- This event has passed.
March 31, 2016 @ 8:00 am - 5:00 pm
The Detroit Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Next Generation Secure Access Solutions
Today’s global enterprises rely upon professionals who wear many hats, certifications and distinctions. Business growth is realized by reaching billions of potential customers who are always connected, aligning to data across multiple devices – be it smart phones, tablets, laptops and desktops.
With another 1 billion end users coming onboard in 2017 and nearly half of all applications leveraged going to market with security flaws and gaps to be “patched later,” Pulse Secure will outline Next Generation Secure Access Solutions that help secure Capitalism, Global Intelligence Agencies, 13 of 15 key U.S. Government networks and 80% of the Fortune 100, 26 of the Dow Jones 30.
Pulse Security Midwest Lead Jim Hebler will deliver a thought provoking market focus aligning Pulse Secure as a right place, right time solution for enterprise work anywhere professionals who see their devices as their office. CISSP trained with a background in business journalism, brand security, global security roadmap development (Health Care, Financial Services, Manufacturing, Supply Chain) – Hebler provides an thought-provoking and entertaining presentation that aligns Mobility Security to business growth – enabling work anywhere access while saving 40% in capital costs.
This presentation is brought to Data Connector by Data Partner, Inc. Go to www.pulsesecure.net to learn more.
With mega-breaches like Anthem, OPM, IRS, Ashley Madison, UCLA Health and TalkTalk all within the past 12 months, chances are your data has been targeted. What does this mean for 2016? Join Imperva as we reveal the top trends that will impact cyber security practices across the globe and how to protect your organization. During this session organizations of all sizes will learn:
– Why cyber attacks continue to increase in sophistication, magnitude and velocity
– What trends will have the largest and smallest impact on cyber security in 2016
– Why cloud-based apps and the Internet of Things have transformed cyber security
– How you can protect your organization from attacks from the inside
What’s Next in Wi-Fi
Network Visibility And Security In The Era Of Mobility & Advanced Threats
Hack attacks – and in particular Advanced Persistent Threats (APTs) – are on the rise, eroding reputations and looting organizational assets with disturbing regularity. With mobility the new norm and mobile security in its relative infancy, are BYOD enterprises inviting APT attacks? Mobile devices potentially open the organizational network to a new set of security risks that challenge IT professionals to plan strategically. This session examines effective new approaches to redefine network perimeter, gain real time network visibility into who and what is on it, and control access automatically. Importantly, the session offers strategies for preventing and controlling APTs and other infections.
Managing Consultant, Strategic Advisory Services
Relevant Impact: Why Threat Risk Assessments
During this presentation, Richard Poworski will discuss the business value of performing threat risk assessments. He will illustrate the differences between a business-based versus an asset-based threat risk assessment. The participants will leave with an understanding of the benefits created from contrasting and correlating threat, vulnerability and risk data and the value this brings to prioritizing investment in your security program.
Sales Engineer Manager
Threat Ready: The Benefits of Data Center Segmentation
With an alarming surge in sophisticated, targeted cyber-attacks, IT leaders can no longer rely on perimeter security alone to protect their critical assets. The network must also be segmented and secured internally to prevent the propagation of malware within an organization’s physical and virtual networks. In this session, Burwood Group will illustrate the benefits of a properly designed data center network – one that secures both north-south and east-west traffic flows.
Nick Lumsden Vice President of Technology and Product Strategy
Covering Your Assets; a guide to protecting your data and how to sell the proper security solutions to your board
Has your neck been on the line for protecting your company data assets, but declined for additional budget on cyber-security measures? We will visit the value of data and it’s protection in this session, along with tips on garnering buy-in from your executives and boards.
Nick is a technology leader with 17 years of experience in the technology industry, particularly in healthcare, data analytics and cloud computing. In 2013, Nick joined Online Tech as Senior Director of Operations and Product Strategy, responsible for the full technology stack within the company’s five Midwest data centers – from generators and cooling to network and cloud infrastructure. After being named vice president, he now assumes responsibility for the gross margin, uptake and profitability of new products as well as management. He has worked in software engineering as well as infrastructure, operations and IT leadership. The Michigan native returned home after seven years with Inovalon, a healthcare data analytics company in the Washington, D.C. area, where he served as the principal technical architect.
Nick has a Bachelor of Science in computer science from Michigan Technological University.
A New Way to Look at IT Security with Endpoint Modeling
Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling critical defense measures and visibility into endpoints and the network. With great accuracy, endpoint modeling discovers and tracks the role of each device in a way that emits actionable security intelligence when roles change in notable ways. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others.
Regional Sales Director
Artificial Intelligence. Real Threat Prevention.
Art is the Regional Sales Director for Cylance with more than 10 years’ experience providing information security solutions to enterprises. Over the past decade, Art has worked in collaboration with global enterprise security organizations to identify key technologies and operational improvements to address their security needs and compliance requirements. He has led organizations into strategic partnerships with innovative technology companies to mitigate risk to their global security posture.
Intel Security Sales Engineer
This session will provide you with an overview of Intel Security’s Security Connected framework, a seamless integration of solutions, services, and partnerships that intelligently reduces your overall infrastructure risks, protects existing assets and securely embraces new lines of business across your entire IT infrastructure.
Reclaim Control of Mobile and Distributed Data
In today’s mobile and cloud application world, locating, tracking, and monitoring dispersed data has become increasingly more complicated. Organizations that can get a few steps ahead in identifying and remediating potential data risks before they become critical business issues will more effectively protect their enterprise from exposure and fines, while minimizing impact to workforce productivity.
Because of these data and work habit changes, enterprises struggle to provide effective productivity tools to mobile workers, while at the same time meet corporate governance obligations; tracking sensitive information for HIPAA, PCI and SOX, ensuring employee data privacy, and meeting legal needs.
Join us for this session where we’ll discuss what the increasing data governance burden created by data sprawl means and strategies to address it, the key challenges of tracking, monitoring and responding to compliance/legal requests for dispersed enterprise data and what actions your organization can take today to get ahead.
Jason Creech, CISSP, ITIL v3
Senior Engineer Security Consulting
Securing the Cloud CASB
Enterprises are experiencing a fundamental shift in the way their employees and customers consume technology. The influx of personally owned devices, ubiquitous high-speed internet connectivity and cloud-based applications is transforming the enterprise network in nearly every vertical and region, and it is sometimes referred to as a dissolving network perimeter, but in reality, it is an expansion of the traditional enterprise network through mobility and cloud applications.
The traditional IT infrastructure that enterprises have built is being extended as companies embrace cloud applications such as Office365, Google Drive, Box, Dropbox Amazon Web Services, Oracle, and Salesforce. This shift of workloads into the cloud is rapidly redefining enterprise IT, and offers significant opportunities to enterprises. This presentation discusses the considerations and challenges faced by Enterprises in securing this new, rapidly growing, security landscape.
Jason Creech has more than 20 years of information security experience specializing in IT governance, risk, and compliance management, and cloud security assessment initiatives. In his current role, as part of the recent acquisition of Elastica, Jason is responsible for assisting customers with cloud application security strategies at Blue Coat and providing guidance on aspects related to challenges created by the evolution of the Enterprises’ rapidly growing adoption of cloud applications. Prior to that, Jason was Director of Security Consulting and Products with Elastica, a pioneer in the cloud application security broker market. Additionally, Jason has held various technical product management and senior consultant positions with EMC/RSA Archer, Qualys, NetIQ/MicroFocus, and HP. Jason has presented at many ISSA and ISACA conferences and is co-author of “IT Policy Compliance for Dummies”.
Veeam Software was scheduled to speak today, however, due to a conflict they are unable to attend altogether. For more information about Veeam Software, please contact Brad Bebell, email@example.com.