Loading Events

« All Events

  • This event has passed.

Birmingham (Cybersecurity)

November 2 @ 8:15 am - 3:45 pm

Details

Date:
November 2
Time:
8:15 am - 3:45 pm
Event Category:

Overview

The Birmingham Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Tech Security Conference.

8:45am - 9:15amSession One

Ted Gruenloh
COO

Threat Intelligence and Layered Security in the WannaCry Era

The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.

9:15am - 9:45amSession Two

Kevin Cleary
Global Account Manager

Leverage the Cloud to Minimize the Impact of Ransomware

Download the Presentation

Speaker’s Bio:

Kevin is a seasoned professional with a history of cloud-based solutions selling, including nearly 6 years with Druva. He is Pittsburgh native who is based in Atlanta, GA and manages both regional and global accounts. He is a US Army veteran with an engineering degree from Rensselaer Polytechnic Institute and an MBA from Emory’s Goizueta Business School. He is an avid athlete who enjoys a variety of competitive sports in his free time.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Steve Mosley
Director – East Coast

Threat Lifecycle Management

Today’s reality is that your organization will continue to be confronted by increasingly frequent and complex cyber threats.

The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to monitor and search across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? Faster time to detect and time to respond, without adding staff to accomplish the job.

Download the Presentation

10:45am - 11:15amSession Four

Ken Swain
Channel Sales Engineer

Machine Learning 101 & Why You Care

Ever wanted to learn about machine learning? Confused by the technical jargon? Want to understand how machine learning can help you? Come and listen to Ken teach you how to make a cake.

Download the Presentation

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Todd Blaese

The attack surface is expanding.  Can your endpoint security hold its own?

Modern cybersecurity requires you to adapt, evolve, and reassess as you progress. After all, hackers are doing the same – executing and selling new threats designed to exploit even the most advanced security strategy. Shrinking the attack surface is key—making it harder for threats to get through, and giving your security team and solutions a fighting chance to take on the ones that breach your defenses. The best way to go about it? Defense in depth – a layered approach designed to help you close the gaps and stay on top of your security posture.

•  Discover the full breadth of risk
•  Reduce the attack surface
•  Detect malicious activity
•  Analyze data for better results

Ivanti provides simple streamlined tools that automate security processes, simplifying prevention and freeing your team from the burden of detecting and investigating threat alerts. Join us for a discussion about the ever-changing threat landscape and how to more effectively protect your company from insidious attack.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:15pmSession Six

Michael Cranford
Threat Prevention Specialist

Times Change. So Do Cyber Attack Trends

The 2017 global cyber landscape picked up where last year left off with sophisticated malware like ransomware and adware emerging monthly with new capabilities and distribution methods. Threat actors continue selling new malware-as-a-service though several platforms increasing the risk of data breaches. This year the highly effective malware families that use high-end attack tools stolen from nation states are quickly spreading globally and leaving behind broad paths of destruction.

In this session you will hear:

* The top 3 cyber-attack trends for the 1st half of 2017
* Today’s most prevalent malware and ransomware globally
* Most often targeted world regions by attackers

To keep ahead of cyber threats, security experts must stay more alert than ever. Please join Michael Cranford, Threat Prevention Specialist to arm yourself with the facts.

Speaker’s Bio:

Michael Cranford is a trusted advisor for many companies on preventing cyber-attacks and minimizing risk.  He has been with Check Point software for over 6 years and is a Threat Prevention Specialist.  With over 30 years in the industry, Michael has gained significant experience in network and data security.   In 1993, he implemented the first firewall for Sunbeam Household Products and created a Internet Security Team to create and enforce security policies.  He is a Certified Professional in Microsoft, Novell, Cisco Systems and Check Point Software.  Michael has conducted Advanced Threat Prevention training for over 150 technology professionals.

1:15pm - 1:45pmSession Seven

Sean Rice
Account Executive Alabama/Mississippi

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

 

1:45pm - 2:00pmBreak / Vendor Booth Time
2:00pm - 2:30pmSession Eight

Tony Munno
AVP, Mid-South and Federal Sales

Secure Data – A Safe Place in an Unsafe World 

The backing up of data has been important since computers became part of business yet many organizations have inadequate, outdated, nonfunctioning or even nonexistent backup operations.  In this session, we will have a brief discussion on questions like these:

Are you backing up critical data every day? Are you regularly meeting your backup window? Does your backup architecture need updating? Are you spending too much (or too little) on protecting your data? Can your company recover everything needed in a timely manner if a disaster struck? Does the possibility of a ransomware attack give you cause for concern?

Download the Presentation

2:30pm - 2:45pmBreak / Vendor Booth Time
2:45pm - 3:15pmSession Nine

Brian Krause 
Director, North American Channels

It’s Time to Rethink Security

Last year, over $80 billion was spent on cyber security (Gartner), yet 2/3rds of organizations were still breached (Forrester). The reason? 81% of data breaches involved weak, default or stolen passwords (Verizon).  Join Centrify to learn why current threats and today’s hybrid IT environment require changes to old security models and how Identity Services defends your organization against the most common cyberattacks.  We’ll examine: the current (broken) state of security and the role identity plays in cyber attacks, the massive rethink underway that redefines security to follow identity, how identity services reduce the risk of breaches by over 50%, and how Centrify can uniquely help reduce risk through the power of identity services.

Download the Presentation

Prize Drawings for All in Attendance
3:15pm - 3:45pmSession Ten

Mac Sheehan
Senior Sales Engineer

Protect Your Data from Insider Threats

The greatest threat to enterprise security is the people already on the payroll. To do their jobs, employees, contractors, consultants and vendors must have legitimate access to sensitive and valuable data stored in enterprise databases and file shares. However, when insiders abuse this access, or when insiders are exploited by outside attackers, enterprise data is exposed. Detection and containment of insider threats requires an expert understanding of both users and how they use enterprise data.

Prize Drawings for All in Attendance

Sponsors