- This event has passed.
August 24 @ 8:15 am - 5:15 pm
The Atlanta Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech-Security Strategies Conference.
Threat Intelligence and Layered Security in the WannaCry Era
The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.
Channel Sales Engineer
Intercepting Advanced Threats
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
• Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
• Detect: quickly and easily detect and isolate attacks
• Respond: laser in on critical alerts and address them with simple to understand security intelligence
Ken has more than 16 years’ experience in the technology sector. Ken has been responsible for training, firewall and IPS administration; he has managed information production and deployed key components for PCI compliance, including SIEM and IPS solutions. He also helped build the Application Security Center (Shadow Labs) and performed application assessments at HP. Prior to joining Sophos Ken was with LBMC performing penetration testing and auditing.
Ken has a passion for technology and especially security. This passion manifests itself in speaking engagements. Ken has developed a unique style and clearly demonstrates his passion. He has spoken at Gartner and ArcSight user’s conference on SIEM. On a smaller scale he has spoken at Nashville’s InfoSec conference on Mobile Security as well as many client and user groups on application security and mobile security enforcement. Ken enjoys spending time with my family.
Ken’s family enjoys movie nights, travel and dinning together. He is also an avid motorcycle rider who loves to take long trips with his friends.
Making Information Security Actionable with GRC
Cyber risk is not only a present danger, but it’s also overwhelming at most organizations. IT departments are inundated with vulnerabilities and unable to analyze them in a timely fashion. Meanwhile, the C-suite is clamoring for evidence to support their risk management decisions.
Governance, risk management, and compliance (GRC) processes make cyber risk data actionable for both IT departments and the executive ranks. In this presentation, you’ll learn the areas GRC impacts and how one organization uses a GRC platform to prioritize vulnerabilities, while delivering visibility and accountability. Specifically, you’ll learn:
- The role of information security in your GRC program.
- How GRC processes can make your data actionable, driving better business decisions.
- How one organization employed GRC to strengthen its vulnerability management program.
Sr. Sales Engineer, IT Security
In this day of risks, vulnerabilities and advanced persistent threats, it’s important to understand why perimeter protection simply just isn’t enough, and why a comprehensive assumed breach methodology ensures the greatest defense. Ivanti security provides a proactive defense-in-depth approach to protecting ones corporate brand and integrity, reputation, data, devices & users from risks and potential attack. Join us for a discussion about the ever-changing threat landscape and how you can more effectively protect your company from these threats.
The Game has Changed….Ready or Not!
IT professionals expressed the following concerns regarding the security of the Internet of Things (IoT) in a study sponsored by ForeScout Technologies:
- Only 30 percent are confident they really know what is on their network
- Respondents who initially thought they had no IoT devices on their networks, actually had many IoT device types
- Only 44 percent of respondents had an established security policy for IoT
- 86 percent of respondents think discovery and classification of devices needs to be achieved without an agent
Director of Security Product Management
Six Steps to Secure Access for Privileged Insiders and Vendors
Many organizations trying to secure privileged access for employees or vendors focus solely on the privileged credentials or identities. But this is only half the battle. Securing the access pathways is just as crucial to protect your critical systems and data from cyber threats. This session will outline the six steps companies need to take to secure privileged access, while simultaneously improving business productivity.
You will takeaway information on:
o The risks associated with privileged access for internal employees and external vendors
o Why just securing privileged accounts or credentials isn’t enough
o How a layered security approach can enhance security without affecting productivity
o Steps for implementing a comprehensive privileged access solution
At Bomgar, Sam is responsible for the product management group that is driving product strategy for Bomgar’s security products. He has more than a decade of information security, ITSM, and IT operations management experience. He also is a seasoned expert in the areas of cyber-security, data center discovery, systems configuration management, and ITSM. Sam has a Bachelor of Science from Florida State University and is certified in ITIL v3 and Pragmatic Marketing. He resides in Atlanta, GA, with his family and can be found on twitter @samelliott.
The Impact of DDoS Attacks – The Stakes Have Changed – Are You Prepared??
Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk. From the Mirai Botnet to the recent Wannacry ransomware attack, see how DDoS attacks are being used as a “smokescreen” for other nefarious activities.
Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.
Senior Systems Engineer
Secure Data – a safe place in an unsafe world!
The backing up of data has been important since computers became part of business yet many organizations have inadequate, outdated, nonfunctioning or even nonexistent backup operations. In this session, we will have a brief discussion on questions like these: Are you backing up critical data every day? Are you regularly meeting your backup window? Does your backup architecture need updating? Are you spending too much (or too little) on protecting your data? Can your company recover everything needed in a timely manner if a disaster struck? Does the possibility of a ransomware attack give you cause for concern?
Mark Salmon has been an IT professional for more than 30 years focusing primarily on Data Protection. While working with large software companies, start-ups or mid-sized technology firms Mark has been encouraging better DR procedures, architecting backup designs for complex environments and promoting technologies to protect the most important aspect of your business – your data.
Senior Vice President
Risk Driven IAM Tackle IAM with a Risk Based Approach
Identity Access Management is a complex matrix of requirements meant to assure that only the right people have access to your data. This requires the creation of a rules, roles, and a method of preserving information about access rights. In other words, we create “big data” that then must be mined to find the most risky individuals and risky behaviors. By starting with a risk-based approach, finding those behaviors and individuals is easier. Explore with us as we examine how risk values can be assigned as you build the database so that analyzing and reporting become easier.
Explaining Bitcoins will be the easy part: Email Borne Attacks and How You Can Defend Against Them
If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes. If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Head of Security Engineering
Cybersecurity War Stories: Tales from the Trenches
In today’s world, it’s imperative for organizations of all sizes to succeed to have an online presence to succeed in business. But there’s a risk to always being connected—organizations are prime targets for cyber attacks. Recent ransomware strains like Petya and WannaCry demonstrate how business can be brought to a grinding halt by encrypting your business critical data.
Join the Head of Security Engineering at Arctic Wolf, Sam McLane, as he highlights some of the most interesting attacks that the team of AWN Concierge Security Engineers Arctic Wolf Networks has successfully hunted down in 2017. You’ll also hear why a robust SOC-as-a-service with human augmented machine learning is critical to bolster your defenses against the most advanced of threats.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Enterprise Sales Engineer
More than just a SIEM, full Threat Lifecycle Management for your organization
The Threat Lifecycle Platform is more than just a SIEM, it is the best way to gain full Threat visibility into what is going on in your organization, decrease time to detect and increase mitigation. Come join us for a crash course on what is a SIEM and why we’re better than a SIEM – full Threat Lifecycle Management