December 5, 2019 Data Connectors St. Louis Cybersecurity Conference 2019

DECEMBER 5, 2019
Includes Keynote Session and CISO Panel

CHECK-IN AND OPENING INTRODUCTIONS

8:15 am – 8:45 am

Data Connectors is proud to host the Cybersecurity Strategies Conference.

SESSION ONE

8:45 am – 9:15 am

About Critical Start

Critical Start is the fastest-growing cybersecurity integrator in North America. Our mission is simple: protect our customers’ brands and reduce their business risk. We do this for organizations of all sizes through our award-winning portfolio of end-to-end security services – from security-readiness assessments using our proven framework (the Defendable Network) to the delivery of managed detection and response, incident response, professional services, and product fulfillment. Critical Start has been named to the CRN 2018 Tech Elite 250 and top 100 Security MSPs lists.

SESSION TWO

9:15 am – 9:45 am

About Respond Software

Respond Software delivers instant ROI to organizations in their battle against cyber crime. With its patent-pending intelligent decision engine, PGO, Respond Software’s product uniquely combines the best of human expert judgement with the scale, thoroughness, and consistency of software. This quick-to-implement, cyber-security decision automation software delivers the equivalent of a virtual, best-of-breed analyst team that dramatically increases capacity and improves monitoring and triage capabilities at a fraction of the cost.

Respond Software was founded in 2016 by security and software industry veterans.

BREAK

9:45 am – 10:15 am

Break / Vendor Booth Time

SESSION THREE

10:15 am – 10:45 am

About Zerto

One Platform for IT Resilience — simple, scalable, and always available.

Successful businesses are embracing digital transformation – harnessing the power of technology to drive efficiencies, create new experiences, and ultimately beat the competition. These business leaders are relying on their IT organizations to make it happen. Challenged to maximize IT resources and faced with the complexity of protecting the business while modernizing and transforming, IT leaders are shifting to an IT resilience strategy. IT resilience is the ability to seamlessly adapt to new technology and drive IT transformation, while mitigating the risks of downtime, ensuring an always-on business and the best customer experience.

Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud adoption. By replacing multiple legacy solutions with a single IT Resilience Platform, Zerto combines disaster recovery, backup and cloud mobility in a simple, converged platform. With enterprise scale, Zerto’s software platform delivers continuous availability for an always-on customer experience while simplifying workload mobility to protect, recover and move applications freely across hybrid and multi-clouds.

SESSION FOUR

10:45 am – 11:15 am

About KnowBe4

We are a leader in the Gartner Magic Quadrant and the fastest-growing vendor in this space.

KnowBe4 is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering.

The KnowBe4 platform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Our goal was to design the most powerful, yet easy-to-use platform available. We have tens of thousands of customers worldwide.

Customers of all sizes can get the KnowBe4 platform deployed into production twice as fast as our competitors. Our Customer Success team gets you going in no time, without the need for consulting hours.

LUNCH

11:15 am – 11:45 am

Break / Vendor Booth Time / Lunch

KEYNOTE SESSION

11:45 am – 12:30 pm

Keynote Details Coming Soon

BREAK

12:30 pm – 1:00 pm

Break / Vendor Booth Time

SESSION SIX

1:00 pm – 1:30 pm

About Attivo Networks

Attivo Networks® is the leader in deception for cyber security defense. Founded in 2011, Attivo Networks provides a comprehensive deception platform that in real-time detects inside-the-network intrusions in networks, public and private data centers, and specialized environments such as Industrial Control System (ICS) SCADA, Internet of Things (IoT), and Point of Sale (POS) environments.

Founded on the premise that even the best security systems cannot prevent all attacks, Attivo provides the required visibility and actionable, substantiated alerts to detect, isolate, and defend against cyber attacks. Unlike prevention systems, Attivo assumes the attacker is inside the network and uses high-interaction decoys and endpoint, server, and application deception lures placed ubiquitously across the network to deceive threat actors into revealing themselves.

SESSION SEVEN

1:30 pm – 2:00 pm
Holger Weeres

Windows 10 Migrations

Companies are scrambling to beat the deadline and get their remaining Win 7 machines migrated to Windows 10 before Microsoft sunsets Windows 7 on January 14th.
Start managing your endpoints properly and proactively. Avoid the inevitable long term implications of quick-fix upgrades. In this presentation we outline the different migration approaches taken today. We also outline how to overcome some typical pitfalls and start managing the entire life-cycle of your PCs, Servers and Mobiles centrally through one intuitive UI. And even if Win 7 is no longer your problem, how about the next In-Place upgrades coming down the pipe at a frequent pace to keep the Migration pains and inconsistencies across Windows deployments going.

 

Speaker’s Bio:

Holger is a seasoned UEM expert with over 20 years of experience in Endpoint Automation for company of all sizes.

He has designed and implemented UEM solutions for many large enterprises as well as SMB customers. As a former Product Manager in the UEM space he is also familiar with most company’s general challenges and common obstacles in achieving a secure, easy to manage and support, consistent user workspace.

BREAK

2:00 pm – 2:15 pm

Break / Vendor Booth Time

SESSION EIGHT

2:15 pm – 2:45 pm

About Idaptive

Idaptive Next-Gen Access is the only industry-recognized solution that uniquely converges single single-on (SSO), adaptive multifactor authentication (MFA), enterprise mobility management (EMM) and user behavior analytics (UBA). With Idaptive, organizations experience secure access everywhere, reduced complexity and have newfound confidence to drive new business models and deliver kick-ass customer experiences. Over 2,000 organizations worldwide trust Idaptive to proactively secure their businesses.

SESSION NINE

2:45 pm – 3:15 pm

About Stellar Cyber

Stellar Cyber’s Starlight is the world’s first open detection/response (Open-XDR) platform, connecting the dots throughout the entire security infrastructure and automatically responding to attacks wherever they occur. Starlight integrates dozens of security applications from an App Store and presents results in an intuitive dashboard to supercharge analyst productivity.

CISO PANEL

3:15 pm – 4:15 pm

Submit your bio for consideration to participate on our CISO Panel
to dmorrissey@dataconnectors.com or fill out our Call for Speakers form here.

NETWORKING / HAPPY HOUR

4:15 pm – 5:15 pm