- This event has passed.
July 6, 2017 @ 8:15 am - 2:45 pm
The Milwaukee Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech-Security Strategies Conference.
Regional Sales Director
Unifying data protection, leveraging the power of the cloud
Joey Kilaita, Regional Sales Director, Chicago, grew up in the Druva HQ since it’s beginning stages. When Druva opened up a position in his hometown of Chicago he couldn’t resist. His expertise is around the mobile Enterprise, specifically around governance, data collection, and restore and led him to the top of the sales team within Druva. He and Bob Pawloski (Sales Engineer) cover IL, IN, WI, MI, MO, MN, and IA. He is a huge San Jose Sharks and Golden State Warriors fan, so bonus points if you can relate!
5 Obstacles to Faster Cyber Threat Detection and Response
Globally, sophisticated cyber-attacks are compromising organizations at an unprecedented rate and with devastating consequences. These attacks are often very expensive for compromised organizations, costing each company an average of $7.7M.
A new approach is required. Traditionally, prevention-centric strategies have been employed to block attacks. However, many of today’s advanced, motivated threat actors are circumventing these defenses.
This presentation introduces the concept of threat lifecycle management (TLM)—a fundamental end-to-end detection and response workflow for security operations centers (SOCs).
TLM is a series of aligned SecOps capabilities and processes that begins with the ability to see broadly and deeply across your entire IT environment and ends with the ability to quickly mitigate and recover from a security incident.
How to stop Zero day phishing attacks without a Zero day patient.
In response to the dramatic increase in Targeted Spear Phishing and Credential Phishing attacks Menlo Security has developed isolation capabilities that completely prevent phishing attacks that legacy detection solutions cannot combat. Gartner has stated “Evaluate and pilot a remote browser solution in 2017 as one of the single most significant ways an enterprise can reduce the ability of web-based attacks on users to cause damage.” Menlo changes the symmetry of phishing attacks by leveraging link isolation which “renders” zero-day phishing attacks obsolete. Menlo will demonstrate how Menlo Security “link isolated” users are 100% safe from zero-day phishing attacks.
Channel Sales Engineer for Wisconsin, Iowa, & Nebraska
Next-Gen Endpoint Protection
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence
Endpoint and DataCenter Security
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Paul is an Account Executive at Zerto helping clients solve problems focused towards reducing risk and exposure to an organization’s treasured data sets with business continuity through Zerto’s platform. Zerto’s award-winning solution provides enterprises with continuous data replication & recovery designed specifically for virtualized infrastructures and cloud environments.
Paul has 27 years of experience in information technology covering a wide range of solutions in this time and ultimately focuses towards helping his clients succeed. He’s based in Madison and supports the great state of Wisconsin!
The Impact of DDoS Attacks – The Stakes Have Changed – Are You Prepared??
Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk. From the Mirai Botnet to the recent Wannacry ransomware attack, see how DDoS attacks are being used as a “smokescreen” for other nefarious activities.
Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.
Regional Systems Engineer
Stop Cyber Threats With Adaptive Micro-Segmentation
Virtualization, the cloud, and the promise of containers have evolved the data center, bringing better application delivery and cost reduction. With these benefits come new risks that include increased East/West traffic and the potential for new cyber threats. Adaptive micro-segmentation is transforming and improving security inside the data center and clouds while speeding up app delivery.
In this session you’ll learn:
– How adaptive micro-segmentation enables security anywhere (on premises, AWS, Azure, etc.) on anything (bare metal, vSphere/KVM/XEN, containers), while eliminating app delivery delays caused by traditional security approaches.
– How customers are using adaptive micro-segmentation to instantly protect high-value apps, separate dev from prod with one rule, take existing security policies to the cloud, and more.
– How live visibility of application traffic and dependencies is making security dead simple for IT operations and security teams.
As Regional Systems Engineer at Illumio, Jeff Francis provides engineering and technical support in myriad ways. He works closely with customers needing assistance, advice, and training in architecture, integration, and the state of the security landscape. He has over 25 years of professional experience in the IT field, with a focus on software development, devops, Linux systems administration, device drivers, embedded systems design, network architecture, and network and computer security. He has worked most of the last 15 years as a Security Engineer for various large security vendors.