Loading Events

« All Events

  • This event has passed.

Cincinnati (Cybersecurity)

August 11, 2016 @ 8:15 am - 5:00 pm

Details

Date:
August 11, 2016
Time:
8:15 am - 5:00 pm
Event Category:

Venue

Millennium Hotel Cincinnati
150 West Fifth Street
Cincinnati,OH45202-2393United States  + Google Map
Phone:
513-352-2100
Website:
https://web.archive.org/web/20140910191733/http://www.millenniumhotels.com/usa/millenniumcincinnati/

Overview

The Cincinnati Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Art Hathaway
Regional Sales Director – Ohio Valley

The Threat Landscape is Evolving – Are You?

Throughout history we’ve seen opposing forces skillfully pit strengths against weaknesses until, ultimately, one side succumbs. Holding a position takes considerably more effort than does a single, offensive surge, and attackers are counting on it. The very nature of the cybersecurity attacks we face today are in direct response to the shortcomings of the available tools, knowledge and approaches. The only problem is that we must evolve our defenses as fast as (or faster) than their offenses, and the odds are greatly in their favor.

 

Facing next-generation challenges requires a next-generation approach – preferably one that requires no change to your current production environment, never tires, continually evolves, doesn’t rely on humans and is 99%+ accurate regardless of Internet connectivity. We’ll discuss a solution that shifts the balance in your favor by leveraging artificial intelligence to predict and prevent against malware-born threats so you don’t have to.

9:15am - 9:45amSession Two

Sophos, Matthew Pannebaker
Channel Sales Engineer for Ohio and Kentucky

Next-Gen Now: Outsmarting Ransomware, rootkits and zero day attacks

Ransomware threats like Cryptowall, TeslaCrypt, and Locky are on the rise.

We will show you these threats and how to stay protected against ransomware.

This presentation will cover:

 

  • How these attacks work
  • Why a large number of new infections continue to surface despite existing protective measures
  • Practical short- and long-term steps that organizations should take to protect against them

Optimal configuration settings for Sophos solutions to protect against ransomware

9:45am - 10:15amBreak/Vendor Booth Time
10:15am - 11:00amSession Three

Mike Dodson
Sr. Director of Global System Engineer

You Have a Blind Spot – Exposing The Misuse of The Foundation of Online Security

Adversaries are outsmarting enterprise security strategies by exploiting the foundation of online security. Cyberthreats are becoming more complex and harder to detect. Intel predicts the next big hacker marketplace to be in the sale of digital certificates that are already selling for more than $1000 each on underground marketplaces. Gartner expects 50% of network attacks to use encrypted SSL/TLS in less than 2 years. 100% of organizations have responded to an attack that misuses keys and certificates in the last two years. And an alarming 54% of them can’t determine friend versus foe. What’s to do? The human immune system has evolved to defend and destroy complex and oftentimes overwhelming attacks. What can we learn from it? How can we create a future that’s more resistant as we use more software, more clouds, more apps, and more connected devices.

Speaker Bio:

Mike Dodson is a Silicon Valley veteran with 25 years experience.  He has founded 5 companies which have collectively created hundreds of jobs, hundreds of millions in annual revenue, and had a positive impact on the world.  His work has helpd to bring better security and privacy to enterprise software, consumer products, embedded systems, medical devices, and mobile computing.

 

He is currently leading the Global Sales Engineering team at Venafi where his team designs solutions to secure and protect keys and certificates for the largest corporations and governments in the world.

11:00am - 11:45amSession Four

Brian Krause
Manager of North America Channels

Half Protected is Half Not – Platform Approach to Securing Enterprise Identities

The world of Identity Management is dangerously fragmented and needlessly complex. Don’t settle for half a solution when you need full protection for both end users and privileged users.  

Centrify secures enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises.  The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.  

In this session, we will discuss Centrify’s platform approach to securing enterprise identities and:

  • Discover the new way to protect against the #1 point of attack in data breaches
  • Defend both end users & privileged users with a single platform solution
  • Centralize authentication, authorization, policy, and auditing for IT resources
  • Establish Identity as the new perimeter across cloud, mobile, and data center.

Download the Presentation

11:45am - 12:15pmBreak/Vendor Booth Time/Lunch
12:15pm - 1:00pmSession Five

Kurt Johnson
Security Engineer

DoS Like a Boss

Maintaining your cool when everything is on fire – examples from personal experience.

Architectural decisions that you never thought could impact business.

1:00pm - 1:15pmBreak/Vendor Booth Time
1:15pm - 2:00pmSession Six

Ryan Leonard
Technical Marketing Engineer

The Industry Need for Cloud Generation Security

The unprecedented power of cloud applications has opened up amazing new possibilities for IT organizations, lines-of-business, and users to empower work needs.   Whether sanctioned or not, these cloud applications can have a dark side.   The rapid pace of adoption has left most security and compliance teams behind.   Users, devices and data are now interacting with a variety of new cloud services while entirely circumventing the control of the organization.   This has introduced new risk factors for organizations already struggling under the duress of the traditional threat landscape.   However, it doesn’t have to be this way; Cloud applications and services can be adopted rapidly and securely as Info Security teams proactively build in security for users, devices and data.  Please join Blue Coat as we discuss these new challenges and provide practical advice on how these issues can be safely overcome.

2:00pm - 2:30pmSession Seven

Mustafa Qutub

Why Third-Party Access Should be First on Your Security to-Do List

With enterprises using contractors more than ever, these suppliers, partners and other ‘third parties’ need to access enterprise applications to get their jobs done. However, this poses some challenges. Giving third parties access to enterprise applications is complicated, time-consuming, tedious and on-going process as contractors come, go and change. And with 63% of all data breaches linked to third party access, it’s an area that can’t be ignored.

This session will explore insights from Soha’s recent Third Party Access Survey and provide actionable insights to relieve the pain associated with third party access.

2:30pm - 2:45pmBreak/Vendor Booth Time
2:45pm - 3:15pmSession Eight

Joe Morin
Director, Sales Engineering

Making “Default-Deny” Endpoint Security a Reality, With No Usability or Deployment Challenges

All it takes is a single user infected with unknown, zero day malware to cause serious damage and a breach at your organization.

Comodo Advanced Endpoint Protection provides a lightweight, scalable Default Deny Platform with a unique endpoint security approach, which results in complete protection and enterprise visibility. The app based platform eliminates complexity and solution overlap. Provisioned in minutes, Comodo Advanced Endpoint Protection also includes unified IT and security management console, that through an app enabled platform reduces the effort of managing your Android, iOS, OSX, Linux, and Windows devices, on every segment of your physical and virtual networks.

Join us for a discussion on how both legacy and advanced products fail, and demonstrate how Comodo Advanced Endpoint Protection defeats unknown, zero day malware, while reducing solution overhead.

Prize Drawings for All in Attendance
3:15pm - 4:00pmSession Nine

Brian Minick

Security Themes Debunked

With so many voices trying to get your attention in the cyber security market, it is hard to know exactly what you need to do in order to protect your business.  We will take a look at some of the most popular security marketing messages to cut through the noise and see underlying truths of what companies need to do in order to protect themselves.

Download the Presentation

Speaker Bio:

Brian brings over 15 years of diverse cyber security experience and leadership. Before founding Morphick, he was the CISO at General Electric’s Aviation, Energy, and Transportation businesses. He was responsible for developing and implementing advanced cyber security strategies that protected GE’s multi-billion-dollar infrastructure and resources worldwide. As the infrastructure design leader for GE, he led efforts to implement defense strategies to mitigate advanced persistent threats for the infrastructure supporting more than 122,000 employees worldwide.  Brian has also consulted with the White House and State Department on cyber policy and collaborated with the CIO of the Pentagon and members of the NSA on cyber detection technologies.

Prize Drawings for All in Attendance

Nexum is unable to speak today, however, you can still stop by their table for more information.

PFU-Fujitsu was scheduled to speak today, unfortunately, due to a conflict they are unable to attend altogether.  For more information about PFU-Fujitsu, please contact Carmine Clementelli at cclementelli.pfu@us.fujitsu.com, or (408) 992-2944.

Sponsors