July 27 @ 8:15 am - 5:15 pm
The Dallas Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech-Security Strategies Conference.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Threat Intelligence and Layered Security in the Post-Target Breach Era
The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.
Penetration Tester and Information Security Consultant
Social Engineering: Defending Against the Grifter
You’ve seen the movies. You’ve read the thrillers. Con artists have near-magical abilities to re-program your brain, bypass pesky locks, or even swindle away your wallet. In the real world, magic powers aren’t real. But breakdowns in social engineering are a genuine threat. Come explore real-life examples of social engineering attacks and learn how you can protect against the grifter.
Sophie Daniel is a Penetration Tester and Information Security Consultant for Critical Start. She specializes in social engineering penetration assessments including, physical, voice (vishing), and text (phishing) and red team pentests. She also consults in remediation and prevention through the creation and implementation of policy and procedure, as well as in-person customized training. Prior to working in InfoSec, Sophie was a journalist specializing in photojournalism and investigations.
5 ways Backup Kills the Ransomware Threats
If ALL your environment is not protected, there is a good chance ransomware will hit you and you will most likely lose data. But, what should scare you more is less than half of ransomware victims fully recover their data, even with backup. What can you do to make sure you are not on the wrong side of a statistic? Understand the 5 ways backup kills ransomware.
Leadership in the Security Space
Check Point is the first consolidated security across networks, cloud and mobile, providing the highest level of threat prevention against both known and unknown targeted attacks to keep you protected now and in the future.
Our Infinity architecture leverages unified threat intelligence and open interfaces, enabling all environments to stay protected against targeted attacks. Unlike other solutions, Check Point believes in a preemptive threat prevention strategy, focused on prevention rather than detection only, to block the most sophisticated attacks before they occur.
Zach Smith is the Check Point Area Manager for North Texas and Oklahoma responsible for a team of 10 leading IT security professionals covering all verticals in Fortune 1000, Commercial and the Government space. Educated at Florida Atlantic University with a Bachelors and trained by Check Point in IT Security in New York City. Assisted with major IT security redesigns at a 30,000 user government agency, major insurance actuary, three hospitals, and the largest real estate development in Florida.
Identity as the new Cloud Security Perimeter
With nearly 20 years in Cybersecurity, Rodger Nichols is a dedicated and passionate evangelist to partners and customers. Laser-focused on the importance of Identity as the true Perimeter as well as partner and customer success, he is currently the Director of Field Alliances at Okta after spending more than 15 years in more traditional, on-prem security.
Arbor Networks Channel Sales
The Impact of DDoS Attacks – The Stakes Have Changed – Are You Prepared??
Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk. From the Mirai Botnet to the recent Wannacry ransomware attack, see how DDoS attacks are being used as a “smokescreen” for other nefarious activities.
Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.
Regional Systems Engineer
Stop Cyber Threats With Adaptive Micro-Segmentation
Virtualization, the cloud, and the promise of containers have evolved the data center, bringing better application delivery and cost reduction. With these benefits come new risks that include increased East/West traffic and the potential for new cyber threats. Adaptive micro-segmentation is transforming and improving security inside the data center and clouds while speeding up app delivery.
In this session you’ll learn:
– How adaptive micro-segmentation enables security anywhere (on premises, AWS, Azure, etc.) on anything (bare metal, vSphere/KVM/XEN, containers), while eliminating app delivery delays caused by traditional security approaches.
– How customers are using adaptive micro-segmentation to instantly protect high-value apps, separate dev from prod with one rule, take existing security policies to the cloud, and more.
– How live visibility of application traffic and dependencies is making security dead simple for IT operations and security teams.
Senior Solutions Engineer
Hacking Malware: How to Turn Evasive Malware Strengths into Weaknesses
Developing sophisticated attacks takes time and requires heavy investment. Attackers safeguard their methods by designing malicious software to remain unnoticed by security tools for as long as possible. This educational session discusses some of the common evasive techniques that malware authors incorporate into their creations. Moreover, it will also propose several approaches for turning such capabilities against malware to defend endpoints, turning adversaries’ strengths into weaknesses.
VP of Strategic Accounts
To Catch a Phish: Automation’s Role in Defending the Enterprise
Targeted phishing has become the single most effective attack type in the world today, and
attackers’ emphasis on social engineering tactics make the protection of cloud communication platforms a critical component of any cybersecurity strategy. What’s going underreported, however, is that cybercriminals are putting pressure on businesses by also increasing the volume of their highly targeted attacks. This is why many enterprise IT and Security teams are
relying on automated policies and technologies to prevent themselves from being outmanned
In this session, GreatHorn’s Chris Fraser will discuss the critical role of automation in staying ahead of cybercriminals. Automation reduces the workload on IT and Security teams by programmatically identifying and addressing threats based on present policies. Without automation – according to recent research from GreatHorn – the average enterprise can expect to spend more than 305 per week analyzing all of the corporate communications that contain threat characteristics. Fraser will unveil some more findings of the research report as well as discuss how attendees can incorporate automation into their cybersecurity strategies to keep critical data safe.
Chris Fraser is a founding member of GreatHorn and currently serves as its VP of Strategic Accounts. In this role, Fraser collaborates with Fortune 500 and other innovative enterprises to help them create a comprehensive cybersecurity strategy around their cloud communications platforms including Office 365, G Suite, Slack and Skype. He works closely with GreatHorn’s R&D team to ensure the company’s flagship solution meets the needs of its enterprise clients.
Fraser has been collaborating with senior-level IT and security leaders for more than 10 years. He most recently served as the Director of Strategic Accounts for Conjur (acquired by Cyberark), a Dev-Ops security company that helps businesses manage user access in highly collaborative digital environments.
Ransomware Reality Check-Protecting Your Business Today
There Will be Attacks – Improve your Email Defenses
If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes. If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Senior Sales Engineer
3 Ways IT is Changing the Game for the Surveillance Industry
Are you ready for the future of video surveillance? Rapid advancements in technology are putting unprecedented demands on storage infrastructure – demands that traditional solutions are not designed to handle. The resulting downtime and data loss could have huge ramifications for your organization including greater exposure to liability, lost evidence, inadequate response capabilities, staggering costs or worse.
Fortunately, new technologies are available to help you lower cost, reduce risk and protect your critical security investments. Hyperconverged infrastructure, purpose-built for surveillance, has proven to be the best choice for IP video surveillance. Join us for an educational presentation to learn:
- How to reduce risk and liabilities by eliminating downtime and data loss
- How to improve the effectiveness of your surveillance systems by maximizing performance and scalability
- How to leverage the latest IT advancements to reduce costs and mobilize fully integrated systems