Loading Events

« All Events

Indianapolis

August 3 @ 8:15 am - 5:00 pm

Details

Date:
August 3
Time:
8:15 am - 5:00 pm

Overview

The Indianapolis Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech Security Strategies Conference.

8:45am - 9:15amSession One

Aaron Nichols
SME Sales Manager

9:15am - 9:45amSession Two
9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Andrew Short
Channel Sales Engineer

Stopping Ransomware at the Door (and every other Threat)

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

·        Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
·        Detect: quickly and easily detect and isolate attacks
·        Respond: laser in on critical alerts and address them with simple to understand security intelligence

10:45am - 11:15amSession Four

Marc Doorn 
Consulting Systems Engineer

First line of defense for threats on the internet

Download the Presentation

Speaker’s Bio:

Marc Dorn is a Consulting Systems Engineer on the Cloud Security team at Cisco. He has been in the IT and IT Security field for nearly 25 years. He is very passionate about technology that make networks more secure and productive.  He has been with Cisco for two years. Prior to joining Cisco, Marc held technical positions at Tenable Network Security and WatchGuard Technologies.

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

John Krug
Area Security Specialist – Southeast

Defense in-depth

In this day of risks, vulnerabilities and advanced persistent threats, it’s important to understand why perimeter protection simply just isn’t enough, and why a comprehensive assumed breach methodology ensures the greatest defense.  Ivanti security provides a proactive defense-in-depth approach to protecting ones corporate brand and integrity, reputation, data, devices & users from risks and potential attack. Join us for a discussion about the ever-changing threat landscape and how you can more effectively protect your company from these threats.

 

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Greg Reasner
Account Executive

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

Speaker’s Bio:

Greg Reasner is an Enterprise Account Executive at Zerto, helping clients solve problems focused towards reducing risk and exposure to an organization’s treasured data sets with business continuity through Zerto’s platform.  Zerto’s award-winning solution provides enterprises with continuous data replication & recovery designed specifically for virtualized infrastructures and hybrid cloud environments.

Greg has 15+ years of experience in information technology covering a wide range of solutions in this time and ultimately focuses towards helping his clients succeed.  He’s based in Indianapolis and manages Indiana, Kentucky and Cincinnati, OH.

1:00pm - 1:30pmSession Seven
1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

Rob Pollock
Arbor Networks Channel Sales

The Impact of DDoS Attacks – The Stakes Have Changed – Are You Prepared??

Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk.  From the Mirai Botnet to the recent Wannacry ransomware attack, see how DDoS attacks are being used as a “smokescreen” for other nefarious activities.

Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.

2:15pm - 2:45pmSession Nine

Michael Bird
Team Lead, Account Executive

Explaining Bitcoins will be the easy part:  Email Borne Attacks and How You Can Defend Against Them

If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes.  If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.

In this session, you’ll learn:

•How your email can be used as an entry point for multiple types of attack
•The damaging impact attacks have on organizations
•Why your employees could be the weakest link in your email security
•How to enhance your email security and thus your overall cyber resilience

2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:30pmSession Ten

Scott Taylor
Director of Solutions Engineering

Does Your Time to First Byte Bite?

Join Scott Taylor, Director of Solutions Engineering at Dyn as he provides a high level overview of DNS, the various multi-DNS configurations and how this layer of your infrastructure has everything to do with security. From DDoS to DNS amplification and reflection attacks, it’s all covered including strategies to mitigate, opportunities to architect infrastructure resiliency and tips to improve digital performance.

Download the Presentation

3:30pm - 4:15pmSession Eleven

Joe Marton
Senior Systems Engineer

7 Tips to Prevent Ransomware Attacks on Backup Storage

Download the Presentation

4:15pm - 4:45pmSession Twelve
4:45pm - 5:15pmSession Thirteen

Sponsors