- This event has passed.
August 11, 2016 @ 8:15 am - 5:00 pm
The Cincinnati Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Regional Sales Director – Ohio Valley
The Threat Landscape is Evolving – Are You?
Throughout history we’ve seen opposing forces skillfully pit strengths against weaknesses until, ultimately, one side succumbs. Holding a position takes considerably more effort than does a single, offensive surge, and attackers are counting on it. The very nature of the cybersecurity attacks we face today are in direct response to the shortcomings of the available tools, knowledge and approaches. The only problem is that we must evolve our defenses as fast as (or faster) than their offenses, and the odds are greatly in their favor.
Facing next-generation challenges requires a next-generation approach – preferably one that requires no change to your current production environment, never tires, continually evolves, doesn’t rely on humans and is 99%+ accurate regardless of Internet connectivity. We’ll discuss a solution that shifts the balance in your favor by leveraging artificial intelligence to predict and prevent against malware-born threats so you don’t have to.
Sophos, Matthew Pannebaker
Channel Sales Engineer for Ohio and Kentucky
Next-Gen Now: Outsmarting Ransomware, rootkits and zero day attacks
Ransomware threats like Cryptowall, TeslaCrypt, and Locky are on the rise.
We will show you these threats and how to stay protected against ransomware.
This presentation will cover:
- How these attacks work
- Why a large number of new infections continue to surface despite existing protective measures
- Practical short- and long-term steps that organizations should take to protect against them
Optimal configuration settings for Sophos solutions to protect against ransomware
Sr. Director of Global System Engineer
You Have a Blind Spot – Exposing The Misuse of The Foundation of Online Security
Adversaries are outsmarting enterprise security strategies by exploiting the foundation of online security. Cyberthreats are becoming more complex and harder to detect. Intel predicts the next big hacker marketplace to be in the sale of digital certificates that are already selling for more than $1000 each on underground marketplaces. Gartner expects 50% of network attacks to use encrypted SSL/TLS in less than 2 years. 100% of organizations have responded to an attack that misuses keys and certificates in the last two years. And an alarming 54% of them can’t determine friend versus foe. What’s to do? The human immune system has evolved to defend and destroy complex and oftentimes overwhelming attacks. What can we learn from it? How can we create a future that’s more resistant as we use more software, more clouds, more apps, and more connected devices.
Mike Dodson is a Silicon Valley veteran with 25 years experience. He has founded 5 companies which have collectively created hundreds of jobs, hundreds of millions in annual revenue, and had a positive impact on the world. His work has helpd to bring better security and privacy to enterprise software, consumer products, embedded systems, medical devices, and mobile computing.
He is currently leading the Global Sales Engineering team at Venafi where his team designs solutions to secure and protect keys and certificates for the largest corporations and governments in the world.
Manager of North America Channels
Half Protected is Half Not – Platform Approach to Securing Enterprise Identities
The world of Identity Management is dangerously fragmented and needlessly complex. Don’t settle for half a solution when you need full protection for both end users and privileged users.
Centrify secures enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.
In this session, we will discuss Centrify’s platform approach to securing enterprise identities and:
- Discover the new way to protect against the #1 point of attack in data breaches
- Defend both end users & privileged users with a single platform solution
- Centralize authentication, authorization, policy, and auditing for IT resources
- Establish Identity as the new perimeter across cloud, mobile, and data center.
DoS Like a Boss
Maintaining your cool when everything is on fire – examples from personal experience.
Architectural decisions that you never thought could impact business.
Technical Marketing Engineer
The Industry Need for Cloud Generation Security
The unprecedented power of cloud applications has opened up amazing new possibilities for IT organizations, lines-of-business, and users to empower work needs. Whether sanctioned or not, these cloud applications can have a dark side. The rapid pace of adoption has left most security and compliance teams behind. Users, devices and data are now interacting with a variety of new cloud services while entirely circumventing the control of the organization. This has introduced new risk factors for organizations already struggling under the duress of the traditional threat landscape. However, it doesn’t have to be this way; Cloud applications and services can be adopted rapidly and securely as Info Security teams proactively build in security for users, devices and data. Please join Blue Coat as we discuss these new challenges and provide practical advice on how these issues can be safely overcome.
Why Third-Party Access Should be First on Your Security to-Do List
With enterprises using contractors more than ever, these suppliers, partners and other ‘third parties’ need to access enterprise applications to get their jobs done. However, this poses some challenges. Giving third parties access to enterprise applications is complicated, time-consuming, tedious and on-going process as contractors come, go and change. And with 63% of all data breaches linked to third party access, it’s an area that can’t be ignored.
This session will explore insights from Soha’s recent Third Party Access Survey and provide actionable insights to relieve the pain associated with third party access.
Director, Sales Engineering
Making “Default-Deny” Endpoint Security a Reality, With No Usability or Deployment Challenges
All it takes is a single user infected with unknown, zero day malware to cause serious damage and a breach at your organization.
Comodo Advanced Endpoint Protection provides a lightweight, scalable Default Deny Platform with a unique endpoint security approach, which results in complete protection and enterprise visibility. The app based platform eliminates complexity and solution overlap. Provisioned in minutes, Comodo Advanced Endpoint Protection also includes unified IT and security management console, that through an app enabled platform reduces the effort of managing your Android, iOS, OSX, Linux, and Windows devices, on every segment of your physical and virtual networks.
Join us for a discussion on how both legacy and advanced products fail, and demonstrate how Comodo Advanced Endpoint Protection defeats unknown, zero day malware, while reducing solution overhead.
Security Themes Debunked
With so many voices trying to get your attention in the cyber security market, it is hard to know exactly what you need to do in order to protect your business. We will take a look at some of the most popular security marketing messages to cut through the noise and see underlying truths of what companies need to do in order to protect themselves.
Brian brings over 15 years of diverse cyber security experience and leadership. Before founding Morphick, he was the CISO at General Electric’s Aviation, Energy, and Transportation businesses. He was responsible for developing and implementing advanced cyber security strategies that protected GE’s multi-billion-dollar infrastructure and resources worldwide. As the infrastructure design leader for GE, he led efforts to implement defense strategies to mitigate advanced persistent threats for the infrastructure supporting more than 122,000 employees worldwide. Brian has also consulted with the White House and State Department on cyber policy and collaborated with the CIO of the Pentagon and members of the NSA on cyber detection technologies.
Nexum is unable to speak today, however, you can still stop by their table for more information.
PFU-Fujitsu was scheduled to speak today, unfortunately, due to a conflict they are unable to attend altogether. For more information about PFU-Fujitsu, please contact Carmine Clementelli at email@example.com, or (408) 992-2944.