- This event has passed.
July 12 @ 8:15 am - 4:30 pm
The Orlando Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech-Security Strategies Conference.
Cloud Security Sales Manager – South Region
Safe Journey to the Cloud
Companies are looking to modernize existing business applications to improve agility, performance, and sometimes recognize cost savings by moving workloads to the cloud. Experience shows that security is often neglected or viewed as an inhibitor as customers struggle with loss of control, consistency and compliance. In this presentation Eric Meadows, a Cloud Security Champion from Check Point, will provide insight into cloud adoption, provide four simple steps every company should be taking to secure “any” cloud and share the four shared characteristics he sees in successful cloud deployments with customers.
Eric Meadow is a Cloud Security Champion at Check Point chartered with helping customers and partners make the most of their cloud journey in a secure manner.
He is a former CIO and has successfully built and exited two companies. Eric has over 20 years in IT with experience in sales, architecture, engineering, consulting, project management and engineering at Nortel, Cisco and Verizon among others.
He holds numerous certifications, studied Computer Science at West Georgia College and MIS at Kennesaw State College.
Senior Sales Executive
Securing your organization and containing the insider threat
Despite increasing investment in the cybersecurity market, we continue to see a rise in data breaches and their related costs, specifically those relating to the insider threat (accidental loss and malicious insider). Despite these types of incidents contributing approximately 50% of all breaches, CIO focus remains on the external threat.
In this presentation, we will question whether a new approach to data security needs to be applied: one that recognizes data security can’t be tackled in silo and instead a holistic more strategic approach must be taken to protect and secure data throughout its lifecycle in order to contain the insider threat.
Disaster Happens – Don’t Be Held Hostage
Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest additions to their arsenal – EVault & DoubleTake. We’ll also cover best practices for backing up your data and how you can take your defenses to the next level with DRaaS.
Security Awareness Advocate
Surviving Social Engineering and Ransomware Attacks
Throwing money at a problem doesn’t make it go away. Social engineering methods and the ‘evil genius” cyber criminals behind the attacks are furiously innovating, keeping IT off-guard.
Attackers are moving their focus from attacking the hardened network perimeter to attacking your users. This has made Ransomware and CEO Fraud incidents skyrocket, costing billions of dollars in losses.
How do you keep up and what are the most effective methods for securing your organization to combat cybercrime? This presentation will cover the ransomware and CEO Fraud epidemics and proven methods of protecting your organization against these phishing-based attacks, like creating a “human firewall”.
Product Marketing Manager
Explaining Bitcoins will be the easy part: Email Borne Attacks and How You Can Defend Against Them
If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes. If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Senior Systems Engineer, Threat Detection & Response
Evolved Requirements: A business-driven security strategy for threat detection & response.
Security teams need to evolve to stay in front of attackers and the latest threats, but in recent years this has become much more difficult. Attackers continue to advance and use sophisticated techniques to target and infiltrate organizations while spending significant resources performing reconnaissance to develop techniques specifically designed to bypass the security tools being used. Complicating this, most organizations no longer have well defined perimeters as they shift to more modern IT infrastructures that include a variety of environments some on premise, some in the cloud. Finally, to add even more challenges, security teams suffer from a skills gap that make it difficult to fully staff a team and even more difficult when they add more and more security tools and devices that only add to the noise for the staff trying to find the truly significant attacks.
Given these challenges, we see a mindshift occurring within the organizations running sophisticated security operations. Specifically a shift in focus on preventative controls that promise to keep the bad guys out to an increased focus on rapid detection and response, to shorten the dwell time and reduce or even prevent business damage when breaches occur. In simple terms, these organizations recognize it’s no longer feasible to think you can prevent all attacks from getting in.
In order reduce the impact of attacks, security operations needs to be able to tie critical asset and identity information into both the detection and response capabilities, so they can focus their efforts on the threats that matter most.
Sr. Sales Engineer, IT Security
In this day of risks, vulnerabilities and advanced persistent threats, it’s important to understand why perimeter protection simply just isn’t enough, and why a comprehensive assumed breach methodology ensures the greatest defense. Ivanti security provides a proactive defense-in-depth approach to protecting ones corporate brand and integrity, reputation, data, devices & users from risks and potential attack. Join us for a discussion about the ever-changing threat landscape and how you can more effectively protect your company from these threats.
Director of Solutions Engineering
Does Your Time to First Byte Bite?
Join Scott Taylor, Director of Solutions Engineering at Dyn as he provides a high level overview of DNS, the various multi-DNS configurations and how this layer of your infrastructure has everything to do with security. From DDoS to DNS amplification and reflection attacks, it’s all covered including strategies to mitigate, opportunities to architect infrastructure resiliency and tips to improve digital performance.
The Impact of DDoS Attacks – The Stakes Have Changed – Are You Prepared??
Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk. From the Mirai Botnet to the recent Wannacry ransomware attack, see how DDoS attacks are being used as a “smokescreen” for other nefarious activities.
Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.
Senior Systems Engineer
802.11ax: What’s Next in Wi-Fi
With the rapid evolution of Wi-Fi technologies to accommodate new bandwidth challenges, 802.11ac Wave 2 the firm favorite amongst organizations hitting their refresh cycles is finding itself being overshadowed with talks of 802.11ax on the horizon.
In this session, we will provide the background and context you need to understand the features, benefits, and positioning of 802.11ax, what it means to organizational users, why it will eventually achieve dominance, and – very importantly – when.
Aerohive enables our customers to simply and confidently connect to the information, applications, and insights they need to thrive. Our simple, scalable, and secure platform delivers mobility without limitations. For our customers worldwide, every access point is a starting point.
Richard Hector, serves as Senior Systems Engineer at Aerohive Networks, the leading independent enterprise Wi-Fi vendor. With over 10 years’ in Wi-Fi industry, Hector likens himself as a real-life Wi-Fi super hero who moonlights as a professional photographer.
Chief Security and Strategy Officer
Perfect Security – Predictions and Interpretations
Chuck (Charles) Sirois is the Chief Security and Strategy Officer at Assurance Data, the leading source for information security services. Chuck has been a thought leader for Enterprise Security for nearly 20 years, Chuck’s expertise stems from independent security software development and consulting for the largest Federal DoD/ civilian and fortune 500 firms. Chuck has demonstrable experience in how threat actors operate and how to defend the Enterprise against them. Further, Chuck has proven his skills effective by successfully finding and preventing weaponized threats in hostile environments. Previously Chuck was founder of Contegrity Partners LLC and DataLeakTest.com, as well as Security Engineer for Websense, Novell, NetIQ, Tufts HC, and Citigroup.
My name is Charles Sirois, I am the CSSO at Assurance Data Inc. (ADi), a very relevant Cyber security firm with offices throughout North America. We actively work with our many Federal and Commercial organizations to defend and mitigate advanced security threats. Typically we fly “under the radar” but you may have seen ADi mentioned throughout the recent OPM oversight report released by the US House of Representatives. ADi discovered and mitigated this 14.1 million record data breach.
I strive to be an advocate and educate the security community by sharing the knowledge gained form my Cyber-warfare engagements. I reach out to the community at every opportunity by speaking at events on various security topics individually as well as on panels.