Loading Events

« All Events

Baltimore

May 4 @ 8:15 am - 5:00 pm

Event Navigation

Details

Date:
May 4
Time:
8:15 am - 5:00 pm

Venue

BWI Airport Marriott
1743 W Nursery Rd
Linthicum Heights,MD21090United States
+ Google Map
Phone:
(410) 859-8300
Website:
http://www.marriott.com/hotels/travel/bwiap-bwi-airport-marriott/?scid=bb1a189a-fec3-4d19-a255-54ba596febe2

Overview

The Baltimore Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech Security Strategies Conference.

8:45am - 9:15amSession One

Elton Juter
Regional Sales Director – Mid-Atlantic

Unifying data protection, leveraging the power of the cloud

Download the Presentation

Speaker’s Bio:

Speaker Bio: Elton Juter has been in the IT Industry for 20 years. Starting out as a programmer, and deciding to move into client-facing roles, he has worked in Storage, Security, and Systems Management roles with IBM Tivoli and HP Information Management Software. For the last 10 years, he has focused his efforts in the data availability, information governance/eDiscovery space working with Symantec/Veritas and most recently, Druva. In his current role, Elton has responsibility for Large Enterprise organizations throughout the Mid-Atlantic region along with national coverage of our US Federal Agencies. He looks forward to helping shed light on how Druva InSync and Phoenix are able to protect, manage, and preserve your endpoint, cloud-application, and server data, all while utilizing the industry’s leading public/private cloud, and therefore providing the lowest possible total cost of ownership.

9:15am - 9:45amSession Two

Tony Pepper
CEO

Securing your organization and containing the insider threat  

Despite increasing investment in the cybersecurity market, we continue to see a rise in data breaches and their related costs, specifically those relating to the insider threat (accidental loss and malicious insider). Despite these types of incidents contributing approximately 50% of all breaches, CIO focus remains on the external threat.

In this presentation, we will question whether a new approach to data security needs to be applied: one that recognizes data security can’t be tackled in silo and instead a holistic more strategic approach must be taken to protect and secure data throughout its lifecycle in order to contain the insider threat.

Speaker’s Bio:

Co-founder of Egress Software Technologies, Tony currently serves as CEO, overseeing all aspects of the business growth and innovation.

Prior to Egress, Tony held executive management positions at Reflex Magnetics, Pointsec Mobile Technologies, and Check Point Software Technologies. A frequent technology and industry speaker, Tony holds a Bachelor of Politics degree, a Software Engineering Master’s and is a certified BCS Fellow. Tony sits on industry committees including Intellect’s Government Management and Defence & Security Groups.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Kerry Albert
Channel Sales Engineer, Sales

Keep Ransomware Out.  How you can stop ransomware and exploits before they strike

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

·        Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
·        Detect: quickly and easily detect and isolate attacks
·        Respond: laser in on critical alerts and address them with simple to understand security intelligence

Download the Presentation

Speaker’s Bio:

Kerry has been in the IT field for nearly 20 years. He owned and operated a successful MSP providing Network Security and analysis.  He has worked with SMB to Enterprises helping them keep their network and data safe.  Currently he is the Channel Sales Engineer for the Mid-Atlantic region covering MD, DC, VA & WV.

 

10:45am - 11:15amSession Four

Clifton Slater
Solutions Engineer

The Art of Detection – Conquering the Six Stages of an Attack

While initial network penetration is quick and difficult to detect, attackers perform a series of actions once they’re inside the network, offering a window of opportunity for detection early in the attack life-cycle. This gives enterprise defenders a chance to act quickly to stop or minimize business impact. Doing threat lifecycle management effectively takes a mix of mature security processes, analyst skills, and “force multiplier” tools. In this session, you’ll learn:

– More in-depth details at the six stages of the attack lifecycle
– How to avoid the pitfalls that cause network infiltration detection to fail
– An effective approach for accurate detection throughout the entire attack lifecycle, not just at infiltration

11:15am - 11:45amBreak / Vendor Booth Time/Lunch
11:45am - 12:15pmSession Five

Jaron Shaul
Sales Engineer

Speaker’s Bio:

Jaron Shaul is a Sales Engineer with Tenable Network Security.  He has a Master’s degree in Cyber Forensics from Stevenson University, has been in his current position for over 3 years, and has worked for Tenable for over 5.  During his career, he has had the opportunity to consult with thousands of customers and has a unique perspective of the state of vulnerability management across all major industries.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

1:00pm - 1:30pmSession Seven

Achmad Chadran
Product Marketing Manager

There Will be Attacks – Improve your Email Defenses

If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes.  If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.

In this session, you’ll learn:

  • How your email can be used as an entry point for multiple types of attack
  • The damaging impact attacks have on organizations
  • Why your employees could be the weakest link in your email security
  • How to enhance your email security and thus your overall cyber resilience

Download the Presentation

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

Jeff Cochran
Account Manager

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one.  Backup solutions don’t solve these problems as they are not true disaster recovery for the business.  What types of disasters will impact the business?  Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience.  Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

2:15pm - 2:45pmSession Nine
2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:30pmSession Ten
3:30pm - 3:45pmSession Eleven

Ericom Software, Inc.

Sponsors