Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Tech-Security Conference, San Francisco, CA Table of Contents Wi-Fi Instructions / Facebook / Twitter Info .................. .1 Agenda………………………………………………………2 About Data Connectors ................................................. .7 CPE Credits .................................................................. .7 Testimonials .................................................................. .8 Upcoming Conferences ................................................. .9 Contact Information ....................................................... .10 Tech-Security Conference, San Francisco, CA WI-FI INSTRUCTIONS Wireless Network: Grand Hyatt Meetings Passcode : dataconnectors16 (all lower case/case sensitive) Like us at www.facebook.com/DataConnectors and follow us on Twitter @DataConnectors for a chance to win our monthly $100 prize! Congratulations to our winners: October – Jane O’Neil September – Brian Handrigan August – Kathleen Dickman July – Jeff Janak June – Linda Goettler Stay Connected 1 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, San Francisco, CA Agenda 8:15-8:45 Check-In and Opening Introductions Data Connectors is proud to host the Tech-Security Strategies Conference. , 8:45-9:15 Session One – Radware, Gabe Meekins, Cloud RSM Cyber War Chronicles – Stories from the Virtual Trenches Cyber-attacks are becoming increasingly complex and persistent, making it difficult for security professionals to protect their organizations as they head into the virtualized, IoT era. In this session, Radware will share real world experiences gathered by its Emergency Response Team and discuss how leading enterprises are using Radware’s integrated Attack Mitigation Systems to successfully defend against the latest generation of attacks. Presentation copy provided. 9:15-9:45 Session Two – Efficient IP, Dennis Borin, Senior Solutions Architect Protect Your DNS Services Against Security Threats Think that a firewall is sufficient protection for your DNS servers? Think again. DDoS DNS attacks are on the rise, and a favorite target of hackers in order to extract sensitive customer data, passwords, and intellectual property. Existing solutions are not enough to protect against attacks, resulting in business downtime and brand reputation damage. In this session, attendees will learn about: · Applying DNS best practices and architecture designs · Mitigating DNS malware · Eliminating Single Point of Failure (SPOF) Presentation copy provided. 9:45-10:15 Break / Vendor Booth Time 10:15-11:00 Session Three – Observable Networks, Patrick Crowley, CTO & Founder A New Way to Look at IT Security with Endpoint Modeling Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling critical defense measures and visibility into endpoints and the network. With great accuracy, endpoint modeling discovers and tracks the role of each device in a way that emits actionable security intelligence when roles change in notable ways. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others. For a copy of this presentation, please contact Ron Sterbenz @ [email protected]. 2 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, San Francisco, CA 11:00-11:30 Session Four – Cylance, Richard Melick, Product Marketing Manager Moving Beyond Legacy Endpoint Security Technology Supporting enterprises in complex and diverse environments requires technologically sophisticated security solutions to combat zero-day threats. Endpoint security providers sell legacy technology in layered formats, focusing on the reactive, as the only solution. Artificial intelligence can secure a system against unknown threats in addition to threats that may hide their malicious behavior while under scrutiny. For a copy of this presentation, please contact Stefanie Alcantar @ [email protected]. 11:30-12:00 Break / Vendor Booth Time / Lunch 12:00-12:30 Session Five – Cisco Umbrella, Chris Frost, Systems Engineer How to Block Ransomware and Other Threats Before, During, After an Attack with Cisco Umbrella + Cisco's Advanced Malware Protection With cyber-attacks growing at a rapid pace, organizations of all sizes must adopt a layered security strategy, to provide maximum threat protection. In this informative session, you will learn from Cisco's Chris Frost about defense-in-depth strategies, and the "multiplier" benefit of combining OpenDNS Umbrella with Advanced Malware Protection (AMP) and cloud-based security services, delivered at the DNS layer. OpenDNS Umbrella delivers security at the DNS layer, creating a first layer of defense in your security stack. Umbrella uses the Internet’s existing infrastructure to keep malware from compromising your systems and to stop botnets or phishing from exfiltrating your data. In seconds, this cloud platform displays your global activity from all locations. Instantly, you can identify targeted attacks by comparing your activity—over any port, protocol, or app to the rest of the world. Cisco AMP provides global threat intelligence, advanced sandboxing, and real-time malware blocking to prevent breaches. But because you can’t rely on prevention alone, AMP continuously analyzes file activity across your extended network, so you can quickly detect, contain, and remove advanced malware. The combination of the two products gives organizations a highly robust solution to detect and block malicious domains and files, for maximum threat protection. 12:30-12:45 Break / Vendor Booth Time 3 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, San Francisco, CA 12:45-1:15 Session Six – RedSeal Networks, Sean Finn Visibility isn’t enough! It takes Actionable Intelligence!! Providing a cybersecurity analytics platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives. RedSeal’s advanced analytics engine creates functioning network models, tests networks to identify security risks, Measure needed actions, and provides critical information to quickly Prioritize issues. The result: reduced cybersecurity risk and lower incident response and maintenance costs. For a copy of this presentation, please contact Sarah Pino @ [email protected]. 1:15-1:45 Session Seven – Druva, Duy Pham, Account Executive & Scott Hirsh, Sr. Systems Engineer Unifying Data Protection & Lowering Data Risks by Leveraging the Cloud With data growing in your organization unabated and increasingly becoming fragmented across end-user devices, cloud services and both physical and virtual server environments, the dark specter of data loss or exposure is very real and comes at a high business cost. IT teams are being forced to rethink how to best protect their data without compromising security, compliance or legal requirements. Organizations that can get a few steps ahead in identifying and remediating data risks before they become front page news will more effectively protect their enterprise from exposure and fines. Join us for this session where we’ll discuss how modern cloud architecture is enabling new innovations for better utility of enterprise data, providing visibility, recoverability and governance capabilities for today’s data landscape, results unattainable with legacy, on premise approaches. Presentation copy provided. 1:45-2:00 Break / Vendor Booth Time 2:00-2:30 Session Eight – Bradford Networks Sanjit Shah, VP Business Development & Marketing Network Access Control (NAC) 501 - Transforming Network Security through Visibility, Control & Response Mobile devices, cloud technology,IoT and virtual work alternatives have changed how organizations operate. With over 21 billion new devices accessing networks by 2020 according to Gartner, how can organizations prepare today for the increase in devices without undermining the security posture? A strong perimeter defense is no longer sufficient to prevent cyber threats. Organizations need to address the entire security lifecycle to adequately protect digital assets and intellectual property, even as network access grows. This presentation will address the evolving security threat landscape, cover the three critical aspects of network security – visibility, control and automated response to augment existing security controls, and provide tips and best practices to shrink your attack surface and secure your network now and for the future. Presentation copy provided. 4 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, San Francisco, CA 2:30-3:00 Session Nine – Sophos, Marty Ward, VP Product Management Stopping Ransomware at the Door Ransomware has become one of the most widespread and damaging threats internet users face today. Since CryptoLocker first appeared in 2013, we’ve seen a new era of file-encrypting ransomware variants delivered through spam messages and exploit kits, extorting money from all types of organizations. And in 2016 alone it’s cost over $1 billion. Join us for this informative session to learn about ransomware threats and how to stay secure against them. For a copy of this presentation, please contact Sarah Nichols@ [email protected]. 3:00-3:15 Break / Vendor Booth Time 3:15-3:45 Session Ten – Darktrace, Erik Gordon Unsupervised Machine Learning: A New Approach to Cyber Defense From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis. Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat. Discover why unsupervised machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources. In this session, learn: •How new machine learning and mathematics are automating advanced cyber defense •Why full network visibility allows you to detect threats as or before they emerge •How smart prioritization and visualization of threats allows for better resource allocation and lower risk •Real-world examples of unknown threats detected by ‘immune system’ technology For a copy of this presentation, please contact Kayla Isaac @ [email protected]. 5 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, San Francisco, CA 3:45-4:15 Session Eleven – Heat Software, Duncan McAlynn, Director, Sales Engineering How to Prevent Ransomware with Microsoft & 3rd Party Technologies Duncan McAlynn discusses the threats we are facing today with ransomware, APTs, DDoS attacks and advanced phishing schemes to demonstrate how new and evolved Microsoft and third-party solutions can help protect and defend your critical workloads. For a copy of this presentation, please contact Stacy Mezzetta de Cossio @ [email protected]. 4:15-4:45 Session Twelve – Nyotron, Terence Chong, Solutions Engineer Protecting from tomorrow's threats today When combating threats, the biggest challenge is differentiating between safe computer activity and malicious acts. Traditional security defenses such as firewalls, secure email gateways, IPSs, antivirus platforms and other signature based solutions play a key role in a defense-in-depth strategy, but often fall short on protecting against advanced threats. The cyber security industry needs a game changer – a solution that is threat-agnostic and can proactively detect, prevent and analyze threats, known or unknown, regardless of the type of attack, who generated the attack, or how, where or when the attack penetrated the organization. For a copy of this presentation, please contact Jessica Filip @ [email protected]. Prize Drawings for All in Attendance 4:45-5:15 Session Thirteen – A10 Networks Prize Drawings for All in Attendance Hexatier was scheduled to speak today, however, due to a conflict they are unable to attend altogether. For more information about Hexatier, please contact Katie Hayes at [email protected] or (617) 959-4617. 6 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, San Francisco, CA Welcome to Data Connectors Data Connectors’ technology security conferences are focused on providing you with the latest best practices, products and services available to the community right now in an educational environment. Whether you are concerned with information security, cyber security, network security or particular topics such cloud computing, the evolving IT landscape as well as how to combat cyber criminals, you will leave the event better informed and ready to tackle the issues at hand inside your organization. Each event is packed with regionally-based vendors and speakers that are on the frontline. They have the tactics and can help your team to develop a strategy that works for your needs. Join us at one of our events throughout the United States or Canada to learn and network with industry professionals today. CPE CREDITS $50 processing fee. Please see the Registration Desk for further details. 7 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, San Francisco, CA Testimonials "Great job! It is one of the most informative one day conferences I've ever attended!" "Enjoyed meeting and talking to you at your Tech-Security Conference in Raleigh NC. A lot of our ISSA Chapter members attended and all had very positive experiences. Also, we learned more for improving our own chapter sponsored InfoSeConference and hope we can call on you in the future." “I didn't get a chance to complete the evaluation form, but the workshop today was EXCELLENT! I just wanted to express my appreciation for the information made available to us at the workshop today. I thought that all of the presenters were clear, concise and provided highly useful and easily understandable information, even to those of us who are not exactly experts in the field of e-security. The handouts were really helpful too. One of my colleagues who couldn't attend after we described what we gained from the workshop asked if there would be another. We hope to be invited." "The conference was very informative. It brought me up to date on the latest trend on security issues and possible solutions. Please accept my complements to you and your staff on putting this conference together. Please keep me informed of future events." "The conference was refreshing and informative. The location was perfect. My compliments go to the conference organizers!" "Thank-you for a terrific conference. I learned much more than I expected and every presentation was appropriate, concise and very well done. The networking opportunity was a real bonus. I kept thinking that I wish I had this level of understanding prior to commencing an "extreme makeover" of our technology infrastructure. Public schools' dollars are sparse and must be stretched at every opportunity. Smart, relevant and robust acquisitions are the best ways to do this." “I wanted to thank you for putting on a great show in January. I think the show was set up real nice, and I think we’ll get some business from it. The quality of the attendees was good, so all in all, I think we’ll be interested in participating again in future shows. Keep us on the list for upcoming events. “ “I wanted to send along a quick thank you to the Data Connectors team for a very nice event here in Milwaukee. I heard positive remarks from a variety of folks including attendance levels, how well organized it was, and how the timing stayed on track.'' “Your meeting was so informative and you planned it so well. I love to learn and you had such great people lecturing. I was so happy to be able to attend.” “We look forward to continuing to support Data Connectors so keep up the good work, driving qualified attendance and producing first-class local seminars.” “Just a note to say that you sent my sales reps home exhausted! They were so busy at the Ft Lauderdale Data Connectors meeting & talking to potential customers and taking notes for later follow-up that they just about dropped of fatigue by the time the exhibits closed! And this week, still no respite -- they have to call and meet with all those people.” 8 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, San Francisco, CA Upcoming Conferences 2016 2017 2017 2017 December 14, Chicago Suburb, IL January 11, Dallas, TX June 1, Anaheim, CA November 2, Birmingham, AL December 15, St. Louis, MO January 12, Portland, OR June 8, Minneapolis, MN November 9, San Francisco, CA January 18, Atlanta, GA June 15, Vancouver, BC November 16, Phoenix, AZ January 19, Orlando, FL June 22, Philadelphia, PA November 30, Seattle, WA January 26, Charlotte, NC June 29, Boise, ID December 6, St. Louis, MO February 2, Los Angeles, CA July 6, Milwaukee, WI December 7, Orange County, CA February 9, Houston, TX July 13, Pittsburgh, PA December 13, Chicago Suburbs, IL February 16, Des Moines, IA July 20, Cincinnati, OH December 14, Ft. Lauderdale, FL February 23, Salt Lake City, UT July 27, Dallas, TX March 2, Jacksonville, FL August 3, Indianapolis, IN March 9, New Jersey, NJ August 10, Washington, D.C. March 16, Columbus, OH August 17, Denver, CO March 23, San Jose, CA August 24, Atlanta, GA March 30, Detroit, MI August 31, Sacramento, CA April 6, Raleigh, NC September 7, Oklahoma City, OK April 12, San Diego, CA September 14, Montreal, QC April 13, Chicago, IL September 21, Kansas City, KS April 20, Tampa, FL September 28, London, ENG April 27, San Antonio, TX October 5, Austin, TX May 4, Baltimore, MD October 12, Boston, MA May 11, Toronto, ON October 19, New York City, NY May 18, Omaha, NE October 26, Nashville, TN May 25, Hartford, CT November 1, Calgary, AB 9 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, San Francisco, CA Contacts Tracy Schriver [email protected] (408) 643-8283 Jennifer Smith [email protected] (408) 577-5217 Amy Malech [email protected] (760) 212-6269 Ana Bernstein [email protected] (321) 348-6848 Michael Nagayama [email protected] 415-602-2181 Janine Bodwin [email protected] (415) 747-8615 Tina Wright [email protected] (339) 235-0685 Syed Abdur Rahman [email protected] (512) 372-1004 Jackson Pierce [email protected] Brittany Heiss [email protected] (617) 393-7297 Kelly Meadows [email protected] (707) 217-7623 Choi Chow [email protected] 408-428-1100 x1127 10 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, San Francisco, CA Astrid Steward [email protected] 949-584-9947 Rita Chen [email protected] (669) 444-1786 Kayla Isaac [email protected] (415) 519-2983 Celine Courtier [email protected] 408-504-1269 Herve Dhelin [email protected] (888) 228-4655 Lexy Marchbank [email protected] 408-656-7834 Carrie Craig [email protected] (862) 438-0432 Stacy Mezzetta de Cossio [email protected] 408.601.2834 Katie Hayes [email protected] (617) 959-4617 Michele Free [email protected] (408) 464-3458 Matthew Todd [email protected] Masa Hashiguchi [email protected] (408) 701-7737 11 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, San Francisco, CA Didier Perrot [email protected] (408) 718-0468 Patrick Huber [email protected] Rachel Bloodgood [email protected] 913-601-3665 Tawna Parks [email protected] 720-452-0545 Liz Molli [email protected] (847) 487-2700 Tal Arad [email protected] (408) 837-1992 Craig DuFrenne [email protected] (253) 514-1099 Kay Hughes [email protected] 402-361-3139 Jessica Filip [email protected] (408) 780-0750 Ron Sterbenz [email protected] (612) 920-0580 Chris Simmons [email protected] 404.493.2990404.493.2990 Heather Howland [email protected] (617) 797-3297 Sandra Vitali [email protected] (201) 785-3255 12 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, San Francisco, CA Colm Foley [email protected] 408-641-2200 ext 890 Agnes Chow [email protected] 925-247-5471 Alex Hwang [email protected] (408) 613-2561 Cheree James [email protected] (323) 456-6707 Sarah Nichols [email protected] (781) 743-7343 Michael McKinzie [email protected] (866) 601-3392 Samantha Telegadis [email protected] (877) 292-8767 Nasseem Mostofi [email protected] 408-326-2020 x100 Trisha Carnarius [email protected] (408) 404-4595 Chuong Pham [email protected] (408) 768-1786 Atri Chatterjee [email protected] 408.533.0288 13 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, San Francisco, CA Notes 14 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com Tech-Security Conference, San Francisco, CA Notes 15 500 Chesterfield Center, Suite 320, Chesterfield, MO 63017 | 636–778–9495 [email protected] | www.DataConnectors.com