Loading Events

« All Events

  • This event has passed.

Dallas

January 11 @ 8:15 am - 4:00 pm

Event Navigation

Details

Date:
January 11
Time:
8:15 am - 4:00 pm

Venue

Cityplace Events
2711 N. Haskell Ave, LB#34
Dallas,TX75204United States
+ Google Map
Phone:
214.515.5100
Website:
http://8db87fde.dudaone.com/

Overview

The Dallas Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

netskope-updated-primary-logo

Todd Harcourt
VP of Engineering, Secure Data Solutions

Tony Luque
Sales Engineering Manager, Netskope

Discovering, Managing & Securing your business risk in the cloud

9:15am - 9:45amSession Two

Ted Gruenloh 
Director of Operations

Network Security is a Team Sport

Now more than ever, protecting your network takes teamwork. So, who are the players? There are more than you think: It’s not just you and your staff. Your users and vendors are obviously on the team, but it goes a lot deeper than that, too. Through a handful of quick case studies, we’ll pull back the curtain on shared threat intelligence, open source software, outsourcing, and even social media to see how an emphasis on working together can help combat common issues like ransomware and malware.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Lightcyber

Jim Daniel 
Sr. Security Consultant | Penetration Testing Lead from Critical Start

How to Catch a Pen Tester:  Detect Lateral Movement Techniques With Next Generation Visibility

Technical exploitation, 0 days and unpatched systems are considered hallmarks of hacking. While attackers may take advantage of these vulnerabilities, initial access and lateral movement within a network often involves stolen credentials and privilege abuse. Focusing on user behavior and abnormal usage can combat these breaches. This session will explore common attacks – from initial credential harvesting to domain controller access to post exploitation – and analyze how to protect against them.

Speakers Bio:

Jim Daniel has a background in asymmetrical warfare with experience in overseas operations with the United States Marine Corps. His information security background involves both Intrusion Detection and Penetration Testing. With a focus on network perimeter penetration and information exfiltration, Jim brings an offensive mindset and skillset and applies it to the common goal of securing information systems, datastores, services, and people.

10:45am - 11:15amSession Four

Jeff Stepanik 
Regional Sales Director

Unifying Data Protection, Leveraging the Power of the Cloud

Download the Presentation

Speaker Bio:

Speaker Bio: Jeff Stepanik is a Regional Sales Director at Druva.  He received his education at Kent State University.  For over 18 years, his consultative selling approach has assisted organizations in providing IT solutions focused on backup and recovery, disaster recovery, security archive and governance.  He has assisted organizations designing and deploying multi-million dollar IT solutions down to solution fixes that run a couple thousand dollars.   Jeff has spent his career working for solution providers like Druva, EMC, Spectra Logic, Pillar Data Systems along with a few value added resellers.   In his spare time, Jeff can be found with his two boys, at the gym, on his mountain bike or one of his motorcycles.  For more information, Jeff can be reached at 832-370-3952,  jeff.stepanik@druva.com or https://www.linkedin.com/in/jeffstepanik.

11:15am - 11:45amBreak / Vendor Booth Time/Lunch
11:45am - 12:15pmSession Five

Sean McCarthy
Consulting Systems Engineer

Firewall as a Service

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

unitrends-logo-black

Mike Weimann
Regional Channel Director – South from Unitrends

How to Compete Against Ransomware

Play offense:  Preventative measures that can mitigate the effects of ransomware attacks.  Play defense:  Be proactive with counter-measures.  Special teams (backups) can make the difference.

Download the Presentation

1:00pm - 1:30pmSession Seven

Mike Challender 
Channel Sales Manager

Disaster Happens; Don’t Be Held Hostage   

Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest  addition to their arsenal – EVault family of products. We’ll also cover best practices for backing your data and how you take your defenses to the next level with DRaaS.

Download the Presentation

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

Stephanie Duncan
Account Manager

The Impact of DDoS Attacks

Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk.

Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.

2:15pm - 2:45pmSession Nine

Ted Lee
Sr. Systems Engineer

The Game has Changed…Ready or Not!

Download the Presentation

2:45pm - 3:00pmBreak / Vendor Booth Time
Prize Drawings for All in Attendance
3:00pm - 3:30pmSession Ten

Jason Reeder
Territory Sales Engineer

Transform Your Security: Protect Your Organization. Enable the Business

  • Discover how next-generation vulnerability management can help you see and understand assets and threats never visible before.
  • Assets and vulnerabilities appear and disappear within seconds. See unknown and shadow assets and eliminate vulnerability blind spots.
  • Gain critical context – a deeper, real-time prioritized scope and understanding of which corrective actions to take first and why they’re important.
Prize Drawings for All in Attendance
3:30pm - 4:00pmSession Eleven

Network Access Control 101
Securing the Critical Edge of your Network.

Mobile devices, cloud technology, IoT and virtual work alternatives have changed how organizations operate. With over 21 billion new devices accessing networks by 2020 according to Gartner, how can organizations prepare today for the increase in devices without undermining the security posture?

A strong perimeter defense no longer offers complete protection. Organizations need to address the entire security lifecycle to adequately protect digital assets and intellectual property, even as network access grows. This presentation will address the evolving security threat landscape, cover the three critical keys to network security – visibility, control and automated response, and provide tips and best practices to shrink your attack surface and secure your network now and for the future.

For a copy of this presentation, please contact Tina Wright @ twright@bradfordnetworks.com.

Prize Drawings for All in Attendance

Sponsors