- This event has passed.
May 4, 2017 @ 8:15 am - 5:00 pm
The Baltimore Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech Security Strategies Conference.
Regional Sales Director – Mid-Atlantic
Unifying data protection, leveraging the power of the cloud
Speaker Bio: Elton Juter has been in the IT Industry for 20 years. Starting out as a programmer, and deciding to move into client-facing roles, he has worked in Storage, Security, and Systems Management roles with IBM Tivoli and HP Information Management Software. For the last 10 years, he has focused his efforts in the data availability, information governance/eDiscovery space working with Symantec/Veritas and most recently, Druva. In his current role, Elton has responsibility for Large Enterprise organizations throughout the Mid-Atlantic region along with national coverage of our US Federal Agencies. He looks forward to helping shed light on how Druva InSync and Phoenix are able to protect, manage, and preserve your endpoint, cloud-application, and server data, all while utilizing the industry’s leading public/private cloud, and therefore providing the lowest possible total cost of ownership.
Securing your organization and containing the insider threat
Despite increasing investment in the cybersecurity market, we continue to see a rise in data breaches and their related costs, specifically those relating to the insider threat (accidental loss and malicious insider). Despite these types of incidents contributing approximately 50% of all breaches, CIO focus remains on the external threat.
In this presentation, we will question whether a new approach to data security needs to be applied: one that recognizes data security can’t be tackled in silo and instead a holistic more strategic approach must be taken to protect and secure data throughout its lifecycle in order to contain the insider threat.
Co-founder of Egress Software Technologies, Tony currently serves as CEO, overseeing all aspects of the business growth and innovation.
Prior to Egress, Tony held executive management positions at Reflex Magnetics, Pointsec Mobile Technologies, and Check Point Software Technologies. A frequent technology and industry speaker, Tony holds a Bachelor of Politics degree, a Software Engineering Master’s and is a certified BCS Fellow. Tony sits on industry committees including Intellect’s Government Management and Defence & Security Groups.
Channel Sales Engineer
Keep Ransomware Out. How you can stop ransomware and exploits before they strike
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence
Kerry has been in the IT field for nearly 20 years. He owned and operated a successful MSP providing Network Security and analysis. He has worked with SMB to Enterprises helping them keep their network and data safe. Currently he is the Channel Sales Engineer for the Mid-Atlantic region covering MD, DC, VA & WV.
The Art of Detection – Conquering the Six Stages of an Attack
While initial network penetration is quick and difficult to detect, attackers perform a series of actions once they’re inside the network, offering a window of opportunity for detection early in the attack life-cycle. This gives enterprise defenders a chance to act quickly to stop or minimize business impact. Doing threat lifecycle management effectively takes a mix of mature security processes, analyst skills, and “force multiplier” tools. In this session, you’ll learn:
– More in-depth details at the six stages of the attack lifecycle
– How to avoid the pitfalls that cause network infiltration detection to fail
– An effective approach for accurate detection throughout the entire attack lifecycle, not just at infiltration
Prioritizing Vulnerability Management
Prioritizing vulnerabilities is something that every organization struggles with. This presentation will cover where many vulnerability management programs struggle, as well as effective ways to prioritize vulnerabilities.
Jaron Shaul is a Sales Engineer with Tenable Network Security. He has a Master’s degree in Cyber Forensics from Stevenson University, has been in his current position for over 3 years, and has worked for Tenable for over 5. During his career, he has had the opportunity to consult with thousands of customers and has a unique perspective of the state of vulnerability management across all major industries.
Regional Sales Director, Behavioral Analytics
Cyber Weapons: Learn the Tools Attackers Use
Attackers leverage a variety of tools to break into networks and expand their footprint. This session will educate you on the tools that are used to perform command and control, reconnaissance, lateral movement and data exfiltration. Using these tools, attackers can remain undetected for months.
Attend an informative presentation to gain a quantitative view of attack tools based on the findings from the industry-first Cyber Weapons Report. You’ll probably be surprised how little of the attack tools are malware.
During the session, Palo Alto Networks security expert Steve Costolo will explain:
• The top malware, hacking, admin, and remote desktop tools associated with attacks and risky behavior
• How each type of attack tool maps back to stages in the attack lifecycle
• How Behavioral Analytics can help you find active attackers in your network
Product Marketing Manager
There Will be Attacks – Improve your Email Defenses
If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes. If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Channel Account Manager
Reduce Risk Across Hybrid IT
Consulting Systems Engineer – East Region
IoT Security – What’s on your Network?
IoT Security. Do you know what’s on your Network? As the adoption of IoT Devices grows rapidly, IT organizations are struggling with how to manage them. Most assume that the IoT device should have its own security parameters in place so there is nothing to worry about. Some don’t even know what IoT devices are on their networks. This session will discuss what is the threat of IoT devices, how to profile them, and best practices to protect your network.
Ando Shin serves as a Consulting Systems Engineer in the Mid-Atlantic Region, based in VA, covering TN/VA/DC/MD/PA for Aruba a HPE Company. Ando has over 20 years of systems engineering and sales engineering experience having worked for major networking manufacturers including: Lucent Technologies, Avaya, Alcatel, Alcatel-Lucent, and Hewlett-Packard Networking. Ando has worked directly with numerous Federal Agencies and System Integrators. Ando has a very strong in-depth knowledge of the networking industry concerning Wireless (Wi-Fi, Microwave), Broadband (DSL, GPON, Coax), Switching, Routing, Telephony, Video, Security, Authentication, and more. Ando serves as an extension of the Aruba Product Line Management team to present roadmaps and vision to our customers and partners.
Sr. Solutions Architect
Secure Browsing – Ransomware Prevention
Ericom Software is a global leader in securely connecting the unified workspace. Ericom empowers today’s connected workforce and the IT organizations that support them by securing and optimizing desktop, application, and web content delivery to any device, anywhere. Founded in 1993, Ericom provides enterprise-grade secure remote access, desktop virtualization (VDI), and web security solutions to a global customer base of more than 30,000 midsize to Fortune 500 organizations. With a focus on application delivery, cloud enablement, and secure browsing, Ericom advances secure connectivity—providing end users with a superior work experience and optimizing enterprise productivity. With over 8 million end users, Ericom has offices in the United States, United Kingdom and EMEA and an extensive network of distributors and partners throughout North America, Europe, APAC, and Africa.
Brett has been in the IT field for over 20 years with a focus on end user computing and security. He has a background in network security, endpoint security, privilege management and helping define organizational security policies. He has consulted on projects for large scale commercial and public sector clients. In his current role, Brett is a Pre-Sales Engineer for Ericom covering North and South America.
Automating Endpoint Management: Patching, Deployment and System Building made easy
With increasing demands on IT Managers, new ways for handling security and user requirements are needed. This seminar will show you, how you can automate your patch management, drastically simplify system building, and find out about ways to enroll software while avoiding complex repackaging procedures – inside and outside of your network.
This seminar will show you how you can innovatively automate and structure standard endpoint management tasks and improve security and compliance.
Jonathan Lange is responsible for Sales in the US market. Having advised customers in various countries from small businesses to global enterprises, he is well aware of the challenges IT departments face today in order to keep their infrastructure up-to-date, safe and efficient. Specialized on efficient methods for endpoint management, he has an in-depth knowledge of the baramundi Management Suite and how it can benefit IT departments.
About baramundi software USA
baramundi software USA, Inc. provides companies and organizations with efficient, secure, and cross-platform management of workstation environments. Around the world, over 2,000 customers of all sizes and from every sector benefit from the independent German manufacturer’s many years of experience and outstanding products. These are compiled into an integrated, future-orientated unified endpoint management approach in the baramundi Management Suite: endpoint management, mobile device management, and endpoint security are provided via a shared interface, using a single database, and according to global standards.
Director of Solutions Engineering
Does Your Time to First Byte Bite?
Join Scott Taylor, Director of Solutions Engineering at Dyn as he provides a high level overview of DNS, the various multi-DNS configurations and how this layer of your infrastructure has everything to do with security. From DDoS to DNS amplification and reflection attacks, it’s all covered including strategies to mitigate, opportunities to architect infrastructure resiliency and tips to improve digital performance.