Loading Events

« All Events

  • This event has passed.

Dallas (Cybersecurity)

July 27 @ 8:15 am - 5:15 pm

Overview

The Dallas Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

James Bourg
Account Executive

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

9:15am - 9:45amSession Two

Ted Gruenloh
COO

Threat Intelligence and Layered Security in the Post-Target Breach Era

The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Jeff Patton

Social Engineering: Defending Against the Grifter

You’ve seen the movies. You’ve read the thrillers. Con artists have near-magical abilities to re-program your brain, bypass pesky locks, or even swindle away your wallet. In the real world, magic powers aren’t real. But breakdowns in social engineering are a genuine threat. Come explore real-life examples of social engineering attacks and learn how you can protect against the grifter.

 

10:45am - 11:15amSession Four

Mark Jordan
VP, Technology from Unitrends

5 ways Backup Kills the Ransomware Threats

If ALL your environment is not protected, there is a good chance ransomware will hit you and you will most likely lose data. But, what should scare you more is less than half of ransomware victims fully recover their data, even with backup. What can you do to make sure you are not on the wrong side of a statistic? Understand the 5 ways backup kills ransomware.

Download the Presentation

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:30pmSession Five

Zach Smith
Area Manager

Leadership in the Security Space

Check Point is the first consolidated security across networks, cloud and mobile, providing the highest level of threat prevention against both known and unknown targeted attacks to keep you protected now and in the future.

Our Infinity architecture leverages unified threat intelligence and open interfaces, enabling all environments to stay protected against targeted attacks. Unlike other solutions, Check Point believes in a preemptive threat prevention strategy, focused on prevention rather than detection only, to block the most sophisticated attacks before they occur. 

Download the Presentation

Speaker Bio:

Zach Smith is the Check Point Area Manager for North Texas and Oklahoma responsible for a team of 10 leading IT security professionals covering all verticals in Fortune 1000, Commercial and the Government space. Educated at Florida Atlantic University with a Bachelors and trained by Check Point in IT Security in New York City. Assisted with major IT security redesigns at a 30,000 user government agency, major insurance actuary, three hospitals, and the largest real estate development in Florida.

12:30pm - 12:45pmBreak / Vendor Booth Time
12:45pm - 1:15pmSession Six

Rodger Nichols

Identity as the new Cloud Security Perimeter

Download the Presentation

Speaker’s Bio:

With nearly 20 years in Cybersecurity, Rodger Nichols is a dedicated and passionate evangelist to partners and customers. Laser-focused on the importance of Identity as the true Perimeter as well as partner and customer success, he is currently the Director of Field Alliances at Okta after spending more than 15 years in more traditional, on-prem security.

1:15pm - 1:45pmSession Seven

Rob Pollock
Arbor Networks Channel Sales

The Impact of DDoS Attacks – The Stakes Have Changed – Are You Prepared??

Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk.  From the Mirai Botnet to the recent Wannacry ransomware attack, see how DDoS attacks are being used as a “smokescreen” for other nefarious activities.

Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.

1:45pm - 2:00pmBreak / Vendor Booth Time
2:00pm - 2:30pmSession Eight

David Gurley
Regional Systems Engineer

Stop Cyber Threats With Adaptive Micro-Segmentation 

Virtualization, the cloud, and the promise of containers have evolved the data center, bringing better application delivery and cost reduction. With these benefits come new risks that include increased East/West traffic and the potential for new cyber threats. Adaptive micro-segmentation is transforming and improving security inside the data center and clouds while speeding up app delivery.

In this session you’ll learn:

– How adaptive micro-segmentation enables security anywhere (on premises, AWS, Azure, etc.) on anything (bare metal, vSphere/KVM/XEN, containers), while eliminating app delivery delays caused by traditional security approaches.

– How customers are using adaptive micro-segmentation to instantly protect high-value apps, separate dev from prod with one rule, take existing security policies to the cloud, and more.

– How live visibility of application traffic and dependencies is making security dead simple for IT operations and security teams.

Download the Presentation

Speaker’s Bio:

David Gurley is a Regional Systems Engineer for Illumio based out of Dallas, Texas. He is responsible for collaborating with customers who are interested in improving their security posture using modern microsegmentation technology. When he’s not working with customers, he’s working on special projects that leverage the power of Illumio’s REST API. Prior to Illumio, David was a Customer Solutions Architect at Cisco on a team focused on software sales. In his 15-year career at Cisco, he worked across many technology disciplines, with a major focus on next-generation protocols and software. David holds a Bachelor’s Degree in Electrial Engineeering from Texas A&M.

2:30pm - 3:00pmSession Nine

Jim Richards
Senior Solutions Engineer

Hacking Malware: How to Turn Evasive Malware Strengths into Weaknesses 

Developing sophisticated attacks takes time and requires heavy investment. Attackers safeguard their methods by designing malicious software to remain unnoticed by security tools for as long as possible. This educational session discusses some of the common evasive techniques that malware authors incorporate into their creations. Moreover, it will also propose several approaches for turning such capabilities against malware to defend endpoints, turning adversaries’ strengths into weaknesses.

3:00pm - 3:15pmBreak / Vendor Booth Time
3:15pm - 3:45pmSession Ten

Chris Fraser
VP of Strategic Accounts

To Catch a Phish: Automation’s Role in Defending the Enterprise

Targeted phishing has become the single most effective attack type in the world today, and
attackers’ emphasis on social engineering tactics make the protection of cloud communication platforms a critical component of any cybersecurity strategy. What’s going underreported, however, is that cybercriminals are putting pressure on businesses by also increasing the volume of their highly targeted attacks. This is why many enterprise IT and Security teams are
relying on automated policies and technologies to prevent themselves from being outmanned
and outgunned.

In this session, GreatHorn’s Chris Fraser will discuss the critical role of automation in staying ahead of cybercriminals. Automation reduces the workload on IT and Security teams by programmatically identifying and addressing threats based on present policies. Without automation – according to recent research from GreatHorn – the average enterprise can expect to spend more than 305 per week analyzing all of the corporate communications that contain threat characteristics. Fraser will unveil some more findings of the research report as well as discuss how attendees can incorporate automation into their cybersecurity strategies to keep critical data safe.

Download the Presentation

Speaker’s Bio:

Chris Fraser is a founding member of GreatHorn and currently serves as its VP of Strategic Accounts. In this role, Fraser collaborates with Fortune 500 and other innovative enterprises to help them create a comprehensive cybersecurity strategy around their cloud communications platforms including Office 365, G Suite, Slack and Skype. He works closely with GreatHorn’s R&D team to ensure the company’s flagship solution meets the needs of its enterprise clients.

Fraser has been collaborating with senior-level IT and security leaders for more than 10 years. He most recently served as the Director of Strategic Accounts for Conjur (acquired by Cyberark), a Dev-Ops security company that helps businesses manage user access in highly collaborative digital environments.

3:45pm - 4:15pmSession Eleven

Quang Nguyen
Partner Software Engineer with ESET

Ransomware Reality Check-Protecting Your Business Today

Download the Presentation

4:15pm - 4:45pmSession Twelve

Karsten Chearis
Sales Engineer

 

There Will be Attacks – Improve your Email Defenses

If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes.  If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.

In this session, you’ll learn:

  • How your email can be used as an entry point for multiple types of attack
  • The damaging impact attacks have on organizations
  • Why your employees could be the weakest link in your email security
  • How to enhance your email security and thus your overall cyber resilience

Download the Presentation

Prize Drawings for All in Attendance
4:45pm - 5:15pmSession Thirteen

Bob Haas
Senior Sales Engineer

3 Ways IT is Changing the Game for the Surveillance Industry

Are you ready for the future of video surveillance? Rapid advancements in technology are putting unprecedented demands on storage infrastructure – demands that traditional solutions are not designed to handle. The resulting downtime and data loss could have huge ramifications for your organization including greater exposure to liability, lost evidence, inadequate response capabilities, staggering costs or worse.

Fortunately, new technologies are available to help you lower cost, reduce risk and protect your critical security investments. Hyperconverged infrastructure, purpose-built for surveillance, has proven to be the best choice for IP video surveillance. Join us for an educational presentation to learn:

  • How to reduce risk and liabilities by eliminating downtime and data loss
  • How to improve the effectiveness of your surveillance systems by maximizing performance and scalability
  • How to leverage the latest IT advancements to reduce costs and mobilize fully integrated systems
Prize Drawings for All in Attendance

Sponsors