- This event has passed.
July 20, 2017 @ 8:15 am - 4:30 pm
The Cincinnati Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech Security Strategies Conference.
Unifying data protection, leveraging the power of the cloud
LJ is a senior sales and marketing technology professional in the areas such as Systems Management, Infrastructure Management, ERP, and Business Analytics supporting organizations in the Ohio Valley region. LJ has a passion for working with companies to leverage technology that will enhance the performance of information management and positively impacts the productivity, total cost of ownership, and business performance. LJ and his family reside in Columbus, OH and he is a graduate of Providence College.
How to stop Zero day phishing attacks without a Zero day patient
In response to the dramatic increase in Targeted Spear Phishing and Credential Phishing attacks Menlo Security has developed isolation capabilities that completely prevent phishing attacks that legacy detection solutions cannot combat. Gartner has stated “Evaluate and pilot a remote browser solution in 2017 as one of the single most significant ways an enterprise can reduce the ability of web-based attacks on users to cause damage.” Menlo changes the symmetry of phishing attacks by leveraging link isolation which “renders” zero-day phishing attacks obsolete. Menlo will demonstrate how Menlo Security “link isolated” users are 100% safe from zero-day phishing attacks.
AVP, Business Development
Data-Centric Security – A Path to GDPR Compliance
The “General Data Protection Regulation” (GDPR) will come into force in May 2018 and organizations have until then to review their processes and security strategies in order to comply with it. Failure to do so will expose them to significant sanctions in the event of a data security breach – fines of up to 20 Million Euros or 4% of global group revenue, whichever sum is the greatest. This presentation will outline the processes and controls associated with what is often called Data-Centric Security and illuminate a path to attaining compliance to GDPR.
Disaster Happens – Don’t Be Held Hostage
Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest additions to their arsenal – EVault & DoubleTake. We’ll also cover best practices for backing up your data and how you can take your defenses to the next level with DRaaS.
Sales Engineer for Ohio & Kentucky
Keep Ransomware Out. How you can stop ransomware and exploits before they strike
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence
Area Security Specialist – Southeast
In this day of risks, vulnerabilities and advanced persistent threats, it’s important to understand why perimeter protection simply just isn’t enough, and why a comprehensive assumed breach methodology ensures the greatest defense. Ivanti security provides a proactive defense-in-depth approach to protecting ones corporate brand and integrity, reputation, data, devices & users from risks and potential attack. Join us for a discussion about the ever-changing threat landscape and how you can more effectively protect your company from these threats.
Sales Engineer at AccessData
Doug Cordero from Druva
Reducing Cost and Risk During an Investigation
The continued growth of data volumes, increased adoption of cloud platforms and use of mobile devices for conducting day to day business is further complicating how corporations manage digital investigations. The collection and preservation of data, including from apps such as O365, Box and Gmail, can be cumbersome and time-consuming while risking your data integrity.
During this session, we’ll share strategies to help IT and the teams they work with save precious time and costs when handling digital investigations. You will learn how to leverage data protection initiatives to help streamline the process and cut time and costs by 50%, while still maintaining visibility of data and reducing risk.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Greg Reasner is an Enterprise Account Executive at Zerto, helping clients solve problems focused towards reducing risk and exposure to an organization’s treasured data sets with business continuity through Zerto’s platform. Zerto’s award-winning solution provides enterprises with continuous data replication & recovery designed specifically for virtualized infrastructures and hybrid cloud environments.
Greg has 15+ years of experience in information technology covering a wide range of solutions in this time and ultimately focuses towards helping his clients succeed. He’s based in Indianapolis and manages Indiana, Kentucky and Cincinnati, OH.
Regional Systems Engineer
Stop Cyber Threats With Adaptive Micro-Segmentation
Virtualization, the cloud, and the promise of containers have evolved the data center, bringing better application delivery and cost reduction. With these benefits come new risks that include increased East/West traffic and the potential for new cyber threats. Adaptive micro-segmentation is transforming and improving security inside the data center and clouds while speeding up app delivery.
In this session you’ll learn:
– How adaptive micro-segmentation enables security anywhere (on premises, AWS, Azure, etc.) on anything (bare metal, vSphere/KVM/XEN, containers), while eliminating app delivery delays caused by traditional security approaches.
– How customers are using adaptive micro-segmentation to instantly protect high-value apps, separate dev from prod with one rule, take existing security policies to the cloud, and more.
– How live visibility of application traffic and dependencies is making security dead simple for IT operations and security teams.
As Regional Systems Engineer at Illumio, Jeff Francis provides engineering and technical support in myriad ways. He works closely with customers needing assistance, advice, and training in architecture, integration, and the state of the security landscape. He has over 25 years of professional experience in the IT field, with a focus on software development, devops, Linux systems administration, device drivers, embedded systems design, network architecture, and network and computer security. He has worked most of the last 15 years as a Security Engineer for various large security vendors.
Advisory Systems Engineer, Threat Detection & Response
Evolved Requirements: A business-driven security strategy for threat detection & response
Security teams need to evolve to stay in front of attackers and the latest threats, but in recent years this has become much more difficult. Attackers continue to advance and use sophisticated techniques to target and infiltrate organizations while spending significant resources performing reconnaissance to develop techniques specifically designed to bypass the security tools being used. Complicating this, most organizations no longer have well defined perimeters as they shift to more modern IT infrastructures that include a variety of environments some on premise, some in the cloud. Finally, to add even more challenges, security teams suffer from a skills gap that make it difficult to fully staff a team and even more difficult when they add more and more security tools and devices that only add to the noise for the staff trying to find the truly significant attacks.
Given these challenges, we see a mindshift occurring within the organizations running sophisticated security operations. Specifically a shift in focus on preventative controls that promise to keep the bad guys out to an increased focus on rapid detection and response, to shorten the dwell time and reduce or even prevent business damage when breaches occur. In simple terms, these organizations recognize it’s no longer feasible to think you can prevent all attacks from getting in.
In order reduce the impact of attacks, security operations needs to be able to tie critical asset and identity information into both the detection and response capabilities, so they can focus their efforts on the threats that matter most.
Chief Security Officer
Ransomware Strategies for the Unsuspecting Victim
In the first few hours of the WannaCry ransomware attack, 200,000 machines were infected. Globally, organizations both large and small were struck and crippled by the attack rendering their infrastructure and their services unusable. In some cases, it was a life or death situation. The attackers weren’t done with just one punch. A few short weeks after the WannaCry release, a new ransomware variant resembling Petya started spreading around Europe and the Ukrainian affecting companies, institutions, and banks. This new variant was reported to have affected the radiation monitoring systems at Chernobyl.
Ransomware has been a growing trend for the past several years, and what we have seen to this point is only the tip of the iceberg for this type of cyber-attack. Join us as we discuss how Ransomware attacks are created, delivered, and executed onto unsuspecting victims. We will also discuss the strategies on how to recognize and remediate a Ransomware attack… and in some cases, how to prevent the attack from happening.
Cyber Security Account Executive
The Enterprise Immune System: Using Machine Learning for Next-Generation Cyber Defense
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis.
Based on unsupervised machine learning and probabilistic mathematics developed by specialists from the University of Cambridge, new ‘immune system’ technologies are capable of learning the ‘self’ of an organization. By analyzing every network, device, and user, and modeling them as they go about their day-to-day activity, the Enterprise Immune System can establish a highly accurate understanding of normal behavior. It can therefore spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat.
Rules and signatures are not keeping pace with today’s rapidly evolving cyber attacks. The Enterprise Immune System represents a fundamental step-change in automated cyber defense, is relied upon by organizations around the world, and can cover up to millions of devices.
In this session, learn:
- How new machine learning and mathematics are automating advanced cyber defense
- Why 100% network visibility allows you to detect threats as they happen, or before they happen
- How smart prioritization and visualization of threats allows for better resource allocation and lower risk
- Real-world examples of unknown threats detected by ‘immune system’ technology
Vinesh Vasnani is a Cyber Security Account Executive at Darktrace, the world’s leading machine learning company for cyber defense. He has worked extensively with clients across numerous industry verticals, from legal to retail, helping them deploy Darktrace’s Enterprise Immune System, the only AI technology capable of detecting and autonomously responding to early-stage cyber-threats. Vasnani graduated with a bachelor’s degree from University of Georgia and is based out of Darktrace’s New York City office.