March 2 @ 8:15 am - 3:30 pm
The Jacksonville Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Your fate will be determined by your speed of detection & response
Disaster Happens; Don’t be Held Hostage
As a Sales Engineer, Matt facilitates sales with deep technical knowledge as well as provides demonstrations and trainings to partners. He has significant experience with installations of the Carbonite Server product, MailStore and the new E2 appliance. Matt is a technical resource that assists all moving parts of the sales organization with the various Carbonite products
Director – Partners & Soultions Engineering
A New Way to Look at IT Security with Endpoint Modeling
Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling results and visibility into all network Endpoint behavior. With great accuracy, extremely low noise, and supporting evidence, endpoint modeling discovers and tracks the regular behavior of each device in a way that makes possible the automatic recognition of potentially harmful activities. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others.
Enterprise Sales North Florida
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Chris Pepe has been in the IT Industry since 1999 beginning his career at EMC as a Sales Associate. He quickly moved into commercial sales after a few years he joined Brocade (McDATA) to manage the state of Florida and eventually South America as well, after seven years he would join his first start up at COPAN. While working at COPAN Chris would round out his experience within the storage data center, understand storage, backups, DR and the network devises behind it. After COPAN Chris joined Consonus now Datalink gaining valuable sales experience as a value added reseller. Chris has spent the last four years at IBM supporting and selling with partners in the Southeast for the Analytics SW brand, Chris joined Zerto in 2017 to run sales for Northern Florida. He currently lives in Tampa, Florida, he is a father and husband as well as an avid fan of the Tampa Bay Buccaneers and Florida State Seminoles.
Central Region Channel Sales
The Impact of DDoS Attacks
Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk.
Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.
There Will be Attacks – Improve your Email Defenses
If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes. If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Territory Sales Engineer
Transform Your Security: Protect Your Organization. Enable the Business
- Discover how next-generation vulnerability management can help you see and understand assets and threats never visible before.
- Assets and vulnerabilities appear and disappear within seconds. See unknown and shadow assets and eliminate vulnerability blind spots.
- Gain critical context – a deeper, real-time prioritized scope and understanding of which corrective actions to take first and why they’re important.
Regional Threat Prevention Expert – South
Stemming the Ransomware Tide
Ransomware – it’s a dirty word everywhere you go. So what do we do about it? Join us to learn how multiple layers of security and a prevention mechanism are key components of a holistic solution for defeating this epidemic.
Information Security professional with over a decade of experience across multiple industries, such as Finance, Telecom, and Critical Infrastructure. Specific focus and expertise pertaining to zero-day, advanced malware, and APT campaigns, as well as solutions to protect against them.
Director of Solutions Engineering
Does Your Time to First Byte Bite?
Scott Taylor is the Director of Solutions Engineering at Dyn. He has been in the network and application performance space for over 15 years, with the last 4 of those years specializing in DNS and Internet analytics. His customer experience includes working with the top banks, social media companies and ecommerce sites.