- This event has passed.
May 26, 2016 @ 8:00 am - 5:00 pm
The Columbus Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech-Security Strategies Conference.
PowerShell Attack Scenarios – How Attackers Leverage PowerShell… and How to Detect It
Why Auditing is a Must-Have Element in Your Security Strategy
In this session, we’ll look into why today’s IT realities, such as the explosion of endpoint devices, demand a new security model: Organizations must continue to focus on incident prevention but also take a fresh look at strategies and solutions for incident detection and attack response. We’ll show how proper IT auditing can strengthen your ability to uncover vulnerabilities and react immediately to insider threats, cyberattacks, and data leaks — while also helping you meet compliance requirements and optimize IT operations.
Network Access Control 101: Securing the Critical Edge of Your Network
As the volume and diversity of endpoints on your network rises, so does the need to ensure that every device is safe. Cyber criminals leverage vulnerable endpoints as backdoors to the network and Gartner predicts the source of breaches will have shifted from workstations to tablets and smartphones by 2017. As the attack surface of your network continues to multiply with each new endpoint, network access control is essential to restricting unauthorized and unsafe access to your data, assets and critical infrastructure. Attend this 30 min session to get a complete understanding of NAC functionality and how you can leverage network visibility, policies, and automation to ensure safe access for the growing number of endpoints on your network.
Regional Sales Director
The Threat Landscape is Evolving – Are You?
Throughout history we’ve seen opposing forces skillfully pit strengths against weaknesses until, ultimately, one side succumbs. Holding a position takes considerably more effort than does a single, offensive surge, and attackers are counting on it. The very nature of the cybersecurity attacks we face today are in direct response to the shortcomings of the available tools, knowledge and approaches. The only problem is that we must evolve our defenses as fast as (or faster) than their offenses, and the odds are greatly in their favor. Imagine a football game – with no time limits – determined by your opponent’s first undefended scoring play. Game over. Hmmm…I wonder how that one ends?
Facing next-generation challenges requires a next-generation approach – preferably one that requires no change to your current production environment, never tires, continually evolves, doesn’t rely on humans and is 99%+ accurate regardless of Internet connectivity. We’ll discuss a solution that shifts the balance in your favor by leveraging artificial intelligence to predict and prevent against malware-born threats so you don’t have to.
Art is the Regional Sales Director for Cylance with more than 10 years’ experience providing information security solutions to enterprises. Over the past decade, Art has worked in collaboration with global enterprise security organizations to identify key technologies and operational improvements to address their security needs and compliance requirements. He has led organizations into strategic partnerships with innovative technology companies to mitigate risk to their global security posture.
Trends in Data Breaches: Incident Response Planning and Processes
Today’s threat landscape is in a state of constant change. Many organizations have focused a lot of time and energy on providing controls to bolster their security program. Controls are great, but oftentimes there’s a key ingredient that’s missing. Join us for a brief discussion on the history of data breaches and some key areas of incident response companies should focus.
Raj Donald is the Director of Channel Relations at Rook Security, an IT Security firm providing outcome-focused security strategy, crisis management, and next generation security operations services. Prior to Rook, Raj spent 17 years in IT/Security, Administration, Training, Business Development and Sales Management with Fortune 500 firms. His focus has been advising customers on market entry strategy, application training, curriculum development, staff training, network and lab design, sales, mentoring and more. Raj was also in the Marine Corps and has traveled extensively as an International Master Trainer in Group Fitness. He enjoys outdoor activities at the beach, working out, traveling and competing in the game of life.
Sr Technical Marketing Manager
You Have a Blind Spot – Exposing The Misuse of The Foundation of Online Security
Adversaries are outsmarting enterprise security strategies by exploiting the foundation of online security. Cyberthreats are becoming more complex and harder to detect. Intel predicts the next big hacker marketplace to be in the sale of digital certificates that are already selling for more than $1000 each on underground marketplaces. Gartner expects 50% of network attacks to use encrypted SSL/TLS in less than 2 years. 100% of organizations have responded to an attack that misuses keys and certificates in the last two years. And an alarming 54% of them can’t determine friend versus foe. What’s to do? The human immune system has evolved to defend and destroy complex and oftentimes overwhelming attacks. What can we learn from it? How can we create a future that’s more resistant as we use more software, more clouds, more apps, and more connected devices.
Half Protected is Half Not – Platform Approach to Securing Enterprise Identities
The world of Identity Management is dangerously fragmented and needlessly complex. Don’t settle for half a solution when you need full protection for both end users and privileged users.
Centrify secures enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.
In this session, we will discuss Centrify’s platform approach to securing enterprise identities and:
- Discover the new way to protect against the #1 point of attack in data breaches
- Defend both end users & privileged users with a single platform solution
- Centralize authentication, authorization, policy, and auditing for IT resources
- Establish Identity as the new perimeter across cloud, mobile, and data center.
Project CameraShy: Closing the Aperture on China’s Unit 78020
ThreatConnect® and Defense Group Inc. (DGI) have collaborated to share threat intelligence pertaining to the Advanced Persistent Threat (APT) group commonly known as “Naikon” within the information security industry. Our partnership facilitates unprecedented depth of coverage of the organization behind the Naikon APT by fusing technical analysis with Chinese language research and expertise. The result is a meticulously documented case against the Chinese entity targeting governments and commercial interests in South, Southeast Asia and the South China Sea. This report applies the Department of Defense-derived Diamond Model for Intrusion Analysis to a body of technical and non-technical evidence to understand relationships across complex data points spanning nearly five years of exploitation activity.
Toni Gidwani is the Director of Research Operations at ThreatConnect. In this capacity, she leads ThreatConnect’s threat intelligence research team, an elite group of globally-acknowledged cybersecurity experts, dedicated to tracking down existing and emerging cyber threats. Toni previously built and led analytic teams at the Defense Intelligence Agency and joined ThreatConnect from the Office of the Secretary of Defense.
Detecting and Preventing Ransomware Attacks
Prevent a Malware Free Attack, Detecting an Adversary Before They Infiltrate Your Network
Adversaries are moving away from malware use, which can be noisy and more easily detected, to instead focusing on “blending” into organizations and appearing as insiders. CrowdStrike will present a recent case study and reveal how nation-state adversaries are conducting malware-free intrusions. This session will cover:
· Detection and prevention of attacks by identifying Indicators of Attack vs Indictors of Compromise
· How you can get real-time visibility, protection and respond to threats in your environment – even malware free intrusions.
· How to proactively defend against and effectively respond to cyber incidents by using intelligence to reveal not only where the adversary is today, but also where they have been and what their objectives will be tomorrow.
Regional Account Manager
Sr. Cloud Solution Architect
Confidence in Security and Continuity
Would you be comfortable running production in your recovery environment today? Whether your workloads contain highly sensitive information or include publicly facing applications that may be vulnerable to DDoS attacks, understand the necessary security controls to keep your data secure.
When it comes to choosing a DR service provider, you should accept nothing less than absolute confidence in your recovery process. From implementation and testing, to failover and failback, a dependable and secure continuity solution leaves nothing to chance.
See how to:
- Gain confidence through Bluelock Assurance
- Mirror security controls you’ve put in place in your production in your recovery environment
- Achieve Data Resiliency and keep your sensitive data protected