CHECK-IN AND OPENING INTRODUCTIONS8:30 am - 9:00 am
Data Connectors is proud to host the Boston Cybersecurity Conference.
Session One9:00 am - 9:30 am
More than 30,000 customers worldwide—including nearly half the global Fortune 500—rely on RSA’s business-driven security™ strategy for cyber threat detection and response, identity and access management, online fraud prevention, and governance, risk and compliance solutions. Armed with the industry’s most powerful tools, enterprises can better focus on growth, innovation and transformation in today’s volatile business environment.
RSA is a part of the Dell Technologies family of brands. Dell Technologies is a unique family of businesses that provides the essential infrastructure for organizations to build their digital future, transform IT and protect their most important asset: information. The company services customers of all sizes across 180 countries – ranging from 98 percent of the Fortune 500 to individual consumers – with the industry’s most comprehensive and innovative portfolio from the edge to the core to the cloud.
Session Two9:30 am - 10:00 am
baramundi Software provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.
The baramundi Management Suite (bMS) combines all important features for Endpoint Management: Patch Management, Software Deployment, OS-Installation, Enterprise Mobility Management, Vulnerability Assessment, and more. bMS optimizes IT management processes by automating routine tasks and providing an extensive overview of the status of the network and endpoints. In doing so, it relieves pressure on IT administrators and ensures that users always have the necessary rights and applications on all platforms and form factors; whether on PCs, servers, notebooks, mobile devices or Macs. Over 3,000 customers around the world benefit from nearly two decades of experience and the easy-to-use software solution
Break10:00 am - 10:30 am
Coffee Break / Vendor Exhibit Time
Session Three10:30 am - 11:00 am
About Critical Start
CRITICALSTART is leading the way in Managed Detection and Response (MDR) services. As the MDR experts that leave nothing to chance, the company developed the industry’s only cloud-based Security Orchestration, Automation and Response (SOAR) platform that resolves 99% of security events to eliminate compromise and stop breaches. Visit www.criticalstart.com for more information.
Session Four11:00 am - 11:30 am
About The SSL Store
The SSL Store™ is the world’s largest SSL/TLS distribution service, combining over a decade of experience, unparalleled industry insights and award-winning Platinum Partnerships with leading Certificate Authorities (CAs) to create an elite Enterprise Program for all certificate management needs. With offices on three continents, full-service customer support throughout the global workday and customers in over 120 countries, The SSL Store’s reach is limitless. A better option than relying on a single CA, The SSL Store™ is perfectly positioned to leverage its buying power and deep partnerships to provide the flexibility and custom offerings that others can’t. Partners in the truest sense of the word.
Lunch11:30 am - 12:00 pm
Lunch / Vendor Exhibit Time
Keynote Session12:00 pm - 12:45 pm
Keynote Details Coming Soon
Break12:45 pm - 1:15 pm
Dessert and Coffee Break / Vendor Exhibit Time
Session Six1:15 pm - 1:45 pm
Morphisec is transforming endpoint security with our pioneering Moving Target Defense. Our solutions deliver operationally simple, proactive prevention unbound by the limits of detection and prediction. We protect businesses around the globe from the most dangerous and sophisticated cyberattacks immediately, efficiently and absolutely.
Session Seven1:45 pm - 2:15 pm
OneTrust is the #1 most widely used privacy, security and third-party risk technology platform trusted by more than 4,000 companies to comply with the CCPA, GDPR, ISO27001 and hundreds of the world’s privacy and security laws. OneTrust’s primary offerings include OneTrust Privacy Management Software, OneTrust PreferenceChoice™ consent and preference management software, OneTrust Vendorpedia™ third-party risk management software and vendor risk exchange and OneTrust GRC integrated risk management software.
Break / Vendor Exhibit Time
Session Eight2:30 pm - 3:00 pm
One Platform for IT Resilience — simple, scalable, and always available. Successful businesses are embracing digital transformation – harnessing the power of technology to drive efficiencies, create new experiences, and ultimately beat the competition. These business leaders are relying on their IT organizations to make it happen. Challenged to maximize IT resources and faced with the complexity of protecting the business while modernizing and transforming, IT leaders are shifting to an IT resilience strategy. IT resilience is the ability to seamlessly adapt to new technology and drive IT transformation, while mitigating the risks of downtime, ensuring an always-on business and the best customer experience. Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto combines disaster recovery, backup and cloud mobility in a simple, converged platform. With enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds.
Session Nine3:00 pm - 3:30 pm
Logically is the leading provider of Managed IT Services to small and midsize organizations. We help our customers leverage the power of information technology to achieve their goals by becoming their trusted IT ally. Since 1999, we have made IT management easy and secure for hundreds of corporations, healthcare organizations, non-profits and public sector agencies. We provide complete IT outsourcing to business leaders, and augmentation services to IT teams. We are recognized for our outstanding customer service, technical depth, and operational excellence. Our best-in-class service delivery is powered by two pillars, OpLogicTM and Care Teams. OpLogic is our unique cloud-based IT management system that allows your IT environment to self-heal, increasing uptime and reducing security risks. Dedicated Care Teams are how we deliver our deep and wide-ranging technical expertise while providing personalized service and the familiarity of a trusted ally. Visit www.logically.com to learn more.
Session Ten3:30 pm - 4:00 pm
About Check Point
Check Point Software Technologies Ltd. is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyber attacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises – from networks to mobile devices – in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.
Registration for this event is opening soon.