- This event has passed.
April 13 @ 8:15 am - 4:00 pm
The Chicago Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Threat Intelligence and Layered Security in the Post-Target Breach Era
The term “Threat Intelligence” is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.
Senior Vice President, Security Marketing & Product Strategy
Mind the Gaps: Leveraging “Security as a Service” to Gain Cyber Advantage”
Steve Robb has worked in the high-tech sector throughout his career, serving key roles spanning sales and marketing, product management, professional services and software development. As Senior Vice President of Security Marketing and Product Strategy for ControlScan, Steve has been instrumental in leading the organization’s products and services expansion beyond PCI compliance to become a managed security service provider (MSSP) to the midmarket.
Steve regularly speaks and writes on a variety of security and compliance related topics. He has also participated in several Payment Card Industry Security Standards Council (PCI SSC) Special Interest Groups tasked with publishing payment security guidance papers. Steve is active on Twitter at @srobbATL.
Senior Security Engineer
Automating Away the Analyst Shortage
Channel Sales Manager
Disaster Happens; Don’t Be Held Hostage
Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest addition to their arsenal – EVault family of products. We’ll also cover best practices for backing your data and how you take your defenses to the next level with DRaaS.
District Sales Manager IL, WI, MN
Next Generation Endpoint Protection
In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.
Director of Solutions, Engineering
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Marc is a creative sales executive with over 20 years of experience helping companies best leverage technology to achieve measurable business outcomes.
His extensive background in BC/DR solutions started with physical and virtual tape backup at StorageTek. Since then, he’s worked for companies providing data protection, highly available replication, archive, and cloud-based technologies.
Marc spent 12 years in New York working with large enterprise customers to protect their data while exceeding business process goals with defined RPO/RTO.
After acquiring an Economics degree from Washington & Lee University, Marc started a consulting business and he developed a passion for enabling client success and growth through adoption of technical solutions.
Automation in the Incident Response Process
As Vice President of Cybersecurity Services, Mike Buratowski is responsible for managing the Network Defense and Forensics business area at Fidelis Cybersecurity, including the Digital Forensics Lab. Prior to joining Fidelis, he was the Business Area Director for the Cyber Operations Solutions business and program manager for the US-CERT contract in the Cyber Division of General Dynamics Advanced Information Systems. Mr. Buratowski served in various operational roles at General Dynamics, including nearly ten years on the Defense Computer Forensics Laboratory contract as an examiner in the Major Crimes & Safety section, a network intrusion examiner in the Intrusions & Information Assurance section, and the section chief of the Imaging & Extraction section. Before his tenure with General Dynamics, Mr. Buratowski was a Police Officer with the Montgomery County, Maryland Police Department where he served as a detective in the Computer Crimes Unit. He holds a Master of Science in Forensic Studies of Information Systems from Stevenson University as well as a Bachelors of Arts in Criminal Justice from the University of Maryland.
Senior Systems Engineer
How Data Storage Impacts Your Department’s Success
Senior Director, Channel Sales Americas
EVP, Security Products
Cyber Innovation Labs
Isolation: The Shift in the Security Landscape
Security practitioners are facing the most difficult of times. They are confronted by a broad range of challenges including the constant flow of headlines highlighting security breaches, declining efficacy of legacy products, and a talent crisis for hiring and retaining security professionals. Web and Phishing Isolation provides a shift in the security landscape to address these challenges. Isolation technology also provides a dramatic reduction in security alerts, relieving the burden on overtaxed security and operations staff. This is the shift in the security landscape that many organizations are welcoming.
Today’s enterprise networks are without perimeter and likely have bad actors active in them. The many famous East-West attacks and multi-month data exfiltration (Sony, etc.) prove this and the dark web info trading tell us it will only get worse. The answer is to understand your network and watch very closely. What all that you can and bring it together for a clearer picture of security and compliance. We call this Panoptic Cyberdefense.