Loading Events

« All Events

  • This event has passed.

Philadelphia (Cybersecurity)

June 22 @ 8:15 am - 4:15 pm

Event Navigation

Details

Date:
June 22
Time:
8:15 am - 4:15 pm
Event Category:

Overview

The Philadelphia Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions
8:45am - 9:15amSession One

Steve Brown
Regional Sales Director, Northeast

Unifying data protection, leveraging the power of the cloud

Download the Presentation

Speaker’s Bio:

Steve is a Converged Data Protection Sales Specialist for Druva with nearly 20 years of infrastructure sales experience. Steve has a passion for working with organizations to leverage technology that will enhance the performance of information management and positively impacts the productivity, total cost of ownership, and business performance. The entire Druva team welcomes you to their booth to discuss your organization’s challenges including technological or economic challenges. Steve and his family reside in NJ and when not working to solve customer’s goals, he is involved with his children’s scouting activities.

9:15am - 9:45amSession Two

Neil Fitzsimons

Disaster Happens – Don’t Be Held Hostage

Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest additions to their arsenal – EVault & DoubleTake. We’ll also cover best practices for backing up your data and how you can take your defenses to the next level with DRaaS.

Download the Presentation

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Tom Bulthaupt
Channel Sales Engineer

Stopping Ransomware at the Door (and every other Threat)

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

·        Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
·        Detect: quickly and easily detect and isolate attacks
·        Respond: laser in on critical alerts and address them with simple to understand security intelligence

Download the Presentation

Speaker’s Bio:

Tom Bulthaupt has been in the network/security field for most of his professional career. He worked at BBN during the early days of building out the ARPANET, as well as, the private encrypted networks supporting government and the military data. For the last 20 years, his focus has been on network and endpoint security, helping customers secure their infrastructure against the ever escalating threats. Tom provides a hands-on knowledge of threats, consequences, and the required remedies facing businesses today.

10:45am - 11:15amSession Four

Brian O’Halloran
Consulting Systems Engineer

Utilizing the Normality of Network Traffic as a Security Sensor

Download the Presentation

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Rob Streeter
Sales Engineer

 

Securing the Digital Workplace 

Cyber Threats are only increasing.  Attackers are shifting their tactics as we shift our security strategies.  Join us for a discussion about the every changing threat landscape and how you can more effectively protect your company from these threats.  In this session we will talk about how cyber threats have increased in 2016, where attackers are shifting to, and what industry experts are recommending to address these shifts.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

John Massengale
Sales Engineer, AccessData

Drew Nielsen
Chief Trust Officer, Druva

Leveraging Cloud Technology to Reduce Cost and Risk in an Investigation

The continued growth of data volumes, increased adoption of cloud platforms and use of mobile devices for conducting day to day business is further complicating how corporations manage digital investigations. The collection and preservation of data, including from apps such as O365, Box and Gmail, can be cumbersome and time-consuming while risking your data integrity.

During this session, we’ll share strategies to help  IT and the teams they work with save precious time and costs when handling digital investigations. You will learn how to leverage data protection initiatives to help streamline the process and cut time and costs by 50%, while still maintaining visibility of data and reducing risk.

Download the Presentation

1:00pm - 1:30pmSession Seven

Andy Thomas
Threat Prevention Engineer, Check Point

Help, I am being held ransom and I can’t get my backup…

Ransomware…it seems to be an everyday event. Can you recover from backup?  Can ransomware be stopped or neutralized?  ?  What about other malware attacks?  Is there a better mousetrap?

From past failures, it is evident that deploying multiple best of breed point security solutions has not been effective in providing organizations the security they expected or paid for.

Deploying unified security architecture has proven to simplify the management, control, and enforcement of corporate security policy across network, endpoint, mobile, and cloud vectors. An added benefit is that TCO is reduced with fewer products to own and manage.

 

Come and learn about a multi-layered security architecture that will prevent zero day attacks…including Ransomware.

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

Daniel Caldas
Account Executive

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one.  Backup solutions don’t solve these problems as they are not true disaster recovery for the business.  What types of disasters will impact the business?  Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience.  Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

2:15pm - 2:45pmSession Nine

Todd Laporte
Channel Account Manager

Reduce Risk Across Hybrid IT

Download the Presentation

2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:30pmSession Ten

Dan Schutzman
Solutions Engineer

Does Your Time to First Byte Bite?

Join Dan Schutzman, Director of Solutions Engineering at Dyn as he provides a high level overview of DNS, the various multi-DNS configurations and how this layer of your infrastructure has everything to do with security. From DDoS to DNS amplification and reflection attacks, it’s all covered including strategies to mitigate, opportunities to architect infrastructure resiliency and tips to improve digital performance.

Download the Presentation

3:30pm - 3:45pmSession Eleven

Brett Gordon
Sr. Solutions Architect

Secure Browsing – Ransomware Prevention

Download the Presentation

Speaker’s Bio:

Brett has been in the IT field for over 20 years with a focus on end user computing and security. He has a background in network security, endpoint security, privilege management and helping define organizational security policies. He has consulted on projects for large scale commercial and public sector clients. In his current role, Brett is a Pre-Sales Engineer for Ericom covering North and South America.

Prize Drawings for All in Attendance
3:45pm - 4:15pmSession Twelve

Jack “Wes” Riley

 

 

The MacGyver Guide to Threat Hunting: A Simple Approach to Advanced Techniques

Threat Hunting has become a buzzword in the security industry that is often misunderstood and/or misrepresented.  Often, organizations focus the newest things in information security to protect, defend, and respond against today’s advanced threats.  However, given that much of the base infrastructure of how networks and systems work have not changed dramatically, utilizing system and network basics in creative ways have proven effective in both combatting advanced threats and reducing the skills gap of analysts at all levels.  This talk will discuss a proven, practical, effective, and scalable methodology to detect, scope, triage, and respond to advanced threats in today’s landscape.  This methodology uses techniques based on various concepts that are known by most IT personnel and have been proven effective in the field.  This talk will show Threat Hunting for what it is: Investigation without cause to identify threats and adversaries other detections miss.

Prize Drawings for All in Attendance

Sponsors