Loading Events

« All Events

  • This event has passed.

Austin (Cybersecurity)

October 5, 2017 @ 8:15 am - 4:00 pm

Event Navigation


October 5, 2017
8:15 am - 4:00 pm
Event Category:


3100 Alvin DeVane Blvd. Bldg B
Austin, TX 78741
United States
  + Google Map


The Austin Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Andy Crocker
Systems Engineer – Enhanced Technology Products, Fortinet

Today’s Threat Landscape

This presentation will focus on the Who, What, and How of recent attacks along with the various threat vectors and prevalence of each one. 

Download the Presentation

9:15am - 9:45amSession Two

Ted Gruenloh

Threat Intelligence and Layered Security in the WannaCry Era

The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 11:00amSession Three

John Heintz

A New Way to Look at IT Security with Endpoint Modeling

Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling results and visibility into all network Endpoint behavior. With great accuracy, extremely low noise, and supporting evidence, endpoint modeling discovers and tracks the regular behavior of each device in a way that makes possible the automatic recognition of potentially harmful activities. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others.

11:00am - 11:30amSession Four

Chad Gasaway
Sr. Director of Solutions Architecture

The Modern Honeynet: Using Deception to Catch Attackers

11:30am - 12:00pmBreak / Vendor Booth Time / Lunch
12:00pm - 12:30pmSession Five

Jeff Stepanik
Regional Sales Director

Leverage the Cloud to Minimize the Impact of Ransomware

Download the Presentation

Speaker Bio:

Jeff Stepanik is a Regional Sales Director at Druva.  He received his education at Kent State University.  For over 18 years, his consultative selling approach has assisted organizations in providing IT solutions focused on backup and recovery, disaster recovery, security archive and governance.  He has assisted organizations designing and deploying multi-million dollar IT solutions down to solution fixes that run a couple thousand dollars.   Jeff has spent his career working for solution providers like Druva, EMC, Spectra Logic, Pillar Data Systems along with a few value added resellers.   In his spare time, Jeff can be found with his two boys, at the gym, on his mountain bike or one of his motorcycles.  For more information, Jeff can be reached at 832-370-3952, jeff.stepanik@druva.com or https://www.linkedin.com/in/jeffstepanik.

12:30pm - 12:45pmBreak / Vendor Booth Time
12:45pm - 1:15pmSession Six

Mike Jackson
Sales Engineer, Carbonite

Disaster Happens – Don’t Be Held Hostage

Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest additions to their arsenal – EVault & DoubleTake. We’ll also cover best practices for backing up your data and how you can take your defenses to the next level with DRaaS.

Download the Presentation

1:15pm - 2:00pmSession Seven

Charles Hall
South Central Engineering Manager

Building the Security Strategy for the Future

With the ever changing threat landscape and increasing attacks, are you prepared for the future? Join us to learn about our approach to providing a complete network security consolidation platform for public and private cloud, network perimeter and internal segmentation, along with endpoint and Mobile security, bringing total vision and management from one console. Learn about a comprehensive and complete security solution.

Speaker’s Bio:

Over 18 years involvement with Network Security with many of these years spent in the legal and payment processing financial sectors.


2:00pm - 2:15pmBreak / Vendor Booth Time
2:15pm - 2:45pmSession Eight

Rodney Haydon
Sales Engineer

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:30pmSession Nine

Aidan Simister

The threat within (and how to address it)

2017 has been a year full of high profile data breaches and this week, global accounting firm Deloitte has joined the list of those affected. A resourceful hacker gained entry to Deloitte’s email server via an administrative account which gave them full, privileged levels of access to sensitive information

If there’s one idea I’d like everyone to walk away with after this talk, it’s that we have a responsibility to our customers, our shareholders and to our staff to do more to address the threat within. We all need to ensure we take a more sensible and proactive approach to keeping track of changes being made by our privileged users to our critical IT systems, to ensure we’re managing data access permissions more effectively and to assess whether we really know enough about what’s happening to our files and folders.

Prize Drawings for All in Attendance
3:30pm - 4:00pmSession Ten

Ginny Turley
Senior Vice President

Risk Driven IAM: Tackle IAM with a Risk Based Approach 

Identity Access Management is a complex matrix of requirements meant to assure that only the right people have access to your data.  This requires the creation of a rules, roles, and a method of preserving information about access rights.  In other words, we create “big data” that then must be mined to find the most risky individuals and risky behaviors.  By starting with a risk-based approach, finding those behaviors and individuals is easier.  Explore with us as we examine how risk values can be assigned as you build the database so that analyzing and reporting become easier.

Download the Presentation


Prize Drawings for All in Attendance