Loading Events

« All Events


January 26 @ 8:15 am - 1:00 pm

Event Navigation


January 26
8:15 am - 1:00 pm


The Charlotte Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is Proud to Host the Tech-Security Strategies Conference.

8:45am - 9:15am8:45am - 9:15amSession One

Brad Desilets
Account Manager


Zerto’s Seamless Recovery — Even From Cryptolocker

Ransomware is now one of the biggest threats to your data. Nobody wants to be in a position of being locked out of all of your data and facing the prospect of having to pay a ransom or accept the impact of data loss and downtime by restoring from backups.

In this session you will learn how to configure your environment with Zerto to ensure you can recover the data from seconds before it was encrypted, minimizing the impact to the business by re-winding to a point in time before the ransomware infection existed. Zerto Virtual Replication (ZVR) integrates at the hypervisor level and causes no performance impact to the protected virtual machines. ZVR replicates without snapshots or agents, allowing for better performance and flexibility DR strategy in your vSphere environment. The virtual awareness understands the needs of resilience capabilities such as HA/DRS/VMotion/Storage VMotion/Storage DRS, etc. and continues replicating consistent data across the application virtual machine groupings.

Highlights include:
• Securing & protecting your infrastructure
• Journaling to enable re-wind & recover
• Failover testing to isolated environments
• Recovering from the infection
• Best practices when recovering from ransomware
• Real-world customer story of using Zerto to recover from Cryptolocker

Download the Presentation

Speaker Bio:

Brad has been in the IT industry for close to 20 years.  He started out as an Oracle DBA and Unix administrator.  He has also managed IT operations for 2 Massachusetts based companies (MSP Group and Vizium).   Brad has worked in a various roles for several well-known hardware and software vendors including Quest Software, EMC, Mercury Interactive/HP, VMware and most recently Zerto.  Brad Joined Zerto in January 2015.  He specializes in Zerto’s cloud continuity platform.  Brad is the account manager for the Carolinas and Caribbean territories.

9:15am - 9:45amSession Two

Elton Juter

Unifying Data Protection, Leveraging the Power of the Cloud

Download the Presentation

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Steve Costolo
Regional Sales Director, Mid-Atlantic & Carolinas


Cyber Weapons: Learn the Tools Attackers Use 

Attackers leverage a variety of tools to break into networks and expand their footprint. LightCyber’s Behavioral Attack Detection platform educates you on the tools that are used to perform command and control, reconnaissance, lateral movement and data exfiltration. Using these tools, attackers can remain undetected for months.

Attend an informative presentation to gain a quantitative view of attack tools based on the findings from LightCyber’s Cyber Weapons Report. You’ll probably be surprised how little of the attack tools are malware.

During the session, LightCyber security expert, Steve Costolo will explain:

·       The top malware, hacking, admin, and remote desktop tools associated with attacks and risky behavior
·       How each type of attack tool maps back to stages in the Cyber Kill Chain
·       How LightCyber Magna Behavioral Attack Detection can help you find active attackers in your network

Speakers Bio:

Steve Costolo is a firm believer in the power of analyzing the “Full Packet”.  Prior to joining LightCyber in 2016, he worked with companies of all sizes while with Gigamon (5+ years) and Fluke Networks (12+ years).  Steve thoroughly understands Network/Security Architectures and has a Bachelor of Sciences from the University of South Carolina.

10:45am - 11:15amSession Four

TJ Iacobone
Senior Channel Sales Engineer, Sales

Keep Ransomware Out.  How you can stop ransomware and exploits before they strike

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

·        Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
·        Detect: quickly and easily detect and isolate attacks
·        Respond: laser in on critical alerts and address them with simple to understand security intelligence

Download the Presentation

Speaker Bio:

TJ has been in Information Security for close to 20 years. For the past the 15 years with Sophos, he has been in the front line of preventing and mitigating malware. From the boom of worms in the early 2000s, like Nimda, Sircam and Code Red to the current ransomware and Internet of Things attacks like Locky and Mirai, TJ has combated it all.

11:15am - 11:45amBreak / Vendor Booth Time
11:45am - 12:15pmSession Five

Ken Carbaugh
Regional Sales Director

Jorge Garcia
Senior Solution Engineer

Next Generation Endpoint Protection 

In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Jim Benanti 
Sr. Partner Consulting Engineer

Your DDoS Opportunity

It’s not often you hear these two words together in the same sentence, however, during our discussion we’ll explore:

  • The current DDoS Threat Landscape
  • Why DDoS should now be considered as part of your organization’s overall Security Risk Assessment
  • The DYN Attack and how IoT devices are being used to launch DDoS attacks
  • Calculating the cost of a DDoS attack event
  • Intelligent DDoS Mitigation System design

Download the Presentation