Loading Events

« All Events

  • This event has passed.

Atlanta (Cybersecurity)

August 24 @ 8:15 am - 5:15 pm

Event Navigation

Details

Date:
August 24
Time:
8:15 am - 5:15 pm
Event Category:

Venue

Crowne Plaza Atlanta Midtown
590 West Peachtree Street NW
Atlanta,GA30308United States  + Google Map
Phone:
404-877-9000
Website:
http://www.cpatlantamidtown.com/

Overview

The Atlanta Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Ted Gruenloh
COO

Threat Intelligence and Layered Security in the WannaCry Era

The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.

9:15am - 9:45amSession Two

Ken Swain
Channel Sales Engineer

Intercepting Advanced Threats

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

•           Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
•           Detect: quickly and easily detect and isolate attacks
•           Respond: laser in on critical alerts and address them with simple to understand security intelligence

Download the Presentation

Speaker’s Bio:

Ken has more than 16 years’ experience in the technology sector.   Ken has been responsible for training, firewall and IPS administration; he has managed information production and deployed key components for PCI compliance, including SIEM and IPS solutions.   He also helped build the Application Security Center (Shadow Labs)  and performed application assessments at HP.   Prior to joining Sophos Ken was with LBMC performing penetration testing and auditing.

Ken has a passion for technology and especially security. This passion manifests itself in speaking engagements. Ken has developed a unique style and clearly demonstrates his passion. He has spoken at Gartner and ArcSight user’s conference on SIEM. On a smaller scale he has spoken at Nashville’s InfoSec conference on Mobile Security as well as many client and user groups on application security and mobile security enforcement.  Ken enjoys spending time with my family.

Ken’s family enjoys movie nights, travel and dinning together.  He is also an avid motorcycle rider who loves to take long trips with his friends.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Tony Rock

Making Information Security Actionable with GRC

Cyber risk is not only a present danger, but it’s also overwhelming at most organizations. IT departments are inundated with vulnerabilities and unable to analyze them in a timely fashion. Meanwhile, the C-suite is clamoring for evidence to support their risk management decisions.

Governance, risk management, and compliance (GRC) processes make cyber risk data actionable for both IT departments and the executive ranks. In this presentation, you’ll learn the areas GRC impacts and how one organization uses a GRC platform to prioritize vulnerabilities, while delivering visibility and accountability. Specifically, you’ll learn:

  • The role of information security in your GRC program.
  • How GRC processes can make your data actionable, driving better business decisions.
  • How one organization employed GRC to strengthen its vulnerability management program.
10:45am - 11:15amSession Four

Todd Blaese 
Sr. Sales Engineer, IT Security

Defense in-depth

In this day of risks, vulnerabilities and advanced persistent threats, it’s important to understand why perimeter protection simply just isn’t enough, and why a comprehensive assumed breach methodology ensures the greatest defense.  Ivanti security provides a proactive defense-in-depth approach to protecting ones corporate brand and integrity, reputation, data, devices & users from risks and potential attack. Join us for a discussion about the ever-changing threat landscape and how you can more effectively protect your company from these threats.

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Andrew Willetts

The Game has Changed….Ready or Not!

IT professionals expressed the following concerns regarding the security of the Internet of Things (IoT) in a study sponsored by ForeScout Technologies:

  • Only 30 percent are confident they really know what is on their network
  • Respondents who initially thought they had no IoT devices on their networks, actually had many IoT device types
  • Only 44 percent of respondents had an established security policy for IoT
  • 86 percent of respondents think discovery and classification of devices needs to be achieved without an agent

Download the Presentation

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Sam Elliott
Director of Security Product Management

Six Steps to Secure Access for Privileged Insiders and Vendors

Many organizations trying to secure privileged access for employees or vendors focus solely on the privileged credentials or identities. But this is only half the battle. Securing the access pathways is just as crucial to protect your critical systems and data from cyber threats. This session will outline the six steps companies need to take to secure privileged access, while simultaneously improving business productivity.

You will takeaway information on:

o   The risks associated with privileged access for internal employees and external vendors
o   Why just securing privileged accounts or credentials isn’t enough
o   How a layered security approach can enhance security without affecting productivity
o   Steps for implementing a comprehensive privileged access solution

Download the Presentation

Speaker’s Bio:

At Bomgar, Sam is responsible for the product management group that is driving product strategy for Bomgar’s security products. He has more than a decade of information security, ITSM, and IT operations management experience. He also is a seasoned expert in the areas of cyber-security, data center discovery, systems configuration management, and ITSM. Sam has a Bachelor of Science from Florida State University and is certified in ITIL v3 and Pragmatic Marketing. He resides in Atlanta, GA, with his family and can be found on twitter @samelliott.

1:00pm - 1:30pmSession Seven

Rob Pollock
Arbor Networks Channel Sales

The Impact of DDoS Attacks – The Stakes Have Changed – Are You Prepared??

Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk.  From the Mirai Botnet to the recent Wannacry ransomware attack, see how DDoS attacks are being used as a “smokescreen” for other nefarious activities.

Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

Mark Salmon
Senior Systems Engineer

Secure Data – a safe place in an unsafe world!

The backing up of data has been important since computers became part of business yet many organizations have inadequate, outdated, nonfunctioning or even nonexistent backup operations.  In this session, we will have a brief discussion on questions like these:  Are you backing up critical data every day? Are you regularly meeting your backup window? Does your backup architecture need updating? Are you spending too much (or too little) on protecting your data? Can your company recover everything needed in a timely manner if a disaster struck? Does the possibility of a ransomware attack give you cause for concern?

Download the Presentation

Speaker’s Bio:

Mark Salmon has been an IT professional for more than 30 years focusing primarily on Data Protection. While working with large software companies, start-ups or mid-sized technology firms Mark has been encouraging better DR procedures, architecting backup designs for complex environments and promoting technologies to protect the most important aspect of your business – your data.

2:15pm - 2:45pmSession Nine

Ginny Turley
Senior Vice President

Risk Driven IAM Tackle IAM with a Risk Based Approach

Identity Access Management is a complex matrix of requirements meant to assure that only the right people have access to your data.  This requires the creation of a rules, roles, and a method of preserving information about access rights.  In other words, we create “big data” that then must be mined to find the most risky individuals and risky behaviors.  By starting with a risk-based approach, finding those behaviors and individuals is easier.  Explore with us as we examine how risk values can be assigned as you build the database so that analyzing and reporting become easier.

Download the Presentation

2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:30pmSession Ten

Michael Vanderhoff
Product Manager

Explaining Bitcoins will be the easy part:  Email Borne Attacks and How You Can Defend Against Them 

If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes.  If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.

In this session, you’ll learn:

  • How your email can be used as an entry point for multiple types of attack
  • The damaging impact attacks have on organizations
  • Why your employees could be the weakest link in your email security
  • How to enhance your email security and thus your overall cyber resilience

Download the Presentation

3:30pm - 4:15pmSession Eleven

Sam McLane
Head of Security Engineering

Cybersecurity War Stories: Tales from the Trenches

In today’s world, it’s imperative for organizations of all sizes to succeed to have an online presence to succeed in business. But there’s a risk to always being connected—organizations are prime targets for cyber attacks. Recent ransomware strains like Petya and WannaCry demonstrate how business can be brought to a grinding halt by encrypting your business critical data.

Join the Head of Security Engineering at Arctic Wolf, Sam McLane, as he highlights some of the most interesting attacks that the team of AWN Concierge Security Engineers Arctic Wolf Networks has successfully hunted down in 2017. You’ll also hear why a robust SOC-as-a-service with human augmented machine learning is critical to bolster your defenses against the most advanced of threats.

Prize Drawings for All in Attendance
4:15pm - 4:45pmSession Twelve

Brendan Quinn

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Prize Drawings for All in Attendance
4:45pm - 5:15pmSession Thirteen

Brad Tompkins
Enterprise Sales Engineer

More than just a SIEM, full Threat Lifecycle Management for your organization

The Threat Lifecycle Platform is more than just a SIEM, it is the best way to gain full Threat visibility into what is going on in your organization, decrease time to detect and increase mitigation. Come join us for a crash course on what is a SIEM and why we’re better than a SIEM – full Threat Lifecycle Management

Prize Drawings for All in Attendance

Sponsors