- This event has passed.
March 30 @ 8:15 am - 2:45 pm
The Detroit Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech-Security Strategies Conference.
Consulting System Engineer
M-Trends 2017: Trends Behind Today’s Breaches & Cyber Attacks
Discussing trends that define today’s threat landscape based on Mandiant’s investigation of the year’s successful cyber attacks.
We will discuss:
· New phishing trends breaching today’s companies.
· Changes in modern attack telemetry and methodology.
· Intelligence-led insights into emerging global threats.
· Modern defensive strategies to better protect your organization.
Join us as we take a guided look at the M-Trends Report, pinpointing current and emerging global threats as discovered from the front lines of today’s leading forensic investigations.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
The Importance of Packets in Security Forensics
Scott Hamilton is a Sr. Sales Engineer with Viavi Solutions. With more than 20 years engineering experience in multiple roles, Scott has worked with 100s of organizations in both pre- and post-sale engagements to understand and help solve their network performance management challenges. He balances both technical and business skills to advise clients about best practices and solutions for todays’ complex network and applications environments.
Sales Engineering Director, East
Keep Ransomware Out. How you can stop ransomware and exploits before they strike
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence
Ryan Archer has been in the IT field for over 20 years with experience both as a customer and as a vendor. His experience ranges from a Satellite Communications Technician in the US Air Force, to a Senior Network Architect at a Fortune 100 Company, to a Systems Engineer at two leading security companies for the last 8 years. Ryan currently works as a Sales Engineering Director for Sophos.
Central Region Channel Sales
The Impact of DDoS Attacks
Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk.
Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.
Sr Systems Engineer
The Enemy Within
Ransomware is both scourge and savior. While it’s not typically considered an insider threat, it acts from the inside, using insider identities, encrypting files that insiders have access to on endpoints and file shares. Learn how organizations are using ransomware to identify and confront vulnerabilities that expose them to rogue employees, abusive administrators, and hackers.
Dan Post is a Sr Systems Engineer with Varonis. Dan joined Varonis in 2015 and brings with him over 20 years of experience. A large share of that time managing the global storage and backup operations for Chrysler LLC. Mr Post got his start as an Intelligence Analyst for the US Army before heading to the Office of the Joint Chiefs of Staff at the Pentagon. Since then, Dan has been designing high performance, reliable, secure data storage solutions for fortune 500 companies as well as the public sector. His focus now is on helping organizations understand and secure their unstructured data.
Digital Disruption is Changing the World
As an active participant in the digital community for the last 25 years, Shawn Downey has been a student of the digital forces driving the market shifts and ensuing digital adoption. Albeit the latest trends are having an impact on the security community, he has a number of thoughts to share from an alternate angle: the security economy.
Security Account Manager
Network as a Sensor; Using Flow Data for Visibility
Jeff Byers is currently a security account manager at Cisco Systems. With more than 25 years of experience, including 19 years at Cisco, Jeff is a veteran of the security and networking industries. He is also a Cisco Certified Internetwork Expert.
Connected World- The Game has changed…Ready or Not!
By 2020 there will be 30 billion connected devices – 20 billion of which will be IoT devices that are prone to security attacks. Securing them will be key to an organization’s success and it begins with agentless visibility. We will discuss the impact of IoT and the rise of connected devices and how to solve these dilemmas.
ForeScout provides agentless visibility and control of traditional and IoT devices the instant they connect to the network. Our technology works with disparate security tools to help accelerate incident response, break down silos in existing client-based tools –automating their workflows and optimizing your organization’s existing investments.