September 7 @ 8:15 am - 5:15 pm
The Oklahoma City Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Keep Ransomware Out. How you can stop ransomware and exploits before they strike
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence
Sr. Systems Engineer
The Game Has Changed…Ready or Not
Cybersecurity is constantly evolving to keep up with unmanaged and non-traditional devices as they continue to expand the attack surface of enterprise networks. In this presentation, Mr. Lee will describe five major trends that are changing the threat landscape in 2017 and recap Frost and Sullivan survey results regarding IT staff perceptions about their level of preparation, security tool effectiveness and ability to automate security controls. Key topics will include how to discover, classify and assess networked devices; applying network controls; and implementing the latest integration technologies to orchestrate information sharing and automate workflows among third-party security tools.
Director of Security and Network Transformation
Holy Jurassic Security: Top 10 Signs Your Network & Security Architecture Might Be Nearing Extinction!
If you are totally happy with what you have built (said no real engineer ever), then this session is for your replacement. But if you are always looking to build the best network and security out there, then this session may very well change your life…or at least give you a leg up in your personal performance plan for the next year or two.
Kevin Peterson is the director of security and network transformation at Zscaler, where he primarily works with the largest cloud security deployments to ensure that the desired business objectives are achieved. He brings with him the advantage of having lead the security efforts for one of McKesson’s (Fortune 10) major business units (75 software products, managed services…), as well as the company-wide cloud security strategy, ranging from A to Z (Azure to Zscaler!). As a top practitioner and trusted advisor on both enterprise and cloud security topics, his goal is helping everyone achieve the most effective security with the lowest cost to the business. He is also a featured speaker on the Security Influencers Podcast (available on iTunes), co-author of one information security book, and patent holder on security technologies. And, of course, maintains a presence in the metro Atlanta information security community.