- This event has passed.
January 18, 2017 @ 8:15 am - 4:30 pm
The Atlanta Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech-Security Strategies Conference.
Director of Operations
Network Security is a Team Sport
Now more than ever, protecting your network takes teamwork. So, who are the players? There are more than you think: It’s not just you and your staff. Your users and vendors are obviously on the team, but it goes a lot deeper than that, too. Through a handful of quick case studies, we’ll pull back the curtain on shared threat intelligence, open source software, outsourcing, and even social media to see how an emphasis on working together can help combat common issues like ransomware and malware.
Beyond Time & Space
CTO & Founder
A New Way to Look at IT Security with Endpoint Modeling
Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling results and visibility into all network Endpoint behavior. With great accuracy, extremely low noise, and supporting evidence, endpoint modeling discovers and tracks the regular behavior of each device in a way that makes possible the automatic recognition of potentially harmful activities. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others.
Sr. Systems Engineer
Identifying Security Gaps
Exploring techniques for identifying architecture security gaps. A high-level review of current security technologies and understanding their strengths and limitations. Why behavior analytics, coupled with machine learning science offers the best approach in filling the security gap.
Securing your organization and containing the insider threat
Despite increasing investment in the cybersecurity market, we continue to see a rise in data breaches and their related costs, specifically those relating to the insider threat (accidental loss and malicious insider). Despite these types of incidents contributing approximately 50% of all breaches, CIO focus remains on the external threat.
In this presentation, we will question whether a new approach to data security needs to be applied: one that recognizes data security can’t be tackled in silo and instead a holistic more strategic approach must be taken to protect and secure data throughout its lifecycle in order to contain the insider threat.
Co-founder of Egress Software Technologies, Tony currently serves as CEO, overseeing all aspects of the business growth and innovation.
Prior to Egress, Tony held executive management positions at Reflex Magnetics, Pointsec Mobile Technologies, and Check Point Software Technologies. A frequent technology and industry speaker, Tony holds a Bachelor of Politics degree, a Software Engineering Master’s and is a certified BCS Fellow. Tony sits on industry committees including Intellect’s Government Management and Defence & Security Groups.
The Impact of DDoS Attacks
Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk. Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.
Director of Security Product Strategy
Mind the Gaps: Leveraging “Security as a Service” to Gain Cyber Advantage
Alex Knight has spent his career in the high-tech sector, with more recent focus on product management and product strategy for multi-national managed services providers. As Director of Security Product Strategy at ControlScan, Alex leads the company’s Managed Security Services strategy to service midmarket businesses across multiple verticals. Alex is proud to be a part of the high-growth tech scene in Atlanta, Georgia. You can find him on Twitter at @ak418.
Director of Analysis
The Truth About the Dark Web: Separating Fact from Fiction
For most, the term dark web immediately conjures thoughts of illegal drug sales, pornography, weapons of mass destruction, fraud and other criminal acts. Attend this presentation, “The Truth About the Dark Web: Separating Fact from Fiction” to learn more about common industry myths and what content actually exists on the dark web. Research findings from a Terbium Labs recent report analyzes what’s really taking place on the far corners of the Internet, including:
- Anonymity does not mean criminality.
- Pornography is prominent, but not all of it is illegal.
- Drugs are a popular topic.
- The Fraud Foible.
- Extremism is rare.
Emily Wilson serves as the Director of Analysis at Terbium Labs, a dark web data intelligence company, where she is responsible for managing a team of analysts that tracks industry news and trends among actors on the dark web, including specific breach operations, popular targets and the appearance of new sites for trading or discussing stolen data. She provides analysis for Terbium Labs’ customers on the appearance of their information online, along with ongoing analysis on the appearance of fraud, drugs, weapons, extremism and other information appearing on the dark web.
Mitigating the Risk of Corporate Hacking
Join Lockstep as we explore the unique challenges surrounding data confidentiality and integrity protection within corporate environments. Practical approaches to mitigating the risk of data breach will be reviewed by exploring the following topics:
· Threat Actors and Motives – Who wants your data and why
· Hacking Demo – From Endpoint compromise to “Keys to the Kingdom” – See how they do it
· Breach Tactics and Methodologies
· The risk to the integrity of your data: Personally Identifiable Information (PII); Patient and Customer Data (HIPAA, PCI); HR and Finance (FINRA); Trade Secrets
· Practical methods to mitigating the risk of breach
Director, Security & Network Transformation
Your Office 365 Network: Before, During, and After the Rollout
Of the 6,000 customers that route all of their Internet traffic through Zscaler, over 700 are using Office 365, amounting to over 1.2 petabytes (!) of Office 365 traffic alone — and growing daily. With this much experience, we would like to share what it takes to make the network, the business, and careers truly shine as cloud platforms such as this become the new normal. In the process, we will cover the objectives, metrics, and value that leading organizations require. We’ll even show you how to succeed without the need for a costly proof-of-concept (PoC)!
Channel Sales Engineer, Sales
Keep Ransomware Out. How you can stop ransomware and exploits before they strike.
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence
Currently Ken fills the role of Security Engineer at Sophos and has done so for the past 3 years. Ken has been in information security for 18 years. Ken is a former penetration tester that helped found Shadow Labs at HP. Currently Ken fills the role of Security Engineer at Sophos and has done so for the past 3 years. He is a security evangelist and overall geek. As a geek and lover of all things technology Ken is doing Internet of Things research (IoT) as well as drone security research.