Loading Events

« All Events

  • This event has passed.

Milwaukee (Cybersecurity)

September 22, 2016 @ 8:00 am - 2:30 pm

Event Navigation

Details

Date:
September 22, 2016
Time:
8:00 am - 2:30 pm
Event Category:

Venue

Hyatt Regency Milwaukee
333 West Kilbourn Avenue
Milwaukee, WI 53203
United States
  + Google Map
Phone:
+1 414 276 1234
Website:
http://milwaukee.hyatt.com/en/hotel/home.html

Overview

The Milwaukee Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am-8:45am Check-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am-9:15am Session One

Chris Schreiber
Channel Systems Engineers

Finding the RIGHT Needle in a Field of Haystacks

Organizations face many challenges when hunting for malicious activity in their computing environments.  Advances in storage and computing enable big data approaches to mine enterprise logs for signs of evil.  In this presentation, we discuss a security practitioner’s view of the benefits and limitations of security detection and analytics tools and how organizations can reduce their risk from cyberattacks.

Speaker Bio: 

Chris Schreiber is a Consulting Systems Engineer with FireEye.  Chris has nearly 20 years of IT and information security experience across the higher education/research, IT managed services, and financial services industries, including more than 8 years leading information security programs. Before joining FireEye, Chris was the CISO and HIPAA Security Officer at the University of Arizona where he was responsible for all aspects of information security across a decentralized $2 billion enterprise with more than 15,000 employees and supporting more than 42,000 students.  Chris held prior information security and IT leadership positions with SunGard Data Systems, the University of Wisconsin, and Central Michigan University.

9:15am-9:45am Session Two

Richard Conley
Sales Engineer

The Modern Cyber Threat Pandemic

According to the 2015 Cyber Defense Report, 71% of organizations were compromised by a successful cyber-attack. The threat is real!  It’s no longer a matter of IF, but WHEN. In this session, LogRhythm Sales Engineer Richard Conley will discuss the Security Intelligence Maturity Model (SIMM). Organizations can leverage the SIMM to drive security budgets by measuring the effectiveness of an organization’s security capabilities around Mean-Time-to-Detect™ (MTTD™) and Mean-Time-to-Respond™ (MTTR™).  Deliver the right information, at the right time, with the appropriate context, to significantly decrease the amount of time it takes to detect, respond to and neutralize damaging cyber threats.

9:45am-10:15am Break/Vendor Booth Time
10:15am-10:45am Session Three

Mike Pearson
Sales Engineer

Defending against modern malware

Cyber-attacks once were mainly the concern of governments, large corporations and other highly visible networks. Not anymore. The financial rewards generated from the theft of credit card information and other sensitive data gave rise to a new breed of malware, the polymorphic threat, and with it, the amount of malware has skyrocketed.

 Most of today’s malware is polymorphic and highly adept at changing its identity to evade standard, signature-based security platforms. Alone, these platforms will not recognize many of these threats.  Advanced persistent threats, or APTs, increase the threat level by employing sophisticated evasion capabilities to get payloads past a network’s defenses where they persist, undetected. APTs are targeted to an organization or a specific technology and often leverage zero day vulnerabilities – flaws for which no patch is available and no signature has been written. Any organization can become a victim.

10:45am-11:30am Session Four

Jeff Engel
Security Engineer

Preventing Zero Day and Advanced Malware Attacks from Entering your Organization

Attackers have become more creative in how they reach corporate resource.  With the adoption of Cloud technologies there is no longer a defined network border.  We must enable prevention technologies in more places and work diligently to Prevent threats from entering the organization.  In this session, Check Point will discuss how their SandBlast solution provides a comprehensive approach to proactively stop Ransonmware, Botnets, Advanced Persistent Threats (APTs) and Zero-Day attacks from infiltrating the organization.

11:30am-12:00am Break/Vendor Booth Time/Lunch
12:00pm-12:30pmSession Five

Gary Woods
Director of Cyber Security Solutions

Disruptive Technology that Reduces Cyber Defense Complexity & Accelerates Investigation 

In this session we will cover the challenges involved with responding to cyber alerts, skills gap in cyber security and what you can do to address these and other challenges. Also, if you are looking at building a SOC, this presentation will show what functional areas you need to address.

Download the Presentation

12:30pm-12:45pm Break/Vendor Booth Time
12:45pm-1:15pm Session Six

Larry Herzog Jr., CISSP
Channel Sales Engineer – Sophos

Ransomware

Ways to help mitigate ransomware with best practices, polices, and technology.

1:15pm-1:45pm Session Seven

JR Jones
Sales Engineer

Network Access Control (NAC) 101

Friend or Foe?

Mobile devices, cloud technology, IoT and virtual work alternatives have changed how organizations operate. With over 21 billion new devices accessing networks by 2020 according to Gartner, how can organizations prepare today for the increase in devices without undermining the security posture?

A strong perimeter defense no longer offers complete protection. Organizations need to address the entire security lifecycle to adequately protect digital assets and intellectual property, even as network access grows. This presentation will address the evolving security threat landscape, cover the three critical keys to network security – visibility, control and automated response, and provide tips and best practices to shrink your attack surface and secure your network now and for the future. 

1:45pm - 2:00pmBreak / Vendor Booth Time
2:00pm - 2:30pmSession Eight

Shannon Fritz

Naked and Vulnerable: A Cybersecurity Starter Kit

An Introductory Guide for business that are looking to improve their security stance, but don’t really know where to begin.   This session will outline some fundamentals that you can take immediate actions on as well as some considerations for next steps.  When your starting point is feeling naked and vulnerable, sometimes it can be a big comfort to just put on your undies and a t-shirt.

Objectives:

  • See where small changes can make big improvements to your security stance
  • Learn where the low-hanging fruit of vulnerabilities are
  • Take home a list of improvement areas to get started with

Speaker Bio:

Shannon Fritz is a Microsoft MVP for Enterprise Security and is the Solutions Architect at Concurrency, Inc.; a Systems Integrator consulting firm focused entirely on Microsoft solutions. Shannon holds an array of Microsoft Certifications, specializing in Mobility, Windows Server platform solutions and Microsoft Cloud Services. Shannon has also been a technical reviewer for books focused on DirectAccess and Hyper-V best practices.

Prize Drawings for All in Attendance

Sponsors