- This event has passed.
September 22, 2016 @ 8:00 am - 2:30 pm
The Milwaukee Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Channel Systems Engineers
Finding the RIGHT Needle in a Field of Haystacks
Organizations face many challenges when hunting for malicious activity in their computing environments. Advances in storage and computing enable big data approaches to mine enterprise logs for signs of evil. In this presentation, we discuss a security practitioner’s view of the benefits and limitations of security detection and analytics tools and how organizations can reduce their risk from cyberattacks.
Chris Schreiber is a Consulting Systems Engineer with FireEye. Chris has nearly 20 years of IT and information security experience across the higher education/research, IT managed services, and financial services industries, including more than 8 years leading information security programs. Before joining FireEye, Chris was the CISO and HIPAA Security Officer at the University of Arizona where he was responsible for all aspects of information security across a decentralized $2 billion enterprise with more than 15,000 employees and supporting more than 42,000 students. Chris held prior information security and IT leadership positions with SunGard Data Systems, the University of Wisconsin, and Central Michigan University.
The Modern Cyber Threat Pandemic
According to the 2015 Cyber Defense Report, 71% of organizations were compromised by a successful cyber-attack. The threat is real! It’s no longer a matter of IF, but WHEN. In this session, LogRhythm Sales Engineer Richard Conley will discuss the Security Intelligence Maturity Model (SIMM). Organizations can leverage the SIMM to drive security budgets by measuring the effectiveness of an organization’s security capabilities around Mean-Time-to-Detect™ (MTTD™) and Mean-Time-to-Respond™ (MTTR™). Deliver the right information, at the right time, with the appropriate context, to significantly decrease the amount of time it takes to detect, respond to and neutralize damaging cyber threats.
Defending against modern malware
Cyber-attacks once were mainly the concern of governments, large corporations and other highly visible networks. Not anymore. The financial rewards generated from the theft of credit card information and other sensitive data gave rise to a new breed of malware, the polymorphic threat, and with it, the amount of malware has skyrocketed.
Most of today’s malware is polymorphic and highly adept at changing its identity to evade standard, signature-based security platforms. Alone, these platforms will not recognize many of these threats. Advanced persistent threats, or APTs, increase the threat level by employing sophisticated evasion capabilities to get payloads past a network’s defenses where they persist, undetected. APTs are targeted to an organization or a specific technology and often leverage zero day vulnerabilities – flaws for which no patch is available and no signature has been written. Any organization can become a victim.
Preventing Zero Day and Advanced Malware Attacks from Entering your Organization
Attackers have become more creative in how they reach corporate resource. With the adoption of Cloud technologies there is no longer a defined network border. We must enable prevention technologies in more places and work diligently to Prevent threats from entering the organization. In this session, Check Point will discuss how their SandBlast solution provides a comprehensive approach to proactively stop Ransonmware, Botnets, Advanced Persistent Threats (APTs) and Zero-Day attacks from infiltrating the organization.
Director of Cyber Security Solutions
Disruptive Technology that Reduces Cyber Defense Complexity & Accelerates Investigation
In this session we will cover the challenges involved with responding to cyber alerts, skills gap in cyber security and what you can do to address these and other challenges. Also, if you are looking at building a SOC, this presentation will show what functional areas you need to address.
Larry Herzog Jr., CISSP
Channel Sales Engineer – Sophos
Ways to help mitigate ransomware with best practices, polices, and technology.
Network Access Control (NAC) 101
Friend or Foe?
Mobile devices, cloud technology, IoT and virtual work alternatives have changed how organizations operate. With over 21 billion new devices accessing networks by 2020 according to Gartner, how can organizations prepare today for the increase in devices without undermining the security posture?
A strong perimeter defense no longer offers complete protection. Organizations need to address the entire security lifecycle to adequately protect digital assets and intellectual property, even as network access grows. This presentation will address the evolving security threat landscape, cover the three critical keys to network security – visibility, control and automated response, and provide tips and best practices to shrink your attack surface and secure your network now and for the future.
Naked and Vulnerable: A Cybersecurity Starter Kit
An Introductory Guide for business that are looking to improve their security stance, but don’t really know where to begin. This session will outline some fundamentals that you can take immediate actions on as well as some considerations for next steps. When your starting point is feeling naked and vulnerable, sometimes it can be a big comfort to just put on your undies and a t-shirt.
- See where small changes can make big improvements to your security stance
- Learn where the low-hanging fruit of vulnerabilities are
- Take home a list of improvement areas to get started with
Shannon Fritz is a Microsoft MVP for Enterprise Security and is the Solutions Architect at Concurrency, Inc.; a Systems Integrator consulting firm focused entirely on Microsoft solutions. Shannon holds an array of Microsoft Certifications, specializing in Mobility, Windows Server platform solutions and Microsoft Cloud Services. Shannon has also been a technical reviewer for books focused on DirectAccess and Hyper-V best practices.