Loading Events

« All Events

  • This event has passed.

Indianapolis (Cybersecurity)

August 3 @ 8:15 am - 5:15 pm

Details

Date:
August 3
Time:
8:15 am - 5:15 pm
Event Category:

Overview

The Indianapolis Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech Security Strategies Conference.

8:45am - 9:15amSession One

Aaron Nichols
SME Sales Manager

Threat LifeCycle Management

Security Information and Event Management (SIEM) are top-of-mind for all Corporate Leaders.  Never before have Board Members and IT Security Professionals shared the same sense of urgency, regarding information security.  Threat LifeCycle Management addresses the necessary visibility, collaboration and awareness to accurately navigate today’s dynamic IT security landscape.  LogRhythm provides a transparent and proactive approach, relying upon 13 years of practical end-user success.

Download the Presentation

9:15am - 9:45amSession Two

Adrian Robinson
Systems Engineer

Network Visibility, See What Matters

Operating, securing and maintaining the corporate network is a sizeable objective for all business’.  Many times, we invest significant time and resources into products and staff only to realize solutions have been undersized, or don’t quite live up to potential due to system complexity.  What if there were a better way?  What if we could lengthen the life span of our existing investments, gain operational efficiencies and reduce recurring costs?  Join Gigamon to discuss network visibility, and how a new approach to securing and managing networks is changing the game.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Andrew Short
Channel Sales Engineer

Stopping Ransomware at the Door (and every other Threat)

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

·        Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
·        Detect: quickly and easily detect and isolate attacks
·        Respond: laser in on critical alerts and address them with simple to understand security intelligence

Speaker’s Bio:

Andrew is the local Channel Sales Engineer for Sophos. He has 20 years of IT experience in the local Indianapolis market. Prior to Sophos he worked for CDW, Network Solutions, MerchantWired/Simon, and SCT/City of Indianapolis; in pre and post sales engineering, network design, engineering leadership, and management roles.

Andrew lives in the Indianapolis area.  He is a veteran of the US Air Force, CCIE #6641, and a Sophos Certified Engineer.

10:45am - 11:15amSession Four

Marc Doorn 
Consulting Systems Engineer

First line of defense for threats on the internet

Download the Presentation

Speaker’s Bio:

Marc Dorn is a Consulting Systems Engineer on the Cloud Security team at Cisco. He has been in the IT and IT Security field for nearly 25 years. He is very passionate about technology that make networks more secure and productive.  He has been with Cisco for two years. Prior to joining Cisco, Marc held technical positions at Tenable Network Security and WatchGuard Technologies.

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

John Krug
Area Security Specialist – Southeast

Defense in-depth

In this day of risks, vulnerabilities and advanced persistent threats, it’s important to understand why perimeter protection simply just isn’t enough, and why a comprehensive assumed breach methodology ensures the greatest defense.  Ivanti security provides a proactive defense-in-depth approach to protecting ones corporate brand and integrity, reputation, data, devices & users from risks and potential attack. Join us for a discussion about the ever-changing threat landscape and how you can more effectively protect your company from these threats.

 

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Greg Reasner
Account Executive

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

Speaker’s Bio:

Greg Reasner is an Enterprise Account Executive at Zerto, helping clients solve problems focused towards reducing risk and exposure to an organization’s treasured data sets with business continuity through Zerto’s platform.  Zerto’s award-winning solution provides enterprises with continuous data replication & recovery designed specifically for virtualized infrastructures and hybrid cloud environments.

Greg has 15+ years of experience in information technology covering a wide range of solutions in this time and ultimately focuses towards helping his clients succeed.  He’s based in Indianapolis and manages Indiana, Kentucky and Cincinnati, OH.

1:00pm - 1:30pmSession Seven

Todd O’Boyle
Co-founder and Chief Technology Officer

Attacker Tactics: How to Get Ahead

In this story-based talk, we’ll share examples of how we’ve all been attacked and then, based upon these stories, talk through ways we all can better protect ourselves. You’ll walk out of the talk with a plan you can use to facilitate cybersecurity awareness across your organization, including talking to your executive team about more resources. If you’d like to get ahead of the game, you can download our incident response plan for small and midsize businesses at http://info.strongarm.io/incident-response-plan/.

Download the Presentation

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

Rob Pollock
Arbor Networks Channel Sales

The Impact of DDoS Attacks – The Stakes Have Changed – Are You Prepared??

Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk.  From the Mirai Botnet to the recent Wannacry ransomware attack, see how DDoS attacks are being used as a “smokescreen” for other nefarious activities.

Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.

2:15pm - 2:45pmSession Nine

Michael Bird
Team Lead, Account Executive

Explaining Bitcoins will be the easy part:  Email Borne Attacks and How You Can Defend Against Them

If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes.  If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.

In this session, you’ll learn:

•How your email can be used as an entry point for multiple types of attack
•The damaging impact attacks have on organizations
•Why your employees could be the weakest link in your email security
•How to enhance your email security and thus your overall cyber resilience

Download the Presentation

2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:30pmSession Ten

Scott Taylor
Director of Solutions Engineering

Does Your Time to First Byte Bite?

Join Scott Taylor, Director of Solutions Engineering at Dyn as he provides a high level overview of DNS, the various multi-DNS configurations and how this layer of your infrastructure has everything to do with security. From DDoS to DNS amplification and reflection attacks, it’s all covered including strategies to mitigate, opportunities to architect infrastructure resiliency and tips to improve digital performance.

Download the Presentation

3:30pm - 4:15pmSession Eleven

Joe Marton
Senior Systems Engineer

7 Tips to Prevent Ransomware Attacks on Backup Storage

Download the Presentation

Prize Drawings for All in Attendance
4:15pm - 4:45pmSession Twelve

David Demlow
VP of Product Management and Support

Hyperconvergence and Eliminating Attack Surfaces in the Modern Data Center

Scale Computing’s HC3 architecture eliminates the attack surface associated with the traditional SAN + servers + switches + storage protocols style infrastructure by getting rid of the security holes associated with public data path switches that carry all IO, getting rid of storage protocols that can be mirrored and compromised by anyone that can gain access to that data path, eliminating object files that are easily extracted and copied out, and eliminates the entire SAN management interface that can be compromised as well. By taking the approach Scale Computing has with HC3 and the SCRIBE subsystem, Scale hasn’t just minimized these legacy attack surfaces, they have eliminated them.

Scale Computing’s HC3 architecture eliminates the attack surface associated with the traditional SAN + servers + switches + storage protocols style infrastructure by getting rid of the security holes associated with public data path switches that carry all IO, getting rid of storage protocols that can be mirrored and compromised by anyone that can gain access to that data path, eliminating object files that are easily extracted and copied out, and eliminates the entire SAN management interface that can be compromised as well. By taking the approach Scale Computing has with HC3 and the SCRIBE subsystem, Scale hasn’t just minimized these legacy attack surfaces, they have eliminated them.

Prize Drawings for All in Attendance
4:45pm - 5:15pmSession Thirteen

Dan Lewandowski
Senior Systems Engineer

A MASSIVE RETHINK OF SECURITY

Last year, over $80 billion was spent on cyber security (Gartner), yet 2/3rds of organizations were still breached (Forrester). The reason? 81% of data breaches involved weak, default or stolen passwords (Verizon).

Join us to learn why current threats and today’s hybrid IT environment require changes to old security models and how Identity Services defends your organization against the most common cyberattacks.

We’ll examine:

  • The current (broken) state of security and the role identity plays in cyber attacks
  • The massive rethink underway that redefines security to follow identity
  • How identity services reduce the risk of breaches by over 50%
  • How <partner> and Centrify uniquely help reduce risk through the power of identity services

Download the Presentation

Prize Drawings for All in Attendance

Sponsors