- This event has passed.
January 26, 2017 @ 8:15 am - 2:00 pm
The Charlotte Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: email@example.com
Data Connectors is Proud to Host the Tech-Security Strategies Conference.
Sales Manager, Mid-Atlantic
Zerto’s Seamless Recovery — Even From Cryptolocker
Ransomware is now one of the biggest threats to your data. Nobody wants to be in a position of being locked out of all of your data and facing the prospect of having to pay a ransom or accept the impact of data loss and downtime by restoring from backups.
In this session you will learn how to configure your environment with Zerto to ensure you can recover the data from seconds before it was encrypted, minimizing the impact to the business by re-winding to a point in time before the ransomware infection existed. Zerto Virtual Replication (ZVR) integrates at the hypervisor level and causes no performance impact to the protected virtual machines. ZVR replicates without snapshots or agents, allowing for better performance and flexibility DR strategy in your vSphere environment. The virtual awareness understands the needs of resilience capabilities such as HA/DRS/VMotion/Storage VMotion/Storage DRS, etc. and continues replicating consistent data across the application virtual machine groupings.
• Securing & protecting your infrastructure
• Journaling to enable re-wind & recover
• Failover testing to isolated environments
• Recovering from the infection
• Best practices when recovering from ransomware
• Real-world customer story of using Zerto to recover from Cryptolocker
Regional Sales Director-Mid-Atlantic
Unifying Data Protection, Leveraging the Power of the Cloud
Elton Juter has been in the IT Industry for 20 years. Starting out as a programmer, and deciding to move into client-facing roles, he has worked in Storage, Security, and Systems Management roles with IBM Tivoli and HP Information Management Software. For the last 10 years, he has focused his efforts in the data availability, information governance/eDiscovery space working with Symantec/Veritas and most recently, Druva. In his current role, Elton has responsibility for Large Enterprise organizations throughout the Mid-Atlantic region along with national coverage of our US Federal Agencies. He looks forward to helping shed light on how Druva InSync and Phoenix are able to protect, manage, and preserve your endpoint, cloud-application, and server data, all while utilizing the industry’s leading public/private cloud, and therefore providing the lowest possible total cost of ownership.
Regional Sales Director, Mid-Atlantic & Carolinas
Cyber Weapons: Learn the Tools Attackers Use
Attackers leverage a variety of tools to break into networks and expand their footprint. LightCyber’s Behavioral Attack Detection platform educates you on the tools that are used to perform command and control, reconnaissance, lateral movement and data exfiltration. Using these tools, attackers can remain undetected for months.
Attend an informative presentation to gain a quantitative view of attack tools based on the findings from LightCyber’s Cyber Weapons Report. You’ll probably be surprised how little of the attack tools are malware.
During the session, LightCyber security expert, Steve Costolo will explain:
· The top malware, hacking, admin, and remote desktop tools associated with attacks and risky behavior
· How each type of attack tool maps back to stages in the Cyber Kill Chain
· How LightCyber Magna Behavioral Attack Detection can help you find active attackers in your network
Steve Costolo is a firm believer in the power of analyzing the “Full Packet”. Prior to joining LightCyber in 2016, he worked with companies of all sizes while with Gigamon (5+ years) and Fluke Networks (12+ years). Steve thoroughly understands Network/Security Architectures and has a Bachelor of Sciences from the University of South Carolina.
Senior Channel Sales Engineer, Sales
Keep Ransomware Out. How you can stop ransomware and exploits before they strike
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence
TJ has been in Information Security for close to 20 years. For the past the 15 years with Sophos, he has been in the front line of preventing and mitigating malware. From the boom of worms in the early 2000s, like Nimda, Sircam and Code Red to the current ransomware and Internet of Things attacks like Locky and Mirai, TJ has combated it all.
Regional Sales Director
Senior Solution Engineer
Next Generation Endpoint Protection
In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.
Sr. Partner Consulting Engineer
Your DDoS Opportunity
It’s not often you hear these two words together in the same sentence, however, during our discussion we’ll explore:
- The current DDoS Threat Landscape
- Why DDoS should now be considered as part of your organization’s overall Security Risk Assessment
- The DYN Attack and how IoT devices are being used to launch DDoS attacks
- Calculating the cost of a DDoS attack event
- Intelligent DDoS Mitigation System design