- This event has passed.
March 16 @ 8:15 am - 4:30 pm
The Columbus Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud the host the Tech Security Strategies Conference.
Unifying Data Protection & Lowering Data Risks by Leveraging the Cloud
With data growing in your organization unabated and increasingly becoming fragmented across end-user devices, cloud services and both physical and virtual server environments, the dark specter of data loss or exposure is very real and comes at a high business cost. IT teams are being forced to rethink how to best protect their data without compromising security, compliance or legal requirements. Organizations that can get a few steps ahead in identifying and remediating data risks before they become front page news will more effectively protect their enterprise from exposure and fines.
Join us for this session where we’ll discuss how modern cloud architecture is enabling new innovations for better utility of enterprise data, providing visibility, recoverability and governance capabilities for today’s data landscape, results unattainable with legacy, on premise approaches
LJ is a senior sales and marketing technology professional in the areas such as Systems Management, Infrastructure Management, ERP, and Business Analytics supporting organizations in the Ohio Valley region. LJ has a passion for working with companies to leverage technology that will enhance the performance of information management and positively impacts the productivity, total cost of ownership,and business performance. LJ and his family reside in Columbus, OH and he is a graduate of Providence College.
Addressing the rise in SSL Traffic
Co-Founder and Chief Technology Officer
Attacker Tactics: How to Get Ahead
In this story-based talk, we’ll share examples of how we’ve all been attacked and then, based upon these stories, talk through ways we all can better protect ourselves. You’ll walk out of the talk with a plan you can use to facilitate cybersecurity awareness across your organization, including talking to your executive team about more resources. If you’d like to get ahead of the game, you can download our incident response plan for small and midsize businesses at http://info.strongarm.io/incident-response-plan/.
Carbonite Inside Sales Manager
Disaster Happens; Don’t Be Held Hostage
Channel Sales Engineer
Keep Ransomware Out. How you can stop ransomware and exploits before they strike
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence
Matt Pannebaker and eighteen year veteran of the IT industry in both public and private sectors. He’s currently the Sales Engineer covering the great states of Ohio and Kentucky selling the entire Sophos product line. When he’s not doing that, he’s a husband, a father of three rambunctious boys and one wily dachshund, and gets away from it all through cycling and hiking.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Brandon is an Account Executive at Zerto helping clients solve problems focused towards reducing risk and exposure to an organization’s treasured data sets with business continuity through Zerto’s platform. Zerto’s award-winning solution provides enterprises with continuous data replication & recovery designed specifically for virtualized infrastructures and cloud environments.
Brandon has 18 years of experience in information technology covering a wide range of solutions in this time and ultimately focuses towards helping his clients succeed. He’s based in Columbus covering Ohio and Western Pennsylvania.
Security Account Manager
Network as a Sensor – Using Flow Data for Visibility
Jeff Byers is currently a security account manager at Cisco Systems. With more than 25 years of experience, including 19 years at Cisco, Jeff is a veteran of the security and networking industries. He is also a Cisco Certified Internetwork Expert.
Sr. Consulting Engineer
The Impact of DDoS Attacks
Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk.
Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.
Rene Anthony Gonzalez
Manager, Americas Sales Engineering
Defense in depth, sense in breadth
An effective security strategy requires an organization to balance the fundamental dichotomy of locking down an environment versus user freedom. Ivanti security delivers a defense in depth approach reducing the impact on the end user while implementing effective security controls.
Manager of Curriculum Development
A Flashlight for the Deep Dark Web
Criminal activity that is spanned by the Dark Web includes theft of intellectual property, financial fraud, hacking and terrorism. Organizations must take proactive steps to be prepared for these threats. In order to be ready, companies need to be well informed about this type of criminal activity in order to prevent and overcome any potential threats.
Todd was a contract instructor for Syntricate for four years and was also an adjunct computer forensic instructor for several private companies prior to joining the AccessData training staff full time in April 2014. He spent 6 years as a Law Enforcement Training Officer for the Ohio Peace Officer Training Academy (OPOTA) as the lead computer forensic and computer investigation instructor. Prior to that, he was a police officer for the City of Norwalk, Ohio, where he was a road patrol officer, evidence technician and computer forensic investigator.
The Game has Changed…Ready or Not!
Cloudy with a chance of … visibility, accountability & security
Cloud adoption is driving value into businesses like never before. Trying to manage security and compliance in the use of cloud platforms and applications can be challenging, with visibility being “cloudy” at best. That situation can drive stress and frustration into already overworked security teams. In this session Doug Copley will explain how the latest cloud security platforms can be the foglight to improve visibility and information risk management while enabling organizations to safely adopt those transformative technologies that will advance the mission of the organization.
With over 24 years’ experience in IT, information security and data privacy across multiple industries, Doug Copley is a passionate advocate and evangelist for effective information security and data privacy risk management for both organizations and individuals. Doug was the co-founder and past Chairman of the Michigan Healthcare Cybersecurity Council and does his best to remain active in statewide and national cybersecurity preparedness and data sharing efforts.
Doug was a Chief Privacy Officer in Financial Services and prior to 2016 was the CISO at a regional health system in the Midwest. This past January, Doug joined Forcepoint as Deputy CISO and Security & Privacy Strategist where he not only provides oversight of internal security efforts, but also gets to stay tuned to industry threats and best practices and provides thought leadership and advice to leaders across industries. Doug can frequently be found speaking or blogging on information security, data privacy and leadership topics for everyone’s benefit.