Loading Events

« All Events

  • This event has passed.

Columbus (Cybersecurity)

March 16 @ 8:15 am - 4:30 pm

Event Navigation

Details

Date:
March 16
Time:
8:15 am - 4:30 pm
Event Category:

Venue

Bridgewater Banquet & Conference Center
10561 Sawmill Parkway
Powell,OH43065United States  + Google Map
Phone:
(614) 734-9800
Website:
http://www.bridgewaterbanquetcenter.com/

Full PDF Directory

Overview

The Columbus Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud the host the Tech Security Strategies Conference.

8:45am - 9:15amSession One

L.J. Manning
Account Executive

Unifying Data Protection & Lowering Data Risks by Leveraging the Cloud

With data growing in your organization unabated and increasingly becoming fragmented across end-user devices, cloud services and both physical and virtual server environments, the dark specter of data loss or exposure is very real and comes at a high business cost. IT teams are being forced to rethink how to best protect their data without compromising security, compliance or legal requirements. Organizations that can get a few steps ahead in identifying and remediating data risks before they become front page news will more effectively protect their enterprise from exposure and fines.

Join us for this session where we’ll discuss how modern cloud architecture is enabling new innovations for better utility of enterprise data, providing visibility, recoverability and governance capabilities for today’s data landscape, results unattainable with legacy, on premise approaches

Download the Presentation

Speaker’s Bio:

LJ is a senior sales and marketing technology professional in the areas such as Systems Management, Infrastructure Management, ERP, and Business Analytics supporting organizations in the Ohio Valley region. LJ has a passion for working with companies to leverage technology that will enhance the performance of information management and positively impacts the productivity, total cost of ownership,and business performance. LJ and his family reside in Columbus, OH and he is a graduate of Providence College.

9:15am - 9:45amSession Two

Jim Sellers
Principal Engineer

Addressing the rise in SSL Traffic

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Todd O’Boyle
Co-Founder and Chief Technology Officer

Attacker Tactics: How to Get Ahead 

In this story-based talk, we’ll share examples of how we’ve all been attacked and then, based upon these stories, talk through ways we all can better protect ourselves. You’ll walk out of the talk with a plan you can use to facilitate cybersecurity awareness across your organization, including talking to your executive team about more resources. If you’d like to get ahead of the game, you can download our incident response plan for small and midsize businesses at http://info.strongarm.io/incident-response-plan/.

10:45am - 11:15amSession Four

Adam Larrabee
Carbonite Inside Sales Manager

Disaster Happens; Don’t Be Held Hostage

Download the Presentation

11:15am - 11:45amBreak / Vendor Booth Time/Lunch
11:45am - 12:15pmSession Five

Matthew Pannebaker
Channel Sales Engineer

Keep Ransomware Out.  How you can stop ransomware and exploits before they strike

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

·        Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
·        Detect: quickly and easily detect and isolate attacks
·        Respond: laser in on critical alerts and address them with simple to understand security intelligence

Speaker’s Bio:

Matt Pannebaker and eighteen year veteran of the IT  industry in both public and private sectors.  He’s currently the Sales Engineer covering the great states of Ohio and Kentucky selling the entire Sophos product line.  When he’s not doing that, he’s a husband, a father of three rambunctious boys and one wily dachshund, and gets away from it all through cycling and hiking.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Brandon Maruscak
Account Executive

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one.  Backup solutions don’t solve these problems as they are not true disaster recovery for the business.  What types of disasters will impact the business?  Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience.  Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

Speaker’s Bio:

Brandon is an Account Executive at Zerto helping clients solve problems focused towards reducing risk and exposure to an organization’s treasured data sets with business continuity through Zerto’s platform.  Zerto’s award-winning solution provides enterprises with continuous data replication & recovery designed specifically for virtualized infrastructures and cloud environments.

Brandon has 18 years of experience in information technology covering a wide range of solutions in this time and ultimately focuses towards helping his clients succeed.  He’s based in Columbus covering Ohio and Western Pennsylvania.

1:00pm - 1:30pmSession Seven

Jeff Byers
Security Account Manager

Network as a Sensor – Using Flow Data for Visibility

Download the Presentation

Speaker’s Bio:

Jeff Byers is currently a security account manager at Cisco Systems. With more than 25 years of experience, including 19 years at Cisco, Jeff is a veteran of the security and networking industries. He is also a Cisco Certified Internetwork Expert.

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

Jim Benanti
Sr. Consulting Engineer

The Impact of DDoS Attacks

Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk.

Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.

Download the Presentation

2:15pm - 2:45pmSession Nine

Rene Anthony Gonzalez
Manager, Americas Sales Engineering

Defense in depth, sense in breadth

An effective security strategy requires an organization to balance the fundamental dichotomy of locking down an environment versus user freedom.  Ivanti security delivers a defense in depth approach reducing the impact on the end user while implementing effective security controls.

Download the Presentation

2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:30pmSession Ten

Todd Careless
Manager of Curriculum Development

A Flashlight for the Deep Dark Web

Criminal activity that is spanned by the Dark Web includes theft of intellectual property, financial fraud, hacking and terrorism.  Organizations must take proactive steps to be prepared for these threats.  In order to be ready, companies need to be well informed about this type of criminal activity in order to prevent and overcome any potential threats.

Download the Presentation

Speaker’s Bio:

Todd was a contract instructor for Syntricate for four years and was also an adjunct computer forensic instructor for several private companies prior to joining the AccessData training staff full time in April 2014. He spent 6 years as a Law Enforcement Training Officer for the Ohio Peace Officer Training Academy (OPOTA) as the lead computer forensic and computer investigation instructor. Prior to that, he was a police officer for the City of Norwalk, Ohio, where he was a road patrol officer, evidence technician and computer forensic investigator.

3:30pm - 4:00pmSession Eleven

John Glass
Account Manager

The Game has Changed…Ready or Not!

Download the Presentation

4:00pm - 4:30pmSession Twelve

Forcepoint Logo

Doug Copley
Forcepoint, Deputy CISO

Cloudy with a chance of … visibility, accountability & security 

Cloud adoption is driving value into businesses like never before. Trying to manage security and compliance in the use of cloud platforms and applications can be challenging, with visibility being “cloudy” at best. That situation can drive stress and frustration into already overworked security teams. In this session Doug Copley will explain how the latest cloud security platforms can be the foglight to improve visibility and information risk management while enabling organizations to safely adopt those transformative technologies that will advance the mission of the organization.

Download the Presentation

Speaker’s Bio:

With over 24 years’ experience in IT, information security and data privacy across multiple industries, Doug Copley is a passionate advocate and evangelist for effective information security and data privacy risk management for both organizations and individuals. Doug was the co-founder and past Chairman of the Michigan Healthcare Cybersecurity Council and does his best to remain active in statewide and national cybersecurity preparedness and data sharing efforts.

Doug was a Chief Privacy Officer in Financial Services and prior to 2016 was the CISO at a regional health system in the Midwest. This past January, Doug joined Forcepoint as Deputy CISO and Security & Privacy Strategist where he not only provides oversight of internal security efforts, but also gets to stay tuned to industry threats and best practices and provides thought leadership and advice to leaders across industries. Doug can frequently be found speaking or blogging on information security, data privacy and leadership topics for everyone’s benefit.

Sponsors