Download the PDF Agenda

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Tech-Security Conference, San Francisco, CA
Table of Contents
Wi-Fi Instructions / Facebook / Twitter Info .................. .1
Agenda………………………………………………………2
About Data Connectors ................................................. .7
CPE Credits .................................................................. .7
Testimonials .................................................................. .8
Upcoming Conferences ................................................. .9
Contact Information ....................................................... .10
Tech-Security Conference, San Francisco, CA
WI-FI INSTRUCTIONS
 Wireless Network: Grand Hyatt Meetings
 Passcode : dataconnectors16 (all lower case/case sensitive)
Like us at www.facebook.com/DataConnectors and follow us on Twitter
@DataConnectors for a chance to win our monthly $100 prize!
Congratulations to our winners:
October – Jane O’Neil
September – Brian Handrigan
August – Kathleen Dickman
July – Jeff Janak
June – Linda Goettler
Stay Connected
1
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, San Francisco, CA
Agenda
8:15-8:45
Check-In and Opening Introductions
Data Connectors is proud to host the Tech-Security Strategies Conference.
,
8:45-9:15
Session One – Radware, Gabe Meekins, Cloud RSM
Cyber War Chronicles – Stories from the Virtual Trenches
Cyber-attacks are becoming increasingly complex and persistent, making it difficult for security
professionals to protect their organizations as they head into the virtualized, IoT era. In this
session, Radware will share real world experiences gathered by its Emergency Response Team
and discuss how leading enterprises are using Radware’s integrated Attack Mitigation Systems to
successfully defend against the latest generation of attacks.
Presentation copy provided.
9:15-9:45
Session Two – Efficient IP, Dennis Borin, Senior Solutions Architect
Protect Your DNS Services Against Security Threats
Think that a firewall is sufficient protection for your DNS servers? Think again. DDoS DNS
attacks are on the rise, and a favorite target of hackers in order to extract sensitive customer
data, passwords, and intellectual property. Existing solutions are not enough to protect against
attacks, resulting in business downtime and brand reputation damage.
In this session, attendees will learn about:
· Applying DNS best practices and architecture designs
· Mitigating DNS malware
· Eliminating Single Point of Failure (SPOF)
Presentation copy provided.
9:45-10:15
Break / Vendor Booth Time
10:15-11:00
Session Three – Observable Networks, Patrick Crowley, CTO & Founder
A New Way to Look at IT Security with Endpoint Modeling
Endpoint compromise has been a consistent theme in nearly every modern security breach. This
discussion makes the case for a new approach to IT security yielding compelling critical defense
measures and visibility into endpoints and the network. With great accuracy, endpoint modeling
discovers and tracks the role of each device in a way that emits actionable security intelligence
when roles change in notable ways. Join us as we introduce endpoint modeling, discuss why this
is feasible and necessary for enterprises today, and how this solution is being used successfully
in organizations large and small, in traditional networks and cloud environments including AWS
VPCs, Azure and others.
For a copy of this presentation, please contact Ron Sterbenz @ [email protected].
2
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, San Francisco, CA
11:00-11:30
Session Four – Cylance, Richard Melick, Product Marketing Manager
Moving Beyond Legacy Endpoint Security Technology
Supporting enterprises in complex and diverse environments requires technologically
sophisticated security solutions to combat zero-day threats. Endpoint security providers sell
legacy technology in layered formats, focusing on the reactive, as the only solution. Artificial
intelligence can secure a system against unknown threats in addition to threats that may hide
their malicious behavior while under scrutiny.
For a copy of this presentation, please contact Stefanie Alcantar @ [email protected].
11:30-12:00
Break / Vendor Booth Time / Lunch
12:00-12:30
Session Five – Cisco Umbrella, Chris Frost, Systems Engineer
How to Block Ransomware and Other Threats Before, During, After an Attack with Cisco
Umbrella + Cisco's Advanced Malware Protection
With cyber-attacks growing at a rapid pace, organizations of all sizes must adopt a layered
security strategy, to provide maximum threat protection. In this informative session, you will learn
from Cisco's Chris Frost about defense-in-depth strategies, and the "multiplier" benefit of
combining OpenDNS Umbrella with Advanced Malware Protection (AMP) and cloud-based
security services, delivered at the DNS layer.
OpenDNS Umbrella delivers security at the DNS layer, creating a first layer of defense in your
security stack. Umbrella uses the Internet’s existing infrastructure to keep malware from
compromising your systems and to stop botnets or phishing from exfiltrating your data. In
seconds, this cloud platform displays your global activity from all locations. Instantly, you can
identify targeted attacks by comparing your activity—over any port, protocol, or app to the rest of
the world.
Cisco AMP provides global threat intelligence, advanced sandboxing, and real-time malware
blocking to prevent breaches. But because you can’t rely on prevention alone, AMP continuously
analyzes file activity across your extended network, so you can quickly detect, contain, and
remove advanced malware.
The combination of the two products gives organizations a highly robust solution to detect and
block malicious domains and files, for maximum threat protection.
12:30-12:45
Break / Vendor Booth Time
3
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, San Francisco, CA
12:45-1:15
Session Six – RedSeal Networks, Sean Finn
Visibility isn’t enough! It takes Actionable Intelligence!!
Providing a cybersecurity analytics platform to Global 2000 organizations that helps ensure
network and business continuity and accelerates compliance initiatives. RedSeal’s advanced
analytics engine creates functioning network models, tests networks to identify security risks,
Measure needed actions, and provides critical information to quickly Prioritize issues. The result:
reduced cybersecurity risk and lower incident response and maintenance costs.
For a copy of this presentation, please contact Sarah Pino @ [email protected].
1:15-1:45
Session Seven – Druva, Duy Pham, Account Executive & Scott Hirsh, Sr. Systems
Engineer
Unifying Data Protection & Lowering Data Risks by Leveraging the Cloud
With data growing in your organization unabated and increasingly becoming fragmented across
end-user devices, cloud services and both physical and virtual server environments, the dark
specter of data loss or exposure is very real and comes at a high business cost. IT teams are
being forced to rethink how to best protect their data without compromising security, compliance
or legal requirements. Organizations that can get a few steps ahead in identifying and
remediating data risks before they become front page news will more effectively protect their
enterprise from exposure and fines.
Join us for this session where we’ll discuss how modern cloud architecture is enabling new
innovations for better utility of enterprise data, providing visibility, recoverability and governance
capabilities for today’s data landscape, results unattainable with legacy, on premise approaches.
Presentation copy provided.
1:45-2:00
Break / Vendor Booth Time
2:00-2:30
Session Eight – Bradford Networks Sanjit Shah, VP Business Development & Marketing
Network Access Control (NAC) 501 - Transforming Network Security through Visibility, Control &
Response
Mobile devices, cloud technology,IoT and virtual work alternatives have changed how
organizations operate. With over 21 billion new devices accessing networks by 2020 according
to Gartner, how can organizations prepare today for the increase in devices without undermining
the security posture?
A strong perimeter defense is no longer sufficient to prevent cyber threats. Organizations need
to address the entire security lifecycle to adequately protect digital assets and intellectual
property, even as network access grows. This presentation will address the evolving security
threat landscape, cover the three critical aspects of network security – visibility, control and
automated response to augment existing security controls, and provide tips and best practices to
shrink your attack surface and secure your network now and for the future.
Presentation copy provided.
4
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, San Francisco, CA
2:30-3:00
Session Nine – Sophos, Marty Ward, VP Product Management
Stopping Ransomware at the Door
Ransomware has become one of the most widespread and damaging threats internet users face
today. Since CryptoLocker first appeared in 2013, we’ve seen a new era of file-encrypting
ransomware variants delivered through spam messages and exploit kits, extorting money from
all types of organizations. And in 2016 alone it’s cost over $1 billion. Join us for this informative
session to learn about ransomware threats and how to stay secure against them.
For a copy of this presentation, please contact Sarah Nichols@ [email protected].
3:00-3:15
Break / Vendor Booth Time
3:15-3:45
Session Ten – Darktrace, Erik Gordon
Unsupervised Machine Learning: A New Approach to Cyber Defense
From insiders to sophisticated external attackers, the reality of cyber security today is that the
threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past
attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst
can watch so much or react quickly enough. A fundamentally new approach to cyber defense is
needed to detect and investigate these threats that are already inside the network – before they
turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are
relied upon by organizations around the world, and can cover up to millions of devices. Based on
unsupervised machine learning and probabilistic mathematics, these new approaches to security
can establish a highly accurate understanding of normal behavior by learning an organization’s
‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise,
measured actions to automatically curb the threat.
Discover why unsupervised machine learning is the future of defense and how the ‘immune
system’ approach to cyber security provides complete network visibility and the ability to
prioritize threats in order to better allocate time and resources.
In this session, learn:
•How new machine learning and mathematics are automating advanced cyber defense
•Why full network visibility allows you to detect threats as or before they emerge
•How smart prioritization and visualization of threats allows for better resource allocation
and lower risk
•Real-world examples of unknown threats detected by ‘immune system’ technology
For a copy of this presentation, please contact Kayla Isaac @ [email protected].
5
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, San Francisco, CA
3:45-4:15
Session Eleven – Heat Software, Duncan McAlynn, Director, Sales Engineering
How to Prevent Ransomware with Microsoft & 3rd Party Technologies
Duncan McAlynn discusses the threats we are facing today with ransomware, APTs, DDoS
attacks and advanced phishing schemes to demonstrate how new and evolved Microsoft and
third-party solutions can help protect and defend your critical workloads.
For a copy of this presentation, please contact Stacy Mezzetta de Cossio @
[email protected].
4:15-4:45
Session Twelve – Nyotron, Terence Chong, Solutions Engineer
Protecting from tomorrow's threats today
When combating threats, the biggest challenge is differentiating between safe computer activity
and malicious acts. Traditional security defenses such as firewalls, secure email gateways, IPSs,
antivirus platforms and other signature based solutions play a key role in a defense-in-depth
strategy, but often fall short on protecting against advanced threats. The cyber security industry
needs a game changer – a solution that is threat-agnostic and can proactively detect, prevent
and analyze threats, known or unknown, regardless of the type of attack, who generated the
attack, or how, where or when the attack penetrated the organization.
For a copy of this presentation, please contact Jessica Filip @ [email protected].
Prize Drawings for All in Attendance
4:45-5:15
Session Thirteen – A10 Networks
Prize Drawings for All in Attendance
Hexatier was scheduled to speak today, however, due to a conflict they are unable to
attend altogether. For more information about Hexatier, please contact Katie Hayes at
[email protected] or (617) 959-4617.
6
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, San Francisco, CA
Welcome to Data Connectors
Data Connectors’ technology security conferences are focused on providing you with the latest
best practices, products and services available to the community right now in an educational
environment. Whether you are concerned with information security, cyber security, network
security or particular topics such cloud computing, the evolving IT landscape as well as how to
combat cyber criminals, you will leave the event better informed and ready to tackle the issues
at hand inside your organization.
Each event is packed with regionally-based vendors and speakers that are on the frontline.
They have the tactics and can help your team to develop a strategy that works for your needs.
Join us at one of our events throughout the United States or Canada to learn and network with
industry professionals today.
CPE CREDITS
$50 processing fee.
Please see the Registration Desk for further details.
7
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, San Francisco, CA
Testimonials
"Great job! It is one of the most informative one day conferences I've ever attended!"
"Enjoyed meeting and talking to you at your Tech-Security Conference in Raleigh NC. A lot of our ISSA Chapter
members attended and all had very positive experiences. Also, we learned more for improving our own chapter
sponsored InfoSeConference and hope we can call on you in the future."
“I didn't get a chance to complete the evaluation form, but the workshop today was EXCELLENT! I just wanted to
express my appreciation for the information made available to us at the workshop today. I thought that all of the
presenters were clear, concise and provided highly useful and easily understandable information, even to those of us
who are not exactly experts in the field of e-security. The handouts were really helpful too. One of my colleagues who
couldn't attend after we described what we gained from the workshop asked if there would be another. We hope to be
invited."
"The conference was very informative. It brought me up to date on the latest trend on security issues and possible
solutions. Please accept my complements to you and your staff on putting this conference together. Please keep me
informed of future events."
"The conference was refreshing and informative. The location was perfect. My compliments go to the conference
organizers!"
"Thank-you for a terrific conference. I learned much more than I expected and every presentation was appropriate,
concise and very well done. The networking opportunity was a real bonus. I kept thinking that I wish I had this level of
understanding prior to commencing an "extreme makeover" of our technology infrastructure. Public schools' dollars are
sparse and must be stretched at every opportunity. Smart, relevant and robust acquisitions are the best ways to do
this."
“I wanted to thank you for putting on a great show in January. I think the show was set up real nice, and I think we’ll get
some business from it. The quality of the attendees was good, so all in all, I think we’ll be interested in participating
again in future shows. Keep us on the list for upcoming events. “
“I wanted to send along a quick thank you to the Data Connectors team for a very nice event here in Milwaukee. I
heard positive remarks from a variety of folks including attendance levels, how well organized it was, and how the
timing stayed on track.''
“Your meeting was so informative and you planned it so well. I love to learn and you had such great people lecturing. I
was so happy to be able to attend.”
“We look forward to continuing to support Data Connectors so keep up the good work, driving qualified attendance and
producing first-class local seminars.”
“Just a note to say that you sent my sales reps home exhausted! They were so busy at the Ft Lauderdale Data
Connectors meeting & talking to potential customers and taking notes for later follow-up that they just about dropped
of fatigue by the time the exhibits closed! And this week, still no respite -- they have to call and meet with all those
people.”
8
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, San Francisco, CA
Upcoming Conferences
2016
2017
2017
2017
December 14, Chicago Suburb, IL
January 11, Dallas, TX
June 1, Anaheim, CA
November 2, Birmingham, AL
December 15, St. Louis, MO
January 12, Portland, OR
June 8, Minneapolis, MN
November 9, San Francisco, CA
January 18, Atlanta, GA
June 15, Vancouver, BC
November 16, Phoenix, AZ
January 19, Orlando, FL
June 22, Philadelphia, PA
November 30, Seattle, WA
January 26, Charlotte, NC
June 29, Boise, ID
December 6, St. Louis, MO
February 2, Los Angeles, CA
July 6, Milwaukee, WI
December 7, Orange County, CA
February 9, Houston, TX
July 13, Pittsburgh, PA
December 13, Chicago Suburbs, IL
February 16, Des Moines, IA
July 20, Cincinnati, OH
December 14, Ft. Lauderdale, FL
February 23, Salt Lake City, UT
July 27, Dallas, TX
March 2, Jacksonville, FL
August 3, Indianapolis, IN
March 9, New Jersey, NJ
August 10, Washington, D.C.
March 16, Columbus, OH
August 17, Denver, CO
March 23, San Jose, CA
August 24, Atlanta, GA
March 30, Detroit, MI
August 31, Sacramento, CA
April 6, Raleigh, NC
September 7, Oklahoma City, OK
April 12, San Diego, CA
September 14, Montreal, QC
April 13, Chicago, IL
September 21, Kansas City, KS
April 20, Tampa, FL
September 28, London, ENG
April 27, San Antonio, TX
October 5, Austin, TX
May 4, Baltimore, MD
October 12, Boston, MA
May 11, Toronto, ON
October 19, New York City, NY
May 18, Omaha, NE
October 26, Nashville, TN
May 25, Hartford, CT
November 1, Calgary, AB
9
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, San Francisco, CA
Contacts
Tracy Schriver
[email protected]
(408) 643-8283
Jennifer Smith
[email protected]
(408) 577-5217
Amy Malech
[email protected]
(760) 212-6269
Ana Bernstein
[email protected]
(321) 348-6848
Michael Nagayama
[email protected]
415-602-2181
Janine Bodwin
[email protected]
(415) 747-8615
Tina Wright
[email protected]
(339) 235-0685
Syed Abdur Rahman
[email protected]
(512) 372-1004
Jackson Pierce
[email protected]
Brittany Heiss
[email protected]
(617) 393-7297
Kelly Meadows
[email protected]
(707) 217-7623
Choi Chow
[email protected]
408-428-1100 x1127
10
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, San Francisco, CA
Astrid Steward
[email protected]
949-584-9947
Rita Chen
[email protected]
(669) 444-1786
Kayla Isaac
[email protected]
(415) 519-2983
Celine Courtier
[email protected]
408-504-1269
Herve Dhelin
[email protected]
(888) 228-4655
Lexy Marchbank
[email protected]
408-656-7834
Carrie Craig
[email protected]
(862) 438-0432
Stacy Mezzetta de Cossio
[email protected]
408.601.2834
Katie Hayes
[email protected]
(617) 959-4617
Michele Free
[email protected]
(408) 464-3458
Matthew Todd
[email protected]
Masa Hashiguchi
[email protected]
(408) 701-7737
11
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, San Francisco, CA
Didier Perrot
[email protected]
(408) 718-0468
Patrick Huber
[email protected]
Rachel Bloodgood
[email protected]
913-601-3665
Tawna Parks
[email protected]
720-452-0545
Liz Molli
[email protected]
(847) 487-2700
Tal Arad
[email protected]
(408) 837-1992
Craig DuFrenne
[email protected]
(253) 514-1099
Kay Hughes
[email protected]
402-361-3139
Jessica Filip
[email protected]
(408) 780-0750
Ron Sterbenz
[email protected]
(612) 920-0580
Chris Simmons
[email protected]
404.493.2990404.493.2990
Heather Howland
[email protected]
(617) 797-3297
Sandra Vitali
[email protected]
(201) 785-3255
12
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, San Francisco, CA
Colm Foley
[email protected]
408-641-2200 ext 890
Agnes Chow
[email protected]
925-247-5471
Alex Hwang
[email protected]
(408) 613-2561
Cheree James
[email protected]
(323) 456-6707
Sarah Nichols
[email protected]
(781) 743-7343
Michael McKinzie
[email protected]
(866) 601-3392
Samantha Telegadis
[email protected]
(877) 292-8767
Nasseem Mostofi
[email protected]
408-326-2020 x100
Trisha Carnarius
[email protected]
(408) 404-4595
Chuong Pham
[email protected]
(408) 768-1786
Atri Chatterjee
[email protected]
408.533.0288
13
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, San Francisco, CA
Notes
14
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com
Tech-Security Conference, San Francisco, CA
Notes
15
500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495
[email protected] | www.DataConnectors.com