September 7 @ 8:15 am - 5:00 pm
The Oklahoma City Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Keep Ransomware Out. How you can stop ransomware and exploits before they strike
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence
Sr. Systems Engineer
The Game Has Changed…Ready or Not
Cybersecurity is constantly evolving to keep up with unmanaged and non-traditional devices as they continue to expand the attack surface of enterprise networks. In this presentation, Mr. Lee will describe five major trends that are changing the threat landscape in 2017 and recap Frost and Sullivan survey results regarding IT staff perceptions about their level of preparation, security tool effectiveness and ability to automate security controls. Key topics will include how to discover, classify and assess networked devices; applying network controls; and implementing the latest integration technologies to orchestrate information sharing and automate workflows among third-party security tools.