- This event has passed.
May 11 @ 8:15 am - 5:00 pm
The Toronto Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Sr. Director, Solution Sales
Enabling Business Growth with Trusted Digital Relationships
The Application Economy is changing everything. Traditional business models are shifting, digital disrupters are gaining ground, and customers want fast, reliable secure transactions. This means that organizations need to enhance customer relationships through new digital channels.
This session will talk about how the app economy is increasing the pressure and changing the way users are interacting with and buying from your company. Every company, regardless of industry, must make the pivot to appeal to those new buying patterns and ways that customers are engaging. Your Board and your CEO are expecting these new services and applications to be delivered. Listen to examples of how the leaders in the industry have done it.
Pete Morrison, a veteran with more than 25 years of enterprise software industry experience, is the Senior Director, of Cybersecurity for Public Sector at CA Technologies. Prior to joining CA, Pete was with Raytheon Trusted Computer Solutions where he was director of DOD Sales. Prior to Raytheon, Pete was Vice President of North America for Credant Technologies where he was responsible for all business in North America and the US Federal Government. Pete has an extensive background in the development of organizations at both the management and territory level. Pete has also served as VP of North America for Imperva, a security software company and was Director of Public Sector at Netegrity, a company that grew to become the leader in Identity Management Solutions (Now CA).
Evaluating DoS Protection – Old DoS / New Tricks
Denial of Service attacks are evolving. We are seeing more attacks, with a greater variety of techniques than ever before. Modern attacks are skilled at evading detection and wreaking havoc in surprising ways.
This session will take a practical look at denial of service mitigation with respect to modern attacks. Find out what it takes to stop modern attacks and if your current solution still offers all the protection you need.
Sean has 15 years of experience in the field of information security with the last 3 years as a Solutions Architect at DOSarrest Internet Security.
During his career he has experienced thousands of attacks and helped design mitigation strategies for hundreds of companies.
Director – Partners & Solutions Engineering
A New Way to Look at IT Security with Endpoint Modeling
Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling results and visibility into all network Endpoint behavior. With great accuracy, extremely low noise, and supporting evidence, endpoint modeling discovers and tracks the regular behavior of each device in a way that makes possible the automatic recognition of potentially harmful activities. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others.
Disaster Happens; Don’t Be Held Hostage
Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest additions to their arsenal – EVault & DoubleTake. We’ll also cover best practices for backing your data and how you can take your defenses to the next level with DRaaS.
Senior Sales Engineer
What CISO’s fear and why? Metrics of effective security.
Channel Sales Engineer – Eastern Canada
Keep Ransomware Out. How you can stop ransomware and exploits before they strike
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence
Darryl has ten years of experience in the field of IT technical services, and over seven years of experience serving in a highly customer-facing role, performing high-profile partner and enterprise consultations and professional services (around North America and internationally) for the purposes of network security design, integrations, training, maintenance, troubleshooting, pre-sales and post-sales support.
He also has architectural expertise with Check Point, Palo Alto and Sophos security products, VPNs and network security design, with deep understanding of small, medium and large enterprise and non-enterprise environments.
Certified Information Systems Security Professional (CISSP – (ISC)²), Certified in Risk and Information Systems Control (CRISC – ISACA), Certified Information Systems Auditor (CISA – ISACA), Check Point Certified Master Architect (CCMA – Check Point Software Technologies), Certified Ethical Hacker (CEH – EC-Council), Certified Network Security Engineer (CNSE – Palo Alto Networks), Sophos Certified Engineer
Director of Technology Marketing
There Will be Attacks – Improve your Email Defenses
If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes. If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Business Development and Client Service
Email threat landscape – report from the trenches
Email is still the number one vulnerability in any organization’s security system. Today’s IT Security experts are most concerned about ransomware and SpearPhishing. Both threats are on the rise and constantly evolving into new, harder to detect forms. Several real life examples of both types of threats will be examined with some detailed explanations about cybercriminal’s modus operandi. Prevention solutions and strategies will also be discussed.
Elaine Poellhuber is a partner at ZEROSPAM Security. In her sales and channel leaderhip role, she has been involved in solving customer’s email headaches for 9 years. She has an in-depth understanding not only of customer needs but also of all email related protocols and best practices. She has played a key project management role in implementing ZEROSPAM with enterprise accounts in the energy, insurance and legal sector
Defeating the Ransomware Army on Your Doorstep
Ransomware is destined to be a multi-billion dollar problem this year. Learn some of the proactive measures you can take with your customers to keep them safe from this threat using cloud backup and monitoring products. Backup has become one of the primary tools for defeating ransomware. Some of the latest advances using blockchain technology, encryption and proactive monitoring can stop ransomware it its tracks. Also learn how to bundle and cross-sell other products based on your connection to the customer.
Sales Director, Canada
Digital Resilience requires a new approach. It takes actionable intelligence
Redseal provides a cybersecurity analytics platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives Our advanced analytics engine creates functioning model so you can understand and continuously monitor your whole network. Measure resilience with your RedSeal Digital Resilience Score, you can measure, benchmark, and set targets to actively manage the digital resilience of your network and security infrastructure. Verify compliance by revealing configuration errors and discovering unintended access paths, the RedSeal security analytics platform helps you verify compliance with established operating standards, policies and regulations. Accelerate response to security incidents and network vulnerabilities.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.