Loading Events

« All Events

  • This event has passed.

Kansas City (Cybersecurity)

September 21, 2017 @ 8:15 am - 5:15 pm

Event Navigation


September 21, 2017
8:15 am - 5:15 pm
Event Category:


DoubleTree by Hilton Kansas City – Overland Park
10100 College Blvd.
Overland Park, KS 66210
United States
  + Google Map


The Kansas City Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Ted Gruenloh

Threat Intelligence and Layered Security in the WannaCry Era

The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.

9:15am - 9:45amSession Two

Lajos Mottel
Sales Engineer

Leveraging Machine Analytics to Reduce Risk

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Sean Griesheimer
Systems Engineer

Business-Driven Security: A New Plan for Chaos

We will discuss how and why key-business drivers shape your security operations. We go beyond the guidance provided by NIST, and take a look at Risk Management, Threat Intelligence, Incident Workflow & Classification, Staffing Models, Use Cases & Prioritization, Escalation Plans, Security Controls, and Key Performance Indicators.

Download the Presentation

Speaker’s Bio:

Sean comes from a vast background in financial planning, analysis, GRC, and Security.  Sean’s hands on experience as both a practitioner and a security engineer have proven to be tremendous assets for his colleagues and customers.  His abilities to connect across industry and organizations give him a leg up when engaged in those difficult cyber conversations.  Sean is currently completing his CISSP, CSA and numerous other Security certifications.  In addition, Sean is deeply embedded in the Kansas City technology community where you are likely to find him at ISC2 and ISSA events in his free time.

10:45am - 11:15amSession Four

Tom Winburn, GCIH
Security Consulting Systems Engineer

Network and Security, how to mix oil and water

Speaker’s Bio:

Tom Winburn is the Consulting Systems Engineer for Cisco’s Security Portfolio covering Enterprise customers in the midwest. With over 18 years of experience in IT ranging from Layer 1 networking to Network Engineering eventually to Cybersecurity Operations and Engineering, penetration testing, incident response. He is well versed in various aspects of Enterprise security challenges. He has worked in various business segments including DoD, Telecom, and other IT based companies. His credentials include a Masters Degree in Cybersecurity, and is a GIAC Certified Incident Handler (GCIH)

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Eric Pierron
Systems Engineer

Securing the Digital Workplace

Cyber Threats are only increasing.  Attackers are shifting their tactics as we shift our security strategies.  Join us for a discussion about the every changing threat landscape and how you can more effectively protect your company from these threats.  In this session we will talk about how cyber threats have increased in 2016, where attackers are shifting to, and what industry experts are recommending to address these shifts.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:15pmSession Six

Mike Motta

Securing your Company’s Assets with Packets

Download the Presentation

1:15pm - 1:45pmSession Seven

Kelly Lipprand
Sales Engineer

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

1:45pm - 2:00pmBreak / Vendor Booth Time
2:00pm - 2:30pmSession Eight

Rob Pollock
Central Region Channel Sales

The Impact of DDoS Attacks – The Stakes Have Changed – Are You Prepared??

Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk.  From the Mirai Botnet to the recent Wannacry ransomware attack, see how DDoS attacks are being used as a “smokescreen” for other nefarious activities.

2:30pm - 3:00pmSession Nine

Rob Cheng

Defeating Ransomware

In today’s threat landscape, new forms of malware are taking their toll on business and government agencies, crippling those organizations by victimizing users in a number of ways. In this session, PC Pitstop’s CEO, Rob Cheng, discusses the growing ransomware epidemic, the best practices to utilize in defense, and where in the world these practices are best utilized.

Download the Presentation

3:00pm - 3:15pmBreak / Vendor Booth Time
3:15pm - 3:45pmSession Ten

Duke Butler
Sr. Director Cloudpath and Global Alliances

Cloudpath:  Security starts with secure access

Join us for a discussion about secure device access and how Ruckus addresses secure access ranging from K-12 to Smart City solutions. Also, learn the basics of secure access in both wired and wireless environments.

Download the Presentation

3:45pm - 4:15pmSession Eleven

Marcus Weers
Solution Engineer

Next Generation Endpoint Protection – What you need to know

In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.

4:15pm - 4:45pmSession Twelve

Matt McCarty
Channel Account Manager

A Massive Rethink of Security

Last year, over $80 billion was spent on cyber security (Gartner), yet 2/3rds of organizations were still breached (Forrester). The reason? 81% of data breaches involved weak, default or stolen passwords (Verizon).

Join us to learn why current threats and today’s hybrid IT environment require changes to old security models and how Identity Services defends your organization against the most common cyberattacks.

We’ll examine:

·        The current (broken) state of security and the role identity plays in cyber attacks
·        The massive rethink underway that redefines security to follow identity
·        How identity services reduce the risk of breaches by over 50%
·        How <partner> and Centrify uniquely help reduce risk through the power of identity services

Prize Drawings for All in Attendance
4:45pm - 5:15pmSession Thirteen

Daniel Clark
Senior Security Analyst


Keep Ransomware Out.  How you can stop ransomware and exploits before they strike

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

  • Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
  • Detect: quickly and easily detect and isolate attacks
  • Respond: laser in on critical alerts and address them with simple to understand security intelligence

Speaker’s Bio:

As a Senior Security Analyst with Sophos Dan is responsible for consulting with partners and customer throughout North America.  Dan joined Sophos in 2014

Dan has been working in the Information Technology for over thirty years and specializes in network, endpoint and mobile security.  He has consulted to numerous fortune 500 companies throughout the world.

Dan began his information security career as a member of the United State Navy where he was responsible for maintaining ship-based encryption devices used to secure communication between naval aircraft.

Dan studied Business Management at Maryville University in St. Louis, MO.

Prize Drawings for All in Attendance