New York City Cybersecurity Conference

button-icon-arrow-right
button-icon-arrow-left

button-icon-arrow-leftBack

Event

New York City Cybersecurity Conference

1 August 2019

New York

Added 01-Jan-1970

SESSION ONE

8:45 am - 9:30 am
About Security Management Partners

Founded in 2001 and headquartered in Waltham, MA, Security Management Partners is a full-service IT assurance firm. We specialize in information security audits, assessments and regulatory compliance consulting for the corporate, healthcare, biopharma, and financial industries. As proven independent counsel to large global enterprises as well as small- to mid-sized businesses, SMP identifies threats and vulnerabilities, quantifies risks and provides remediation strategies for your information assets.

Our highly skilled IT security specialists maintain a singular focus to identify, test and provide concrete solutions that eliminate external and internal information security risks, while working in partnership with you to navigate today’s evolving regulatory compliance rules. SMP is 100% vendor-neutral, which means we do not push integration or managed services, sell hardware or software or act as resellers, which ensures complete objectivity in your IT security engagement.

Let us show you why hundreds of businesses have selected SMP as their cybersecurity provider of choice. We look forward to learning how we can help your organization advance its IT security, policies, practices and processes.

SESSION TWO

9:30 am - 10:00 am
About Respond Software

Respond Software delivers instant ROI to organizations in their battle against cyber crime. With its patent-pending intelligent decision engine, PGO, Respond Software’s product uniquely combines the best of human expert judgement with the scale, thoroughness, and consistency of software. This quick-to-implement, cyber-security decision automation software delivers the equivalent of a virtual, best-of-breed analyst team that dramatically increases capacity and improves monitoring and triage capabilities at a fraction of the cost.

Respond Software was founded in 2016 by security and software industry veterans.

BREAK
10:00 am - 10:30 am
Break / Vendor Booth Time

SESSION THREE

10:30 am - 11:00 am
About Tempered Networks

Our Proven Solution is Unlike Any Other

Originally developed for a global Fortune 50 manufacturer, our technology enabled the company to increase its competitive edge by modernizing their production network and increasing production output, while safeguarding them against cyber breaches. Today, IDN is available to the broader market and we’re uniquely positioned to help you overcome your thorniest networking challenges. We understand the significant burden created by complex, time-consuming, and costly work-arounds – not to mention the distressing security trade-offs.

Our identity-based solution leverages the IETF-ratified Host Identity Protocol (HIP), an industry breakthrough for secure communications. With HIP, your devices can be identified using strong cryptographic identities, rather than an IPv4 or IPv6 address. This means your networked devices can change location yet retain their strong ‘verifiable’ cryptographic identity.

Our simple to use policy-based orchestration means anyone can manage IDN overlays. Our point-and-click orchestration tool sets and distributes network policies, making manual and tedious IP address management a thing of the past. It’s time to say good-bye to antiquated addressed-defined networking and welcome identity defined networking.

SESSION FOUR

11:00 am - 11:30 am
About Nyotron

Nyotron has turned the security paradigm upside down by focusing on the damage stage or the intended outcome behind the attack. Traditional as well as next-generation endpoint security technologies attempt to prevent attacker’s entry into the enterprise, whether at the perimeter or the endpoint, acting like gates that can be bypassed. We assume that given enough time targeted and unknown threats will bypass your existing security controls. Our engine has mapped legitimate operating system behavior, so when an attack attempts to delete, exfiltrate or encrypt files, we know the actions shouldn’t be allowed and stop the damage from executing.

Founded in 2012, Nyotron is headquartered in Santa Clara, CA with R&D in Israel. Nyotron has earned a top score of 5 stars from SC Magazine in its review of Endpoint Security Platforms, won GOLD in the 2017 IT World Awards for Endpoint Security and was designated as the 2017 HOT COMPANY in Endpoint Security by Cyber Defense Magazine.

KEYNOTE LUNCH
11:30 am - 12:15 pm
Keynote Details Coming Soon

SESSION FIVE

12:15 pm - 12:45 pm
About Vaporstream

Chicago-based Vaporstream is an entrepreneurial technology company delivering secure communications for next generation business. Built by security, privacy and compliance experts – each with over 30 years of experience in the content management industry – we empower business professionals to communicate with confidence. By securely leveraging one of the most prominent 21st-century communication channels – text messaging – Vaporstream solutions enable your business to increase efficiency, automate workflows and improve business outcomes in a secure, compliant manner.

With privacy and security at the core of our mission, Vaporstream is driven to uniquely solve the business challenges created by smart phone and IoT technology while improving collaboration, decision making and engagement.

BREAK
12:45 pm - 1:00 pm
Break / Vendor Booth Time

SESSION SIX

1:00 pm - 1:30 pm
About Nexum

Founded in 2002 and headquartered in Chicago, Nexum® takes a comprehensive approach to security. Nexum approaches business with one simple statement: “Do what’s right for the customer and success will follow.”

Nexum helps you mitigate risks, protect your data, increase business continuity and meet your unique business objectives by:

Detecting and preventing network threats, intrusions and disruptions
Equipping you with the information, tools, training and resources you need to effectively manage IT risk

Nexum, Latin for an arrangement by which one pledged one’s very liberty as security, Nexum is committed to ensuring your security. At Nexum, We Mean Security®.

SESSION SEVEN

1:30 pm - 2:00 pm
About CSPi

At CSPi we are committed to helping our customers meet some of computing’s most demanding performance, availability and security challenges.

Today’s security teams receive a great deal of real-time information and intrusion alerts, generated from their security equipment and tools; yet, the volumes of data make it make it nearly impossible for incident response teams to validate a data breach. With our Myricom nVoy Series solution we offer our customers a new approach to cyber threat identification and investigation – a rapid breach response solution that identifies alerts associated with a specific asset and provides an extraction of the entire set of conversations associated with that breach.This detailed data is crucial in performing timely and accurate analysis needed to comply with data-privacy regulations such as GDPR, PCI DSS, HIPPA, SOX, and 48 different U.S. state laws related to PII.

BREAK
2:00 pm - 2:15 pm
Break / Vendor Booth Time

SESSION EIGHT

2:15 pm - 2:45 pm
About KnowBe4

We are a leader in the Gartner Magic Quadrant and the fastest-growing vendor in this space.

KnowBe4 is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering.

The KnowBe4 platform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Our goal was to design the most powerful, yet easy-to-use platform available. We have tens of thousands of customers worldwide.

Customers of all sizes can get the KnowBe4 platform deployed into production twice as fast as our competitors. Our Customer Success team gets you going in no time, without the need for consulting hours.

BREAK
2:45 pm - 3:00 pm
Break / Vendor Booth Time

SESSION NINE

3:00 pm - 3:30 pm
About Array Networks

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.

Proven at over 5000 worldwide customer deployments, Array is recognized by leading enterprises and service providers for next-generation technology that takes the guesswork out of NFV deployment and delivers agility at scale.

SESSION TEN

3:30 pm - 4:00 pm
About Nordic Backup

For over a decade and thousands of terabytes uploaded, Nordic Backup has never a lost a single byte of customer data. We’ve restored thousands of computers and millions of files, getting businesses back up and running and individuals back to normal.

More than anything else, we believe that says who we are.

SESSION ELEVEN

4:00 pm - 4:30 pm
About SlashNext

We are a team of cybersecurity professionals changing how companies protect themselves from today’s—and tomorrow’s—phishing threats. Our mission: to protect organizations from the growing number of phishing attacks occurring outside of email throughout the Web.

Founded by Atif Mushtaq, lead architect of FireEye’s core malware detection technology, we are focused on the biggest vulnerability in cybersecurity: human fallibility. While OS emulation (sandboxing) addressed the .exe malware problem, SlashNext has pioneered the concept of Session Emulation to solve the HTML Attack problem presented by Web-based phishing.

CISO PANEL
4:30 pm - 5:15 pm
Panel Details Coming Soon

NETWORKING / HAPPY HOUR
5:15 pm - 6:15 pm

Top