Loading Events

« All Events

  • This event has passed.

Charlotte

January 26 @ 8:15 am - 2:00 pm

Event Navigation

Details

Date:
January 26
Time:
8:15 am - 2:00 pm

Full PDF Agenda

Overview

The Charlotte Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 9:00amCheck-In and Opening Introductions

Data Connectors is Proud to Host the Tech-Security Strategies Conference.

9:00am - 9:30amSession One

Andy Kunkler
Sales Manager, Mid-Atlantic

 

Zerto’s Seamless Recovery — Even From Cryptolocker

Ransomware is now one of the biggest threats to your data. Nobody wants to be in a position of being locked out of all of your data and facing the prospect of having to pay a ransom or accept the impact of data loss and downtime by restoring from backups.

In this session you will learn how to configure your environment with Zerto to ensure you can recover the data from seconds before it was encrypted, minimizing the impact to the business by re-winding to a point in time before the ransomware infection existed. Zerto Virtual Replication (ZVR) integrates at the hypervisor level and causes no performance impact to the protected virtual machines. ZVR replicates without snapshots or agents, allowing for better performance and flexibility DR strategy in your vSphere environment. The virtual awareness understands the needs of resilience capabilities such as HA/DRS/VMotion/Storage VMotion/Storage DRS, etc. and continues replicating consistent data across the application virtual machine groupings.

Highlights include:
• Securing & protecting your infrastructure
• Journaling to enable re-wind & recover
• Failover testing to isolated environments
• Recovering from the infection
• Best practices when recovering from ransomware
• Real-world customer story of using Zerto to recover from Cryptolocker

Download the Presentation

 

9:30am - 10:00amSession Two

Elton Juter
Regional Sales Director-Mid-Atlantic

 

Unifying Data Protection, Leveraging the Power of the Cloud

Download the Presentation

Speaker’s Bio:

Elton Juter has been in the IT Industry for 20 years. Starting out as a programmer, and deciding to move into client-facing roles, he has worked in Storage, Security, and Systems Management roles with IBM Tivoli and HP Information Management Software. For the last 10 years, he has focused his efforts in the data availability, information governance/eDiscovery space working with Symantec/Veritas and most recently, Druva. In his current role, Elton has responsibility for Large Enterprise organizations throughout the Mid-Atlantic region along with national coverage of our US Federal Agencies. He looks forward to helping shed light on how Druva InSync and Phoenix are able to protect, manage, and preserve your endpoint, cloud-application, and server data, all while utilizing the industry’s leading public/private cloud, and therefore providing the lowest possible total cost of ownership.

10:00am - 10:30amBreak / Vendor Booth Time
10:30am - 11:00amSession Three

Steve Costolo
Regional Sales Director, Mid-Atlantic & Carolinas

 

Cyber Weapons: Learn the Tools Attackers Use 

Attackers leverage a variety of tools to break into networks and expand their footprint. LightCyber’s Behavioral Attack Detection platform educates you on the tools that are used to perform command and control, reconnaissance, lateral movement and data exfiltration. Using these tools, attackers can remain undetected for months.

Attend an informative presentation to gain a quantitative view of attack tools based on the findings from LightCyber’s Cyber Weapons Report. You’ll probably be surprised how little of the attack tools are malware.

During the session, LightCyber security expert, Steve Costolo will explain:

·       The top malware, hacking, admin, and remote desktop tools associated with attacks and risky behavior
·       How each type of attack tool maps back to stages in the Cyber Kill Chain
·       How LightCyber Magna Behavioral Attack Detection can help you find active attackers in your network

Speakers Bio:

Steve Costolo is a firm believer in the power of analyzing the “Full Packet”.  Prior to joining LightCyber in 2016, he worked with companies of all sizes while with Gigamon (5+ years) and Fluke Networks (12+ years).  Steve thoroughly understands Network/Security Architectures and has a Bachelor of Sciences from the University of South Carolina.

11:00am - 11:30amBreak / Vendor Booth Time
11:30am - 12:00pmSession Four

TJ Iacobone
Senior Channel Sales Engineer, Sales

Keep Ransomware Out.  How you can stop ransomware and exploits before they strike

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

·        Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
·        Detect: quickly and easily detect and isolate attacks
·        Respond: laser in on critical alerts and address them with simple to understand security intelligence

Download the Presentation

Speaker Bio:

TJ has been in Information Security for close to 20 years. For the past the 15 years with Sophos, he has been in the front line of preventing and mitigating malware. From the boom of worms in the early 2000s, like Nimda, Sircam and Code Red to the current ransomware and Internet of Things attacks like Locky and Mirai, TJ has combated it all.

12:00pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Five

Ken Carbaugh
Regional Sales Director

Jorge Garcia
Senior Solution Engineer

Next Generation Endpoint Protection 

In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.

1:00pm - 1:30pmBreak / Vendor Booth Time
1:30pm - 2:00pmSession Six

Jim Benanti 
Sr. Partner Consulting Engineer

Your DDoS Opportunity

It’s not often you hear these two words together in the same sentence, however, during our discussion we’ll explore:

  • The current DDoS Threat Landscape
  • Why DDoS should now be considered as part of your organization’s overall Security Risk Assessment
  • The DYN Attack and how IoT devices are being used to launch DDoS attacks
  • Calculating the cost of a DDoS attack event
  • Intelligent DDoS Mitigation System design

Download the Presentation

 

Prize Drawings for All in Attendance

Sponsors