Loading Events

« All Events

  • This event has passed.

Minneapolis

June 8 @ 8:15 am - 4:30 pm

Event Navigation

Details

Date:
June 8
Time:
8:15 am - 4:30 pm

Venue

Radisson Blu Minneapolis Downtown
35 South 7th Street
Minneapolis,MN55402United States
+ Google Map
Phone:
1-612-339-4900
Website:
https://www.radissonblu.com/en/hotel-minneapolis

Download PDF Directory

Overview

The Minneapolis Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Joey Kilaita
Regional Sales Director, Midwest

Unifying data protection, leveraging the power of the cloud

Download the Presentation

Speaker’s Bio:

Joey Kilaita, Regional Sales Director, Chicago, grew up in the Druva HQ since it’s beginning stages.  When Druva opened up a position in his hometown of Chicago he couldn’t resist. His expertise is around the mobile Enterprise, specifically around governance, data collection, and restore and led him to the top of the sales team within Druva. He and Bob Pawloski (Sales Engineer) cover IL, IN, WI, MI, MO, MN, and IA. He is a huge San Jose Sharks and Golden State Warriors fan, so bonus points if you can relate!

9:15am - 9:45amSession Two

Troy Whitney
Sr. Solutions Engineer

Improving Resilience and Performance in Light of Recent Internet Outages

We’ll discuss recent outages that impacted Amazon’s S3 file storage service (Feb 2017) and Dyn’s DNS service (Oct 2016). Presenting application and network performance data from each event, we review key indicators and how they tie to the ultimate outage diagnosis. We’ll then follow up with tips on improving resiliency and performance of Internet-connected services in light of these outages.

Download the Presentation

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Ben Ellering
Channel Sales Engineer

Stopping Ransomware at the Door (and every other threat)

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

·        Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
·        Detect: quickly and easily detect and isolate attacks
·        Respond: laser in on critical alerts and address them with simple to understand security intelligence

Speaker’s Bio:

Previous to Sophos, Ben worked at Fortinet, SonicWALL, and was a lead network Engineer for over 11 years. His biggest project there was becoming one of the first companies to become PCI level 2 certified in the industry. He has now been with Sophos for 3.5 years as a Channel Sales Engineer.

10:45am - 11:15amSession Four

Derek Nash
Solutions Engineer

The Art of Detection – Conquering the Six Stages of an Attack

While initial network penetration is quick and difficult to detect, attackers perform a series of actions once they’re inside the network, offering a window of opportunity for detection early in the attack life-cycle. This gives enterprise defenders a chance to act quickly to stop or minimize business impact. Doing threat lifecycle management effectively takes a mix of mature security processes, analyst skills, and “force multiplier” tools. In this session, you’ll learn:

– More in-depth details at the six stages of the attack lifecycle

– How to avoid the pitfalls that cause network infiltration detection to fail

– An effective approach for accurate detection throughout the entire attack lifecycle, not just at infiltration

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Shane Westrup

Making Information Security Manageable with GRC

Download the Presentation

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Adam Cederstrom

Mike Sorenson

Securing the Digital Workplace 

Cyber Threats are only increasing.  Attackers are shifting their tactics as we shift our security strategies.  Join us for a discussion about the every changing threat landscape and how you can more effectively protect your company from these threats.  In this session we will talk about how cyber threats have increased in 2016, where attackers are shifting to, and what industry experts are recommending to address these shifts.

1:00pm - 1:30pmSession Seven

Matthew Gardiner
Senior Product Marketing Manager

Explaining Bitcoins will be the easy part:  Email Borne Attacks and How You Can Defend Against Them

Download the Presentation

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

Richard Pollnow
Sales Engineer

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one.  Backup solutions don’t solve these problems as they are not true disaster recovery for the business.  What types of disasters will impact the business?  Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience.  Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

2:15pm - 2:45pmSession Nine

Rob Pollock
Arbor Networks Channel Sales

The Impact of DDoS Attacks – The Stakes Have Changed – Are You Prepared??

Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk.  From the Mirai Botnet to the recent Wannacry ransomware attack, see how DDoS attacks are being used as a “smokescreen” for other nefarious activities.

Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.

2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:30pmSession Ten

Jeff Francis
Regional Systems Engineer

Stop Cyber Threats With Adaptive Micro-Segmentation 

Virtualization, the cloud, and the promise of containers have evolved the data center, bringing better application delivery and cost reduction. With these benefits come new risks that include increased East/West traffic and the potential for new cyber threats. Adaptive micro-segmentation is transforming and improving security inside the data center and clouds while speeding up app delivery.

In this session you’ll learn:

– How adaptive micro-segmentation enables security anywhere (on premises, AWS, Azure, etc.) on anything (bare metal, vSphere/KVM/XEN, containers), while eliminating app delivery delays caused by traditional security approaches.

– How customers are using adaptive micro-segmentation to instantly protect high-value apps, separate dev from prod with one rule, take existing security policies to the cloud, and more.

– How live visibility of application traffic and dependencies is making security dead simple for IT operations and security teams.

Speaker’s Bio:

As Regional Systems Engineer at Illumio, Jeff Francis provides engineering and technical support in myriad ways. He works closely with customers needing assistance, advice, and training in architecture, integration, and the state of the security landscape. He has over 25 years of professional experience in the IT field, with a focus on software development, devops, Linux systems administration, device drivers, embedded systems design, network architecture, and network and computer security. He has worked most of the last 15 years as a Security Engineer for various large security vendors.

3:30pm - 4:00pmSession Eleven

Scott Taylor
Director of Solutions Engineering

Does Your Time to First Byte Bite?

Join Scott Taylor, Director of Solutions Engineering at Dyn as he provides a high level overview of DNS, the various multi-DNS configurations and how this layer of your infrastructure has everything to do with security. From DDoS to DNS amplification and reflection attacks, it’s all covered including strategies to mitigate, opportunities to architect infrastructure resiliency and tips to improve digital performance.

Download the Presentation

Prize Drawings for All in Attendance
4:00pm - 4:30pmSession Twelve

J. Daniel Culpepper
Director of Sales Engineering

A Blueprint for a Modern Enterprise Security Program

One of the biggest challenges in cyber security today is how to manage the volume, velocity, and complexity of data generated by the myriad of IT security tools. The feeds from these disconnected, siloed tools must be analyzed, normalized, and remediation efforts prioritized. The more tools, the more difficult the challenge. This security model requires legions of staff to comb through huge amounts of data to connect the dots and find the needle in the haystack. These efforts can take months, during which time attackers can exploit vulnerabilities and extract data. Rather than adding more tools, organizations need to implement a new, more efficient enterprise security model.

According to analyst firm Gartner, cyber risk management that uses intelligence-driven analytics can help organizations operationalize cyber security practices, break down silos, and enhance security operations tasks through automation. This presentation explores the emerging discipline of intelligence-driven cyber risk management as a response to the mounting cyber-attacks, advanced persistent threats, and insider leaks. It outlines not only today’s cyber security challenges, but provides practical advice of how to operationalize an organization’s cyber security practices across a growing attack surface.

Download the Presentation

Prize Drawings for All in Attendance

Sponsors