Loading Events

« All Events


March 16 @ 8:15 am - 5:00 pm

Event Navigation


March 16
8:15 am - 5:00 pm


Bridgewater Banquet & Conference Center
10561 Sawmill Parkway
Powell,OH43065United States
+ Google Map
(614) 734-9800


The Columbus Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud the host the Tech Security Strategies Conference.

8:45am - 9:15amSession One

L.J. Manning
Account Executive

Unifying Data Protection & Lowering Data Risks by Leveraging the Cloud

With data growing in your organization unabated and increasingly becoming fragmented across end-user devices, cloud services and both physical and virtual server environments, the dark specter of data loss or exposure is very real and comes at a high business cost. IT teams are being forced to rethink how to best protect their data without compromising security, compliance or legal requirements. Organizations that can get a few steps ahead in identifying and remediating data risks before they become front page news will more effectively protect their enterprise from exposure and fines.

Join us for this session where we’ll discuss how modern cloud architecture is enabling new innovations for better utility of enterprise data, providing visibility, recoverability and governance capabilities for today’s data landscape, results unattainable with legacy, on premise approaches

Download the Presentation

Speaker’s Bio:

LJ is a senior sales and marketing technology professional in the areas such as Systems Management, Infrastructure Management, ERP, and Business Analytics supporting organizations in the Ohio Valley region. LJ has a passion for working with companies to leverage technology that will enhance the performance of information management and positively impacts the productivity, total cost of ownership,and business performance. LJ and his family reside in Columbus, OH and he is a graduate of Providence College.

9:15am - 9:45amSession Two
9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three
10:45am - 11:15amSession Four
11:15am - 11:45amBreak / Vendor Booth Time/Lunch
11:45am - 12:15pmSession Five

Keep Ransomware Out.  How you can stop ransomware and exploits before they strike

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

·        Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
·        Detect: quickly and easily detect and isolate attacks
·        Respond: laser in on critical alerts and address them with simple to understand security intelligence

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one.  Backup solutions don’t solve these problems as they are not true disaster recovery for the business.  What types of disasters will impact the business?  Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience.  Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

1:00pm - 1:30pmSession Seven
1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight
2:15pm - 2:45pmSession Nine
2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:30pmSession Ten
3:30pm - 4:00pmSession Eleven
4:00pm - 4:30pmSession Twelve

Forcepoint Logo

Doug Copley

Cloudy with a chance of … visibility, accountability & security 

Cloud adoption is driving value into businesses like never before. Trying to manage security and compliance in the use of cloud platforms and applications can be challenging, with visibility being “cloudy” at best. That situation can drive stress and frustration into already overworked security teams. In this session Doug Copley will explain how the latest cloud security platforms can be the foglight to improve visibility and information risk management while enabling organizations to safely adopt those transformative technologies that will advance the mission of the organization.