SACRAMENTO CYBERSECURITY CONFERENCE
AUGUST 8, 2019
Includes Keynote Session and CISO Panel
CHECK-IN AND OPENING INTRODUCTIONS
8:30 am – 9:00 am
Data Connectors is proud to host the Cybersecurity Strategies Conference.
9:00 am – 9:30 am
One Platform for IT Resilience — simple, scalable, and always available.
Successful businesses are embracing digital transformation – harnessing the power of technology to drive efficiencies, create new experiences, and ultimately beat the competition. These business leaders are relying on their IT organizations to make it happen. Challenged to maximize IT resources and faced with the complexity of protecting the business while modernizing and transforming, IT leaders are shifting to an IT resilience strategy. IT resilience is the ability to seamlessly adapt to new technology and drive IT transformation, while mitigating the risks of downtime, ensuring an always-on business and the best customer experience.
Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto combines disaster recovery, backup and cloud mobility in a simple, converged platform. With enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds.
9:30 am – 10:00 am
We help organizations keep data safe and block the growing number of complex threats. We protect everywhere and offer complete security with our full range of endpoint, encryption, email, web, network security and UTM products.
We help customers protect their businesses and meet compliance needs. And all our customers benefit from the expertise of our threat analysts located around the world. Their research is at the heart of everything we do. They quickly find the latest threats and update protection for our customers automatically. Plus, our support engineers are experts on all our products, and they’re available whenever you need them.
We make our products easy to install and use so you spend less time managing security. With Sophos you can focus on the needs of your business because we’re securing your entire organization.
10:00 am – 10:30 am
Break / Vendor Booth Time
10:30 am – 11:00 am
About Attivo Networks
Attivo Networks® is the leader in deception for cyber security defense. Founded in 2011, Attivo Networks provides a comprehensive deception platform that in real-time detects inside-the-network intrusions in networks, public and private data centers, and specialized environments such as Industrial Control System (ICS) SCADA, Internet of Things (IoT), and Point of Sale (POS) environments.
Founded on the premise that even the best security systems cannot prevent all attacks, Attivo provides the required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Unlike prevention systems, Attivo assumes the attacker is inside the network and uses high-interaction decoys and endpoint, server, and application deception lures placed ubiquitously across the network to deceive threat actors into revealing themselves.
11:00 am – 11:30 am
Security breaches, data leaks and email-based attacks are a real threat to your organization. Now, more than ever, you need a new approach to email security and management. Don’t let the limitations of traditional technologies prevent you from protecting email and corporate information.
We have made it our mission to mitigate the risks you face from email, and support you in reducing the cost and complexity of protecting yourself by moving this workload to the cloud. We live and breathe cloud technology. We developed our proprietary cloud architecture to offer you comprehensive email security, service continuity and archiving in a single subscription service. Our goal is to make it easier for you to protect your business in today’s fast-changing security and risk environment.
11:30 am – 12:00 pm
Break / Vendor Booth Time / Lunch
12:00 pm – 12:45 pm
Keynote Details Coming Soon
12:45 pm – 1:15 pm
Break / Vendor Booth Time
1:15 pm – 1:45 pm
Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solutions. Malwarebytes completely replaces antivirus with artificial intelligence-powered technology that stops cyberattacks before they can compromise home computers and business endpoints. More than 60,000 businesses and millions of people worldwide trust and recommend Malwarebytes solutions. Our team of threat researchers and security experts process emerging and established threats every day, from all over the globe. Founded in 2008, the company is headquartered in California, with offices in Europe and Asia.
1:45 pm – 2:15 pm
About Vade Secure
Vade Secure has developed a full set of security features against the most sophisticated email scams such as phishing and spear phishing, malware and ransomware. As a Global company, protecting more than 500 million mailboxes worldwide, we have an accurate vision on worldwide email flow. This allows us to provide the comprehensive solution against all email threats, ensuring a zero-day protection, even on targeted attacks. Our solutions are tailored to deal with a large amount of emails to help ISPs, OEMs, hosting companies and Enterprises.
2:15 pm – 2:30 pm
Break / Vendor Booth Time
2:30 pm – 3:00 pm
CybeReady is trusted by globally recognized brands to empower internal security teams, lessening leaders’ workloads and transform employee behavior through localized data-driven training. CybeReady continuously prepares employees of leading financial institutions, insurance companies, healthcare organizations and others in 35 languages across 66 countries worldwide.
3:00 pm – 3:30 pm
About Trend Micro
250+ million endpoints. 500,000+ companies worldwide. One security software company. For over 30 years, Trend Micro’s unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats. The depth of our experience remains unmatched. From the endpoint to the network to the cloud, we’ve got you covered with a connected threat defense recognized by analysts, customers, and industry gurus of all kinds.
Submit your bio for consideration to participate on our CISO Panel
to firstname.lastname@example.org or fill out our Call for Speakers form here.
IT Solutions Provider
Accend Networks is one of the leading IT Solutions Providers providing consulting services for small, medium-sized businesses and large corporations, including SLED customers. A lot of clients have already turned to us for help and use our services.
A lot of companies and people have been talking about cloud hosting services vs on-premises IT solutions--the pros and cons of both. To be very honest, no option is "perfect", but cloud hosting services do offer a wide range of advantages over on-premises solutions....