Loading Events

« All Events

  • This event has passed.

Jacksonville (Cybersecurity)

March 2 @ 8:15 am - 3:30 pm

Details

Date:
March 2
Time:
8:15 am - 3:30 pm
Event Category:

Full PDF Agenda

Overview

The Jacksonville Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Brian Emond
Sales Engineer

Your fate will be determined by your speed of detection & response

9:15am - 9:45amSession Two

Matthew Giambrone
Sales Engineer

Disaster Happens; Don’t be Held Hostage

Download the Presentation

Speaker’s Bio:

As a Sales Engineer, Matt facilitates sales with deep technical knowledge as well as provides demonstrations and trainings to partners. He has significant experience with installations of the Carbonite Server product, MailStore and the new E2 appliance. Matt is a technical resource that assists all moving parts of the sales organization with the various Carbonite products

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 11:00amSession Three

John Heintz
Director – Partners & Soultions Engineering

A New Way to Look at IT Security with Endpoint Modeling

Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling results and visibility into all network Endpoint behavior. With great accuracy, extremely low noise, and supporting evidence, endpoint modeling discovers and tracks the regular behavior of each device in a way that makes possible the automatic recognition of potentially harmful activities. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others.

11:00am - 11:30amSession Four

Chris Pepe
Enterprise Sales North Florida

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one.  Backup solutions don’t solve these problems as they are not true disaster recovery for the business.  What types of disasters will impact the business?  Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience.  Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

Speaker’s Bio:

Chris Pepe has been in the IT Industry since 1999 beginning his career at EMC as a Sales Associate.  He quickly moved into commercial sales after a few years he joined Brocade (McDATA) to manage the state of Florida and eventually South America as well, after seven years he would join his first start up at COPAN. While working at COPAN Chris would round out his experience within the storage data center, understand storage, backups, DR and the network devises behind it. After COPAN Chris joined Consonus now Datalink gaining valuable sales experience as a value added reseller.  Chris has spent the last four years at IBM supporting and selling with partners in the Southeast for the Analytics SW brand, Chris joined Zerto in 2017 to run sales for Northern Florida.  He currently lives in Tampa, Florida, he is a father and husband as well as an avid fan of the Tampa Bay Buccaneers and Florida State Seminoles.

11:30am - 12:00pmBreak / Vendor Booth Time/Lunch
12:00pm - 12:30pmSession Five

Rob Pollock
Central Region Channel Sales

The Impact of DDoS Attacks

Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk.

Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.

12:30pm - 12:45pmBreak / Vendor Booth Time
12:45pm - 1:15pmSession Six

David Hood
Director, Technology & Marketing

There Will be Attacks – Improve your Email Defenses

If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes.  If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.

In this session, you’ll learn:

  • How your email can be used as an entry point for multiple types of attack
  • The damaging impact attacks have on organizations
  • Why your employees could be the weakest link in your email security
  • How to enhance your email security and thus your overall cyber resilience

Download the Presentation

1:15pm - 1:45pmSession Seven

Ron Mullins
Sales Engineer

Transform Your Security: Protect Your Organization. Enable the Business

  • Discover how next-generation vulnerability management can help you see and understand assets and threats never visible before.
  • Assets and vulnerabilities appear and disappear within seconds. See unknown and shadow assets and eliminate vulnerability blind spots.
  • Gain critical context – a deeper, real-time prioritized scope and understanding of which corrective actions to take first and why they’re important.
1:45pm - 2:00pmBreak / Vendor Booth Time
2:00pm - 2:45pmSession Eight

Jerrod Piker
Regional Threat Prevention Expert – South

 

Stemming the Ransomware Tide

Ransomware – it’s a dirty word everywhere you go. So what do we do about it? Join us to learn how multiple layers of security and a prevention mechanism are key components of a holistic solution for defeating this epidemic.

Download the Presentation

Speaker’s Bio:

Information Security professional with over a decade of experience across multiple industries, such as Finance, Telecom, and Critical Infrastructure. Specific focus and expertise pertaining to zero-day, advanced malware, and APT campaigns, as well as solutions to protect against them.

2:45pm - 3:00pmBreak / Vendor Booth Time
Prize Drawings for All in Attendance
3:00pm - 3:30pmSession Nine

Scott Taylor 
Director of Solutions Engineering

Does Your Time to First Byte Bite?

Speaker’s Bio:

Scott Taylor is the Director of Solutions Engineering at Dyn.  He has been in the network and application performance space for over 15 years, with the last 4 of those years specializing in DNS and Internet analytics.  His customer experience includes working with the top banks, social media companies and ecommerce sites.

Prize Drawings for All in Attendance

Sponsors