- This event has passed.
February 16 @ 8:15 am - 5:15 pm
The Des Moines Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Partner Development Manager, Cisco Cloud Security
CSE, Cisco Cloud Security
The easy button to protect yourself from Ransomware
OpenDNS Umbrella is the world’s largest cloud-delivered security platform, serving more than 65 million daily users spread across more than 160 countries. Use our combined solutions to stay ahead of attacks — no hardware to install or software to maintain.
Ransomware, Phishing and APTs (Advanced Persistent Threats) and APTs
Avoid Falling Victim to These Cyber Threats
Cyber threats that can have crippling effects on the enterprise. How can you protect yourself against an attack?
Cyber attacks are in the news; why you should care? Learn the different types of attack and their anatomy; and why Traditional methods are no longer effective
- Spear Phishing and Social Engineering
- Ransomware & CryptoLockers
- Hoaxes and Scams
Defending yourself against the multiple attack vectors
Your fate will be determined by your speed of detection & response
Co-Founder and CTO
Attacker Tactics: How to Get Ahead
In this story-based talk, we’ll share examples of how we’ve all been attacked and then, based upon these stories, talk through ways we all can better protect ourselves. You’ll walk out of the talk with a plan you can use to facilitate cybersecurity awareness across your organization, including talking to your executive team about more resources. If you’d like to get ahead of the game, you can download our incident response plan for small and midsize businesses at http://info.strongarm.io/incident-response-plan/.
Todd O’Boyle (@oboyle) is a co-founder and CTO at Percipient Networks, an Allied Minds company. Prior to Percipient, Todd spent 15 years at The MITRE Corporation, providing technical support to the US Department of Defense, NATO, and the intelligence community. He served as principal investigator for a project developing methods to improve how operators respond to adversaries. Todd also researched malware protections used by adversaries, approaches to discover malicious insiders, profiling network flow data to identify adversary activity, and computer forensics.
Todd has a Bachelor of Science, Computer Science from Purdue University.
Channel Sales Manager
Disaster Happens; Don’t Be Held Hostage
Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest addition to their arsenal – EVault family of products. We’ll also cover best practices for backing your data and how you take your defenses to the next level with DRaaS.
Manager, North America Channels
Half Protected is Half Not – Platform Approach to Securing Enterprise Identities
The world of Identity Management is dangerously fragmented and needlessly complex. Don’t settle for half a solution when you need full protection for both end users and privileged users.
Centrify secures enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.
In this session, we will discuss Centrify’s platform approach to securing enterprise identities and:
- Discover the new way to protect against the #1 point of attack in data breaches
- Defend both end users & privileged users with a single platform solution
- Centralize authentication, authorization, policy, and auditing for IT resources
- Establish Identity as the new perimeter across cloud, mobile, and data center.
CISSP – Channel Sales Engineer for Wisconsin, Iowa, & Nebraska
Keep Ransomware Out. How you can stop ransomware and exploits before they strike
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence
Larry Herzog has over 20 years of IT security experience. He has worked extensively with public, private, educational, and military organizations. Larry joined Sophos in April of 2014.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Speaker’s Bio for Richard Pollnow:
40 years in the computer industry providing pre and post sales support
Over 15 years in storage solutions with backup, archive and HSM softwares
DR experience with a major service provider (SunGard)
Former UNIX geek
Hater of the term cloud and defender of the free world
Manager, Americas Sales Engineering
Defense in depth, sense in breadth
An effective security strategy requires an organization to balance the fundamental dichotomy of locking down an environment versus user freedom. Ivanti security delivers a defense in depth approach reducing the impact on the end user while implementing effective security controls.
2017 Cyber Security Trends (and the things I’ve learned from 20+ years in the cyber security)
Security and security trends have evolved over the past 20 years and Kevin’s been here through all of them. During this presentation, Kevin will speak about cyber security issues that he’s observed and lessons he’s learned during his career in the industry. These lessons can help improve a security practitioner’s effectiveness in an industry where human and financial resources are often difficult to come by.
Kevin Holestine is a 20+ year cyber security veteran and expert with SANS GCIA, GPPA, CISSP, and EnCEP certifications. With prior experience in retail, healthcare, manufacturing, and defense industries as well as implementing global security programs across 5 continents, he is currently a solutions architect at OneNeck IT Services in Denver Colorado specializing in security solutions architecture. After a long career on the “customer” side holding positions ranging from incident response and forensic analyst to engineer, architect and CISO, he now uses his extensive experience to help companies solve their cyber security challenges.
The Game has Changed…Ready or Not!
The Enemy Within: Detecting and Mitigating Insider Threats
Ransomware is both scourge and savior. While it’s not typically considered an insider threat, it acts from the inside, using insider identities, encrypting files that insiders have access to on endpoints and file shares. Learn how organizations are using ransomware to identify and confront vulnerabilities that expose them to rogue employees, abusive administrators, and hackers.
Territory Sales Engineer
Transform Your Security: Protect Your Organization. Enable the Business
- Discover how next-generation vulnerability management can help you see and understand assets and threats never visible before.
- Assets and vulnerabilities appear and disappear within seconds. See unknown and shadow assets and eliminate vulnerability blind spots.
- Gain critical context – a deeper, real-time prioritized scope and understanding of which corrective actions to take first and why they’re important.