- This event has passed.
November 2 @ 8:15 am - 3:45 pm
The Birmingham Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech-Security Tech Security Conference.
Threat Intelligence and Layered Security in the WannaCry Era
The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.
Global Account Manager
Leverage the Cloud to Minimize the Impact of Ransomware
Kevin is a seasoned professional with a history of cloud-based solutions selling, including nearly 6 years with Druva. He is Pittsburgh native who is based in Atlanta, GA and manages both regional and global accounts. He is a US Army veteran with an engineering degree from Rensselaer Polytechnic Institute and an MBA from Emory’s Goizueta Business School. He is an avid athlete who enjoys a variety of competitive sports in his free time.
Director – East Coast
Threat Lifecycle Management
Today’s reality is that your organization will continue to be confronted by increasingly frequent and complex cyber threats.
The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to monitor and search across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? Faster time to detect and time to respond, without adding staff to accomplish the job.
Channel Sales Engineer
Machine Learning 101 & Why You Care
Ever wanted to learn about machine learning? Confused by the technical jargon? Want to understand how machine learning can help you? Come and listen to Ken teach you how to make a cake.
The attack surface is expanding. Can your endpoint security hold its own?
Modern cybersecurity requires you to adapt, evolve, and reassess as you progress. After all, hackers are doing the same – executing and selling new threats designed to exploit even the most advanced security strategy. Shrinking the attack surface is key—making it harder for threats to get through, and giving your security team and solutions a fighting chance to take on the ones that breach your defenses. The best way to go about it? Defense in depth – a layered approach designed to help you close the gaps and stay on top of your security posture.
• Discover the full breadth of risk
• Reduce the attack surface
• Detect malicious activity
• Analyze data for better results
Ivanti provides simple streamlined tools that automate security processes, simplifying prevention and freeing your team from the burden of detecting and investigating threat alerts. Join us for a discussion about the ever-changing threat landscape and how to more effectively protect your company from insidious attack.
Threat Prevention Specialist
Times Change. So Do Cyber Attack Trends
The 2017 global cyber landscape picked up where last year left off with sophisticated malware like ransomware and adware emerging monthly with new capabilities and distribution methods. Threat actors continue selling new malware-as-a-service though several platforms increasing the risk of data breaches. This year the highly effective malware families that use high-end attack tools stolen from nation states are quickly spreading globally and leaving behind broad paths of destruction.
In this session you will hear:
* The top 3 cyber-attack trends for the 1st half of 2017
* Today’s most prevalent malware and ransomware globally
* Most often targeted world regions by attackers
To keep ahead of cyber threats, security experts must stay more alert than ever. Please join Michael Cranford, Threat Prevention Specialist to arm yourself with the facts.
Michael Cranford is a trusted advisor for many companies on preventing cyber-attacks and minimizing risk. He has been with Check Point software for over 6 years and is a Threat Prevention Specialist. With over 30 years in the industry, Michael has gained significant experience in network and data security. In 1993, he implemented the first firewall for Sunbeam Household Products and created a Internet Security Team to create and enforce security policies. He is a Certified Professional in Microsoft, Novell, Cisco Systems and Check Point Software. Michael has conducted Advanced Threat Prevention training for over 150 technology professionals.
Account Executive Alabama/Mississippi
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
AVP, Mid-South and Federal Sales
Secure Data – A Safe Place in an Unsafe World
The backing up of data has been important since computers became part of business yet many organizations have inadequate, outdated, nonfunctioning or even nonexistent backup operations. In this session, we will have a brief discussion on questions like these:
Are you backing up critical data every day? Are you regularly meeting your backup window? Does your backup architecture need updating? Are you spending too much (or too little) on protecting your data? Can your company recover everything needed in a timely manner if a disaster struck? Does the possibility of a ransomware attack give you cause for concern?
Director, North American Channels
It’s Time to Rethink Security
Last year, over $80 billion was spent on cyber security (Gartner), yet 2/3rds of organizations were still breached (Forrester). The reason? 81% of data breaches involved weak, default or stolen passwords (Verizon). Join Centrify to learn why current threats and today’s hybrid IT environment require changes to old security models and how Identity Services defends your organization against the most common cyberattacks. We’ll examine: the current (broken) state of security and the role identity plays in cyber attacks, the massive rethink underway that redefines security to follow identity, how identity services reduce the risk of breaches by over 50%, and how Centrify can uniquely help reduce risk through the power of identity services.
Senior Sales Engineer
Protect Your Data from Insider Threats
The greatest threat to enterprise security is the people already on the payroll. To do their jobs, employees, contractors, consultants and vendors must have legitimate access to sensitive and valuable data stored in enterprise databases and file shares. However, when insiders abuse this access, or when insiders are exploited by outside attackers, enterprise data is exposed. Detection and containment of insider threats requires an expert understanding of both users and how they use enterprise data.