Loading Events

« All Events

  • This event has passed.

Atlanta (Cybersecurity)

September 15, 2016 @ 8:00 am - 5:15 pm

Event Navigation


September 15, 2016
8:00 am - 5:15 pm
Event Category:


Hyatt Regency Atlanta
265 Peachtree Street NE
Atlanta, GA 30303
United States
  + Google Map
+1 404-577-1234


The Atlanta Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am-8:45am Check-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am-9:15am Session One

Carmine Clementelli
Marketing Manager

Network Visibility And Security In The Era Of Mobility & Advanced Threats

Hack attacks – and in particular Advanced Persistent Threats (APTs) – are on the rise, eroding reputations and looting organizational assets with disturbing regularity.  With mobility the new norm and mobile security in its relative infancy, are BYOD enterprises inviting APT attacks?  Mobile devices potentially open the organizational network to a new set of security risks that challenge IT professionals to plan strategically.  This session examines effective new approaches to redefine network perimeter, gain real time network visibility into who and what is on it, and control access automatically.  Importantly, the session offers strategies for preventing and controlling APTs and other infections.

9:15am-9:45am Session Two

Gerald Jackson
Senior Solutions Architect

Protect Your DNS Services Against Security Threats.

Download the Presentation

9:45am-10:15am Break/Vendor Booth Time
10:15am-10:45am Session Three

Keith MacKine
Territory Account Manager

Wi-Fi Security Assessment: 5 Steps to Securing Evolving BYOD & IoT Challenges

Whether it’s Bring Your Own Device (BYOD), Internet of Things (IoT) or education 1:1 initiatives, it’s clear there are a lot more devices showing up on your Wi-Fi network. This poses significant risk to organizations and IT departments that are forced to straddle the line between simplified access and managing the onslaught of potential security threats. Wi-Fi security attacks, hacking, stolen mobile devices – are these things keeping you awake at night? You may be surprised that Wi-Fi networks can be at least on par, if not more secure than your wired networks! Join this session to learn about the wireless security capabilities available to you and to get a best practice security checklist for evaluating your Wi-Fi infrastructure.

10:45am-11:15am Session Four

Ted Gruenloh Director of Operations

7 Security Mindsets to Adopt Today

It can be easy to get caught up in thinking if you just had that new shiny device, your network security burden would be lighter.  The reality is that no one device can solve your problem, and these days it takes a completely new perspective to tackle security in the real world. In this presentation, we’ll discuss 7 security mindsets – some new, some old – and how they can help you make smarter, more practical decisions about protecting your network.

11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:15pm Session Five

Mark Bunker
Territory Account Manager

Is your application performance getting cloudy?

More and more of your critical applications are moving outside of your network and data centers and into the cloud. With the move to cloud, many IT organizations have noticed a drop in performance with a loss of visibility and control they once had when these applications were on prem.  Learn about some of the challenges organizations face when moving to the cloud and what you need to do to get the clarity you need for your critical apps.

12:15pm-12:30pm Break/Vendor Booth Time
12:30pm-1:00pm Session Six

Tim Bloomer
Sr. Systems Engineer

You Have a Blind Spot – Exposing The Misuse of The Foundation of Online Security

Adversaries are outsmarting enterprise security strategies by exploiting the foundation of online security. Cyberthreats are becoming more complex and harder to detect. Intel predicts the next big hacker marketplace to be in the sale of digital certificates that are already selling for more than $1000 each on underground marketplaces. Gartner expects 50% of network attacks to use encrypted SSL/TLS in less than 2 years. 100% of organizations have responded to an attack that misuses keys and certificates in the last two years. And an alarming 54% of them can’t determine friend versus foe. What’s to do? The human immune system has evolved to defend and destroy complex and oftentimes overwhelming attacks. What can we learn from it? How can we create a future that’s more resistant as we use more software, more clouds, more apps, and more connected devices?

1:00pm-1:30pm Session Seven

Ken Swain
Sales Engineer Southeast


Today’s threat landscape : A Hacker’s Perspective

1:30pm-1:45pm Break/Vendor Booth Time
1:45pm-2:15pm Session Eight

Joe Tomasone
Sr. Systems Engineer

A Tale of Two Breaches: The Sony Pictures and Ashley Madison Attacks

In this presentation, the attacks that compromised Sony Pictures and Ashley Madison are examined and used as examples of why a data-oriented defense strategy is needed in today’s InfoSec world.

2:15pm-3:00pm Session Nine

Jerrod Pike
Regional Threat Prevention Expert – South

Equation Group APT Campaign: The Evolution of Sophisticated Malware & CPU-Level Threat Prevention

The Equation APT campaign, discovered recently, is perhaps the most sophisticated global, multi-layer attack platform to this date. Join us to explore the anatomy of the Equation attack and discuss how traditional security tools, including more advanced sandboxing technologies, are not enough to prevent this type of attack. We will also take a look at the evasion techniques used by the Equation group and others, as well as CPU-Level threat prevention technologies that can be used to stop these attacks.

3:00pm - 3:15pmBreak / Vendor Booth Time
3:15pm-3:45pm Session Ten

Chris Perry
Channel Account Manager

The Ransomware Pandemic

Today there are over half a million versions of ransomware creeping across the web. The threat to SMBs’ data being kept hostage is only one misinformed click away. Ransomware isn’t digital vandalism; it’s a lucrative global industry that thrives on ignorance. 

This 30-minute session will cover:

  • The origins of ransomware
  • Tips to prevent a ransomware attack on your business
  • How to stop a ransomware attack after it’s begun
  • Where a solid backup strategy and Carbonite fit into the mix
  • And more….
3:45pm-4:15pm Session Eleven

Eddy Bobrisky
CEO & Co-Founder         

Prize Drawings for All in Attendance
4:15pm - 4:45pmSession Twelve

Dante LoScalzo
Sr. Mgr., Security Consulting Services

Stopping Breaches on a Budget – How the Critical Security Controls Can Help You

Download the Presentation

Speaker Bio:

Dante LoScalzo has worked in the technology industry for over 19 years with nearly 10 of those spent in information security. He has worked on a consulting basis for enterprise-class F500s to small businesses in a variety of industries. He currently manages the offensive security testing services practice within ControlScan helping clients to improve the security posture of their organizations.

Prize Drawings for All in Attendance

Spikes Security was scheduled to speak today, however, due to a conflict they are unable to attend.  For more information about Spikes Security, please contact Franklyn Jones at franklyn@spikes.com, or (408) 755-5713.

XO Communications is unable to speak today, however, you can still stop by their table for more information.