customers. Mark lead a team deploying IP Telephony, WAN Links and Security for Clients. Mark then moved over to Tandberg in the UC space for 10 years then got acquired by Cisco.
Currently Mark is a Sales Manager for West Coast operations for Jazz Networks, an innovative Cyber Security company with a fresh perspective on the insider threat. In this role, he advises and implements solutions with customers and partners that are seeking to deploy a self-contained security platform to hunt and mitigate threats within their organization.
George Martinez has 14 years of experience in the Encrypted Communications field, holding senior roles within Sales Engineering, Systems Engineering and IT. He started his career managing Government Classified voice networks, expanding into the world of Unified Communications and now focuses on Cyber Security at Jazz Networks.
Currently, Mr. Martinez is a Sales Engineer for Jazz Networks, an innovative Cyber Security company with a fresh perspective on the insider threat. In this role, he advises and implements solutions with customers and partners that are seeking to deploy a self-contained security platform to hunt and mitigate threats within their organization.
Regional NetWitness Manager
Despite all the money we have invested in security, it’s still too difficult to put security details in business context fast enough. Both security and business leaders want to understand to what degree security incidents impact business continuity, intellectual property, and damage to their reputation, among other things.
The truth is, CEOs and Boards don’t care about whether a breach was caused by the Angler toolkit exploiting a vulnerability in Internet Explorer. What they do care about is overall impact to the business. So what we need to do is to express the details of security in the language of business risk.
The inability to do so is what we call the “gap of grief.” And this gap stands in the way of being able to answer THE critical question when a breach does occur… HOW BAD IS IT?
Tips for Security Appliance Deployment
Greg Zemlin is a Product Manager at Garland Technology, a leader in providing network products for enterprise, service providers, and government agencies worldwide. Greg is currently working on the research and development of Garland Technology’s new products including the virtual test access point. He has over 8 years of experience in the industry and has extensive expertise in product management, hardware design, and hardware/software verification.