- This event has passed.
July 13, 2017 @ 8:15 am - 5:15 pm
The Pittsburgh Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech Security Strategies Conference.
Global Account Manager
Unifying data protection, leveraging the power of the cloud
Kevin is a seasoned professional with a history of cloud-based solutions selling, including nearly 5 years with Druva. He is Pittsburgh native who is based in Atlanta, GA and manages both regional and global accounts. He is a US Army veteran with an engineering degree from Rensselaer Polytechnic Institute and an MBA from Emory’s Goizueta Business School. He is an avid athlete who enjoys a variety of competitive sports in his free time.
AVP, Business Development
Data-Centric Security – A Path to GDPR Compliance
The “General Data Protection Regulation” (GDPR) will come into force in May 2018 and organizations have until then to review their processes and security strategies in order to comply with it. Failure to do so will expose them to significant sanctions in the event of a data security breach – fines of up to 20 Million Euros or 4% of global group revenue, whichever sum is the greatest. This presentation will outline the processes and controls associated with what is often called Data-Centric Security and illuminate a path to attaining compliance to GDPR.
Disaster Happens – Don’t Be Held Hostage
Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest additions to their arsenal – EVault & DoubleTake. We’ll also cover best practices for backing up your data and how you can take your defenses to the next level with DRaaS.
Keep Ransomware Out. How you can stop ransomware and exploits before they strike
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence
Manager of Product Marketing
Defense in depth, balanced with user needs
In Security there is a fundamental dichotomy between locking down an environment and optimizing the user experience. With both cyber attacks and global competition on the rise, balance must be brought to the Force. Ivanti delivers defense in depth based on proven security controls, while also reducing the impact on the end user and business.
Inside Sales Rep
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Daniel is an Inside Sales Representative at Zerto helping clients solve problems focused towards reducing risk and exposure to an organization’s treasured data sets with business continuity through Zerto’s platform. Zerto’s award-winning solution provides enterprises with continuous data replication & recovery designed specifically for virtualized infrastructures and cloud environments.
Daniel has 10+ years of experience in information technology covering a wide range of solutions in this time and ultimately focuses towards helping his clients succeed.
Evolved Requirements: A business-driven security strategy for threat detection & response.
Security teams need to evolve to stay in front of attackers and the latest threats, but in recent years this has become much more difficult. Attackers continue to advance and use sophisticated techniques to target and infiltrate organizations while spending significant resources performing reconnaissance to develop techniques specifically designed to bypass the security tools being used. Complicating this, most organizations no longer have well defined perimeters as they shift to more modern IT infrastructures that include a variety of environments some on premise, some in the cloud. Finally, to add even more challenges, security teams suffer from a skills gap that make it difficult to fully staff a team and even more difficult when they add more and more security tools and devices that only add to the noise for the staff trying to find the truly significant attacks.
- Given these challenges, we see a mindshift occurring within the organizations running sophisticated security operations. Specifically a shift in focus on preventative controls that promise to keep the bad guys out to an increased focus on rapid detection and response, to shorten the dwell time and reduce or even prevent business damage when breaches occur. In simple terms, these organizations recognize it’s no longer feasible to think you can prevent all attacks from getting in.
- In order reduce the impact of attacks, security operations needs to be able to tie critical asset and identity information into both the detection and response capabilities, so they can focus their efforts on the threats that matter most.
Senior Vice President
Risk Driven IAM Tackle IAM with a Risk Based Approach
Chief Executive Officer / Co-Founder
Advancing Perimeter Defense: Introducing the Virtual Minefield Zone (VMZ)
Join PacketViper to learn more about our new and innovative security techniques to harden defensive perimeters using our Virtual Minefield Zone (VMZ).
The VMZ is a special feature of PacketViper that turns the tables on the attacker by using the network terrain to give the advantage back to the Network Administrator. PacketViper’s easily configurable triggers are deployed so you can gain new intelligence with sensors, traps, and decoys to deceive, and detect attackers to prevent malicious attacks.
Product Marketing Manager
There Will be Attacks – Improve your Email Defenses
If you rely heavily on your users to defend your organization from email-borne attacks, you probably already have felt the impact of spear-phishing, ransomware, impersonation, and other cybercrimes. If you showcase your senior employees on your website, accept resumes online, pay your vendors by wire transfer, or have employees with Linkedin accounts, you almost certainly are on the radar of cybercriminals.
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Automating Endpoint Management: Patching, Deployment and System Building made easy
With increasing demands on IT Managers, new ways for handling security and user requirements are needed. This seminar will show you, how you can automate your patch management, drastically simplify system building, and find out about ways to enroll software while avoiding complex repackaging procedures – inside and outside of your network.
This seminar will show you how you can innovatively automate and structure standard endpoint management tasks and improve security and compliance.
Jonathan Lange is responsible for Sales in the US market. Having advised customers in various countries from small businesses to global enterprises, he is well aware of the challenges IT departments face today in order to keep their infrastructure up-to-date, safe and efficient. Specialized on efficient methods for endpoint management, he has an in-depth knowledge of the baramundi Management Suite and how it can benefit IT departments.
About baramundi software USA
baramundi software USA, Inc. provides companies and organizations with efficient, secure, and cross-platform management of workstation environments. Around the world, over 2,500 customers of all sizes and from every sector benefit from the independent German manufacturer’s many years of experience and outstanding products. These are compiled into an integrated, future-orientated unified endpoint management approach in the baramundi Management Suite: endpoint management, mobile device management, and endpoint security are provided via a shared interface, using a single database, and according to global standards.
Sales Engineer Manager
The Top 5 Myths of Hybrid Cloud Security
Hybrid cloud security is a hot topic, especially with the massive growth of public cloud providers like AWS, Microsoft® Azure™, and Google Cloud. If you’re unsure about how to adapt to this new architecture, or want to learn more about moving to the cloud, this is a must attend!
VP of Global Safety, Risk, and Security
Data Center Security – A Cornerstone of Enterprise Risk Management
Join Dan Rattner, Iron Mountain’s top data center security officer and former CIA officer, as he discusses why today’s data center plays such an important role in enterprise risk management. Whether your organization uses on-premises data centers, colocation facilities or a combination of physical and virtual data centers, data center protection is critical to building the ideal corporate defense strategy. Talk best practices, trends, threats, strategy and more with a security executive who has been at the center of threat detection, management and mitigation for over forty years.
Dan Rattner is Vice President, Global Safety, Risk & Security at Iron Mountain. In addition to his oversight responsibilities for Iron Mountain’s Data Center business, Dan has global responsibility for multiple facets of the company’s Global Security and Enterprise Risk Management operations.
Dan is a Board certified security management professional with over 40 years of experience in consulting to and managing complex organizations in both the public and private sectors. Following a distinguished tenure in both the operations and analytical directorates of the Central Intelligence Agency, Dan left the federal government and began a private sector career. Dan held senior management positions in several multi-national companies, including Lotus Development Corporation, NerveWire Consulting, Polaroid Corporation, and the Drew Company. In 1997, Dan founded D.M. Rattner & Associates, a management consulting firm specializing in security, risk management, public safety, and homeland security.
In 2005, Dan returned to the public sector as Senior Advisor for Homeland Security and Public Safety in the Massachusetts Executive Office of Public Safety (EOPS). In that role, Dan coordinated some of the State’s regional “Intelligence-Led Policing” and Fusion Center initiatives, including serving as Director of the Boston Regional Intelligence Center located at Boston Police headquarters. During his tenure at EOPS, Dan also played a central role in developing the State’s emergency preparedness and response procedures for private sector critical infrastructure; health and hospitals, transportation, and utilities.
Dan has taught as an Adjunct Professor in both the undergraduate and graduate Criminal Justice programs at Northeastern University in Boston, and was also appointed as a Visiting Scholar in Northeastern’s College of Professional Studies.