Loading Events

« All Events

  • This event has passed.

Des Moines (Cybersecurity)

February 16, 2017 @ 8:15 am - 5:15 pm

Event Navigation


February 16, 2017
8:15 am - 5:15 pm
Event Category:

Download PDF Directory


The Des Moines Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Mark Thornberry
Partner Development Manager, Cisco Cloud Security

Marc Dorn
CSE, Cisco Cloud Security

The easy button to protect yourself from Ransomware

OpenDNS Umbrella is the world’s largest cloud-delivered security platform, serving more than 65 million daily users spread across more than 160 countries. Use our combined solutions to stay ahead of attacks — no hardware to install or software to maintain.

9:15am - 9:45amSession Two

Jim Kimes
Barracuda Commercial Account Manager

Ransomware, Phishing and APTs (Advanced Persistent Threats) and APTs

Avoid Falling Victim to These Cyber Threats

Cyber threats that can have crippling effects on the enterprise.  How can you protect yourself against an attack?

Cyber attacks are in the news; why you should care?  Learn the different types of attack and their anatomy; and why Traditional methods are no longer effective

    • Phishing
    • Spear Phishing and Social Engineering
    • Ransomware & CryptoLockers
    • Hoaxes and Scams

Defending yourself against the multiple attack vectors

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

JoJo Brotamonte
Sales Engineer

Your fate will be determined by your speed of detection & response

10:45am - 11:15amSession Four

Todd O’Boyle 
Co-Founder and CTO

Attacker Tactics: How to Get Ahead 

In this story-based talk, we’ll share examples of how we’ve all been attacked and then, based upon these stories, talk through ways we all can better protect ourselves. You’ll walk out of the talk with a plan you can use to facilitate cybersecurity awareness across your organization, including talking to your executive team about more resources. If you’d like to get ahead of the game, you can download our incident response plan for small and midsize businesses at http://info.strongarm.io/incident-response-plan/.

Download the Presentation

Speaker’s Bio:

Todd O’Boyle (@oboyle) is a co-founder and CTO at Percipient Networks, an Allied Minds company. Prior to Percipient, Todd spent 15 years at The MITRE Corporation, providing technical support to the US Department of Defense, NATO, and the intelligence community. He served as principal investigator for a project developing methods to improve how operators respond to adversaries. Todd also researched malware protections used by adversaries, approaches to discover malicious insiders, profiling network flow data to identify adversary activity, and computer forensics.

Todd has a Bachelor of Science, Computer Science from Purdue University.

11:15am - 11:45amBreak / Vendor Booth Time/Lunch
11:45am - 12:15pmSession Five

Mike Challender
Channel Sales Manager

Disaster Happens; Don’t Be Held Hostage 

Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest  addition to their arsenal – EVault family of products. We’ll also cover best practices for backing your data and how you take your defenses to the next level with DRaaS.

Download the Presentation

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:15pmSession Six

Brian Krause
Manager, North America Channels

Half Protected is Half Not – Platform Approach to Securing Enterprise Identities

The world of Identity Management is dangerously fragmented and needlessly complex. Don’t settle for half a solution when you need full protection for both end users and privileged users.

Centrify secures enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises.  The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.

In this session, we will discuss Centrify’s platform approach to securing enterprise identities and:

  • Discover the new way to protect against the #1 point of attack in data breaches
  • Defend both end users & privileged users with a single platform solution
  • Centralize authentication, authorization, policy, and auditing for IT resources
  • Establish Identity as the new perimeter across cloud, mobile, and data center.
1:15pm - 1:45pmSession Seven

Larry Herzog
CISSP –  Channel Sales Engineer for Wisconsin, Iowa, & Nebraska


Keep Ransomware Out.  How you can stop ransomware and exploits before they strike

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

·        Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
·        Detect: quickly and easily detect and isolate attacks
·        Respond: laser in on critical alerts and address them with simple to understand security intelligence

Speaker’s Bio:

Larry Herzog has over 20 years of IT security experience.  He has worked extensively with public, private, educational, and military organizations.  Larry joined Sophos in April of 2014.

1:45pm - 2:00pmBreak / Vendor Booth Time
2:00pm - 2:30pmSession Eight

Richard Pollnow
Systems Engineer

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one.  Backup solutions don’t solve these problems as they are not true disaster recovery for the business.  What types of disasters will impact the business?  Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience.  Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

Speaker’s Bio for Richard Pollnow:

40 years in the computer industry providing pre and post sales support

Over 15 years in storage solutions with backup, archive and HSM softwares

DR experience with a major service provider (SunGard)

Former UNIX geek

Professional curmudgeon

Hater of the term cloud and defender of the free world

2:30pm - 3:00pmSession Nine

Rene Gonzalez
Manager, Americas Sales Engineering

Defense in depth, sense in breadth

An effective security strategy requires an organization to balance the fundamental dichotomy of locking down an environment versus user freedom.  Ivanti security delivers a defense in depth approach reducing the impact on the end user while implementing effective security controls.





3:00pm - 3:15pmBreak / Vendor Booth Time
3:15pm - 3:45pmSession Ten

Kevin Holestin
Solutions Architect

2017 Cyber Security Trends (and the things I’ve learned from 20+ years in the cyber security)

Security and security trends have evolved over the past 20 years and Kevin’s been here through all of them. During this presentation, Kevin will speak about cyber security issues that he’s observed and lessons he’s learned during his career in the industry. These lessons can help improve  a security practitioner’s effectiveness in an industry where human and financial resources are often difficult to come by.

Speaker’s Bio:

Kevin Holestine is a 20+ year cyber security veteran and expert with SANS GCIA, GPPA, CISSP, and EnCEP certifications.  With prior experience in retail, healthcare, manufacturing, and defense industries as well as implementing global security programs across 5 continents, he is currently a solutions architect at OneNeck IT Services in Denver Colorado specializing in security solutions architecture.  After a long career on the “customer” side holding positions ranging from incident response and forensic analyst to engineer, architect and CISO, he now uses his extensive experience to help companies solve their cyber security challenges.

3:45pm - 4:15pmSession Eleven

Jason Gale
Systems Engineer

The Game has Changed…Ready or Not!

Download the Presentation

4:15pm - 4:45pmSession Twelve

Riley Monahan
Systems Engineer

The Enemy Within: Detecting and Mitigating Insider Threats

Ransomware is both scourge and savior. While it’s not typically considered an insider threat, it acts from the inside, using insider identities, encrypting files that insiders have access to on endpoints and file shares. Learn how organizations are using ransomware to identify and confront vulnerabilities that expose them to rogue employees, abusive administrators, and hackers.

4:45pm - 5:15pmSession Thirteen

Erik Navratil
Territory Sales Engineer

Transform Your Security: Protect Your Organization. Enable the Business

  • Discover how next-generation vulnerability management can help you see and understand assets and threats never visible before.
  • Assets and vulnerabilities appear and disappear within seconds. See unknown and shadow assets and eliminate vulnerability blind spots.
  • Gain critical context – a deeper, real-time prioritized scope and understanding of which corrective actions to take first and why they’re important.