Loading Events

« All Events

  • This event has passed.

Chicago (Cybersecurity)

April 13 @ 8:15 am - 4:00 pm

Event Navigation

Details

Date:
April 13
Time:
8:15 am - 4:00 pm
Event Category:

Venue

The Drake Hotel
140 East Walton Place
Chicago,IL60611United States  + Google Map
Phone:
(312) 787-2200
Website:
http://www.thedrakehotel.com/explore

Full PDF Agenda

Overview

The Chicago Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Ted Gruenloh
COO

Threat Intelligence and Layered Security in the Post-Target Breach Era

The term “Threat Intelligence” is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.

9:15am - 9:45amSession Two

Steve Robb
Senior Vice President, Security Marketing & Product Strategy

Mind the Gaps: Leveraging “Security as a Service” to Gain Cyber Advantage”

Speaker’s Bio:

Steve Robb has worked in the high-tech sector throughout his career, serving key roles spanning sales and marketing, product management, professional services and software development. As Senior Vice President of Security Marketing and Product Strategy for ControlScan, Steve has been instrumental in leading the organization’s products and services expansion beyond PCI compliance to become a managed security service provider (MSSP) to the midmarket.

Steve regularly speaks and writes on a variety of security and compliance related topics. He has also participated in several Payment Card Industry Security Standards Council (PCI SSC) Special Interest Groups tasked with publishing payment security guidance papers. Steve is active on Twitter at @srobbATL.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Brad Schaffer
Senior Security Engineer

Automating Away the Analyst Shortage

10:45am - 11:15amSession Four

Mike Challender
Channel Sales Manager

 

Disaster Happens; Don’t Be Held Hostage

Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest addition to their arsenal – EVault family of products. We’ll also cover best practices for backing your data and how you take your defenses to the next level with DRaaS.

Download the Presentation

11:15am - 11:45amBreak / Vendor Booth Time/Lunch
11:45am - 12:15pmSession Five

Brandon Ryan
District Sales Manager IL, WI, MN

Next Generation Endpoint Protection 

In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Scott Taylor
Director of Solutions, Engineering

 

Rethink DNS

Download the Presentation

1:00pm - 1:30pmSession Seven

Marc Kreppel
Account Executive

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one.  Backup solutions don’t solve these problems as they are not true disaster recovery for the business.  What types of disasters will impact the business?  Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience.  Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

Speaker’s Bio: 

Marc is a creative sales executive with over 20 years of experience helping companies best leverage technology to achieve measurable business outcomes.

His extensive background in BC/DR solutions started with physical and virtual tape backup at StorageTek.  Since then, he’s worked for companies providing data protection, highly available replication, archive, and cloud-based technologies.

Marc spent 12 years in New York working with large enterprise customers to protect their data while exceeding business process goals with defined RPO/RTO.

After acquiring an Economics degree from Washington & Lee University, Marc started a consulting business and he developed a passion for enabling client success and growth through adoption of technical solutions.

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

Michael Buratowski
Senior Vice President, Cybersecurity Services from Fidelis

Automation in the Incident Response Process

Speaker’s Bio:

As Vice President of Cybersecurity Services, Mike Buratowski is responsible for managing the Network Defense and Forensics business area at Fidelis Cybersecurity, including the Digital Forensics Lab. Prior to joining Fidelis, he was the Business Area Director for the Cyber Operations Solutions business and program manager for the US-CERT contract in the Cyber Division of General Dynamics Advanced Information Systems. Mr. Buratowski served in various operational roles at General Dynamics, including nearly ten years on the Defense Computer Forensics Laboratory contract as an examiner in the Major Crimes & Safety section, a network intrusion examiner in the Intrusions & Information Assurance section, and the section chief of the Imaging & Extraction section. Before his tenure with General Dynamics, Mr. Buratowski was a Police Officer with the Montgomery County, Maryland Police Department where he served as a detective in the Computer Crimes Unit. He holds a Master of Science in Forensic Studies of Information Systems from Stevenson University as well as a Bachelors of Arts in Criminal Justice from the University of Maryland.

2:15pm - 2:45pmSession Nine

Eryn Brodsky
Senior Systems Engineer

How Data Storage Impacts Your Department’s Success

2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:30pmSession Ten

Jon Peppler
Senior Director, Channel Sales Americas
Menlo Security

Mark Fabish
EVP, Security Products
Cyber Innovation Labs

 

Isolation: The Shift in the Security Landscape

Security practitioners are facing the most difficult of times. They are confronted by a broad range of challenges including the constant flow of headlines highlighting security breaches, declining efficacy of legacy products, and a talent crisis for hiring and retaining security professionals. Web and Phishing Isolation provides a shift in the security landscape to address these challenges. Isolation technology also provides a dramatic reduction in security alerts, relieving the burden on overtaxed security and operations staff. This is the shift in the security landscape that many organizations are welcoming.

Download the Presentation

3:30pm - 4:00pmSession Eleven

Stelios Valavanis
CEO

Panoptic Cyberdefense

Today’s enterprise networks are without perimeter and likely have bad actors active in them. The many famous East-West attacks and multi-month data exfiltration (Sony, etc.) prove this and the dark web info trading tell us it will only get worse. The answer is to understand your network and watch very closely. What all that you can and bring it together for a clearer picture of security and compliance. We call this Panoptic Cyberdefense.

Sponsors