- This event has passed.
September 15, 2016 @ 8:00 am - 5:15 pm
The Atlanta Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech-Security Strategies Conference.
Network Visibility And Security In The Era Of Mobility & Advanced Threats
Hack attacks – and in particular Advanced Persistent Threats (APTs) – are on the rise, eroding reputations and looting organizational assets with disturbing regularity. With mobility the new norm and mobile security in its relative infancy, are BYOD enterprises inviting APT attacks? Mobile devices potentially open the organizational network to a new set of security risks that challenge IT professionals to plan strategically. This session examines effective new approaches to redefine network perimeter, gain real time network visibility into who and what is on it, and control access automatically. Importantly, the session offers strategies for preventing and controlling APTs and other infections.
Senior Solutions Architect
Protect Your DNS Services Against Security Threats.
Territory Account Manager
Wi-Fi Security Assessment: 5 Steps to Securing Evolving BYOD & IoT Challenges
Whether it’s Bring Your Own Device (BYOD), Internet of Things (IoT) or education 1:1 initiatives, it’s clear there are a lot more devices showing up on your Wi-Fi network. This poses significant risk to organizations and IT departments that are forced to straddle the line between simplified access and managing the onslaught of potential security threats. Wi-Fi security attacks, hacking, stolen mobile devices – are these things keeping you awake at night? You may be surprised that Wi-Fi networks can be at least on par, if not more secure than your wired networks! Join this session to learn about the wireless security capabilities available to you and to get a best practice security checklist for evaluating your Wi-Fi infrastructure.
Ted Gruenloh Director of Operations
7 Security Mindsets to Adopt Today
It can be easy to get caught up in thinking if you just had that new shiny device, your network security burden would be lighter. The reality is that no one device can solve your problem, and these days it takes a completely new perspective to tackle security in the real world. In this presentation, we’ll discuss 7 security mindsets – some new, some old – and how they can help you make smarter, more practical decisions about protecting your network.
Territory Account Manager
Is your application performance getting cloudy?
More and more of your critical applications are moving outside of your network and data centers and into the cloud. With the move to cloud, many IT organizations have noticed a drop in performance with a loss of visibility and control they once had when these applications were on prem. Learn about some of the challenges organizations face when moving to the cloud and what you need to do to get the clarity you need for your critical apps.
Sr. Systems Engineer
You Have a Blind Spot – Exposing The Misuse of The Foundation of Online Security
Adversaries are outsmarting enterprise security strategies by exploiting the foundation of online security. Cyberthreats are becoming more complex and harder to detect. Intel predicts the next big hacker marketplace to be in the sale of digital certificates that are already selling for more than $1000 each on underground marketplaces. Gartner expects 50% of network attacks to use encrypted SSL/TLS in less than 2 years. 100% of organizations have responded to an attack that misuses keys and certificates in the last two years. And an alarming 54% of them can’t determine friend versus foe. What’s to do? The human immune system has evolved to defend and destroy complex and oftentimes overwhelming attacks. What can we learn from it? How can we create a future that’s more resistant as we use more software, more clouds, more apps, and more connected devices?
Sales Engineer Southeast
Today’s threat landscape : A Hacker’s Perspective
Sr. Systems Engineer
A Tale of Two Breaches: The Sony Pictures and Ashley Madison Attacks
In this presentation, the attacks that compromised Sony Pictures and Ashley Madison are examined and used as examples of why a data-oriented defense strategy is needed in today’s InfoSec world.
Regional Threat Prevention Expert – South
Equation Group APT Campaign: The Evolution of Sophisticated Malware & CPU-Level Threat Prevention
The Equation APT campaign, discovered recently, is perhaps the most sophisticated global, multi-layer attack platform to this date. Join us to explore the anatomy of the Equation attack and discuss how traditional security tools, including more advanced sandboxing technologies, are not enough to prevent this type of attack. We will also take a look at the evasion techniques used by the Equation group and others, as well as CPU-Level threat prevention technologies that can be used to stop these attacks.
Channel Account Manager
The Ransomware Pandemic
Today there are over half a million versions of ransomware creeping across the web. The threat to SMBs’ data being kept hostage is only one misinformed click away. Ransomware isn’t digital vandalism; it’s a lucrative global industry that thrives on ignorance.
This 30-minute session will cover:
- The origins of ransomware
- Tips to prevent a ransomware attack on your business
- How to stop a ransomware attack after it’s begun
- Where a solid backup strategy and Carbonite fit into the mix
- And more….
CEO & Co-Founder
Sr. Mgr., Security Consulting Services
Stopping Breaches on a Budget – How the Critical Security Controls Can Help You
Dante LoScalzo has worked in the technology industry for over 19 years with nearly 10 of those spent in information security. He has worked on a consulting basis for enterprise-class F500s to small businesses in a variety of industries. He currently manages the offensive security testing services practice within ControlScan helping clients to improve the security posture of their organizations.
Spikes Security was scheduled to speak today, however, due to a conflict they are unable to attend. For more information about Spikes Security, please contact Franklyn Jones at firstname.lastname@example.org, or (408) 755-5713.
XO Communications is unable to speak today, however, you can still stop by their table for more information.