- This event has passed.
January 11 @ 8:15 am - 4:00 pm
The Dallas Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
VP of Engineering, Secure Data Solutions
Sales Engineering Manager, Netskope
Discovering, Managing & Securing your business risk in the cloud
Director of Operations
Network Security is a Team Sport
Now more than ever, protecting your network takes teamwork. So, who are the players? There are more than you think: It’s not just you and your staff. Your users and vendors are obviously on the team, but it goes a lot deeper than that, too. Through a handful of quick case studies, we’ll pull back the curtain on shared threat intelligence, open source software, outsourcing, and even social media to see how an emphasis on working together can help combat common issues like ransomware and malware.
How to Catch a Pen Tester: Detect Lateral Movement Techniques With Next Generation Visibility
Technical exploitation, 0 days and unpatched systems are considered hallmarks of hacking. While attackers may take advantage of these vulnerabilities, initial access and lateral movement within a network often involves stolen credentials and privilege abuse. Focusing on user behavior and abnormal usage can combat these breaches. This session will explore common attacks – from initial credential harvesting to domain controller access to post exploitation – and analyze how to protect against them.
Jim Daniel has a background in asymmetrical warfare with experience in overseas operations with the United States Marine Corps. His information security background involves both Intrusion Detection and Penetration Testing. With a focus on network perimeter penetration and information exfiltration, Jim brings an offensive mindset and skillset and applies it to the common goal of securing information systems, datastores, services, and people.
Regional Sales Director
Unifying Data Protection, Leveraging the Power of the Cloud
Speaker Bio: Jeff Stepanik is a Regional Sales Director at Druva. He received his education at Kent State University. For over 18 years, his consultative selling approach has assisted organizations in providing IT solutions focused on backup and recovery, disaster recovery, security archive and governance. He has assisted organizations designing and deploying multi-million dollar IT solutions down to solution fixes that run a couple thousand dollars. Jeff has spent his career working for solution providers like Druva, EMC, Spectra Logic, Pillar Data Systems along with a few value added resellers. In his spare time, Jeff can be found with his two boys, at the gym, on his mountain bike or one of his motorcycles. For more information, Jeff can be reached at 832-370-3952, email@example.com or https://www.linkedin.com/in/jeffstepanik.
Consulting Systems Engineer
Firewall as a Service
How to Compete Against Ransomware
Play offense: Preventative measures that can mitigate the effects of ransomware attacks. Play defense: Be proactive with counter-measures. Special teams (backups) can make the difference.
Channel Sales Manager
Disaster Happens; Don’t Be Held Hostage
Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest addition to their arsenal – EVault family of products. We’ll also cover best practices for backing your data and how you take your defenses to the next level with DRaaS.
The Impact of DDoS Attacks
Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk.
Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.
Sr. Systems Engineer
The Game has Changed…Ready or Not!
Territory Sales Engineer
Transform Your Security: Protect Your Organization. Enable the Business
- Discover how next-generation vulnerability management can help you see and understand assets and threats never visible before.
- Assets and vulnerabilities appear and disappear within seconds. See unknown and shadow assets and eliminate vulnerability blind spots.
- Gain critical context – a deeper, real-time prioritized scope and understanding of which corrective actions to take first and why they’re important.
Network Access Control 101
Securing the Critical Edge of your Network.
Mobile devices, cloud technology, IoT and virtual work alternatives have changed how organizations operate. With over 21 billion new devices accessing networks by 2020 according to Gartner, how can organizations prepare today for the increase in devices without undermining the security posture?
A strong perimeter defense no longer offers complete protection. Organizations need to address the entire security lifecycle to adequately protect digital assets and intellectual property, even as network access grows. This presentation will address the evolving security threat landscape, cover the three critical keys to network security – visibility, control and automated response, and provide tips and best practices to shrink your attack surface and secure your network now and for the future.
For a copy of this presentation, please contact Tina Wright @ firstname.lastname@example.org.