Loading Events

« All Events

  • This event has passed.

Raleigh (Cybersecurity)

April 6, 2017 @ 8:15 am - 3:30 pm

Event Navigation


April 6, 2017
8:15 am - 3:30 pm
Event Category:


The Raleigh Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech Security Strategies Conference.

8:45am - 9:15amSession One

Elton Juter
Regional Sales Director – Mid-Atlantic

Unifying Data Protection & Lowering Data Risks by Leveraging the Cloud

With data growing in your organization unabated and increasingly becoming fragmented across end-user devices, cloud services and both physical and virtual server environments, the dark specter of data loss or exposure is very real and comes at a high business cost. IT teams are being forced to rethink how to best protect their data without compromising security, compliance or legal requirements. Organizations that can get a few steps ahead in identifying and remediating data risks before they become front page news will more effectively protect their enterprise from exposure and fines.

Join us for this session where we’ll discuss how modern cloud architecture is enabling new innovations for better utility of enterprise data, providing visibility, recoverability and governance capabilities for today’s data landscape, results unattainable with legacy, on premise approaches.

Download the Presentation

Speaker Bio: 

Elton Juter has been in the IT Industry for 20 years. Starting out as a programmer, and deciding to move into client-facing roles, he has worked in Storage, Security, and Systems Management roles with IBM Tivoli and HP Information Management Software. For the last 10 years, he has focused his efforts in the data availability, information governance/eDiscovery space working with Symantec/Veritas and most recently, Druva. In his current role, Elton has responsibility for Large Enterprise organizations throughout the Mid-Atlantic region along with national coverage of our US Federal Agencies. He looks forward to helping shed light on how Druva InSync and Phoenix is able to protect, manage, and preserve your endpoint, cloud-application, and server data, all while utilizing the industry’s leading public/private cloud, and therefore providing the lowest possible total cost of ownership.

9:15am - 9:45amSession Two

Tony Pepper

Securing your organization and containing the insider threat 

Despite increasing investment in the cybersecurity market, we continue to see a rise in data breaches and their related costs, specifically those relating to the insider threat (accidental loss and malicious insider). Despite these types of incidents contributing approximately 50% of all breaches, CIO focus remains on the external threat.

In this presentation, we will question whether a new approach to data security needs to be applied: one that recognizes data security can’t be tackled in silo and instead a holistic more strategic approach must be taken to protect and secure data throughout its lifecycle in order to contain the insider threat.

Speaker’s Bio:

Co-founder of Egress Software Technologies, Tony currently serves as CEO, overseeing all aspects of the business growth and innovation.

Prior to Egress, Tony held executive management positions at Reflex Magnetics, Pointsec Mobile Technologies, and Check Point Software Technologies. A frequent technology and industry speaker, Tony holds a Bachelor of Politics degree, a Software Engineering Master’s and is a certified BCS Fellow. Tony sits on industry committees including Intellect’s Government Management and Defence & Security Groups.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Brad Tompkins
Enterprise Sales Engineer

Your fate will be determined by your speed of detection & response. 

To kill threats quickly, you need to accelerate time to detection and time to response. This requires efficiency of operations and a well-enabled team.  Join LogRhythm Sales Engineer, Brad Tompkins, as we discuss how a security strategy that is focused on detection is required in today’s threat environment.  Brad will discuss how to use your own security intelligence to efficiently reduce your mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR).

10:45am - 11:15amSession Four

Matthew Mendonza

Disaster Happens; Don’t Be Held Hostage

Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest addition to their arsenal – the EVault family of products. We’ll also cover best practices for backing up your data and how you can take your defenses to the next level with DRaaS.

Download the Presentation

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

TJ Iacobone
Senior Channel Sales Engineer, Sales

Keep Ransomware Out.  How you can stop ransomware and exploits before they strike

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

·        Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
·        Detect: quickly and easily detect and isolate attacks
·        Respond: laser in on critical alerts and address them with simple to understand security intelligence

Download the Presentation

Speakers Bio:

TJ has been in Information Security for close to 20 years. For the past the 15 years with Sophos, he has been in the front line of preventing and mitigating malware. From the boom of worms in the early 2000s, like Nimda, Sircam and Code Red to the current ransomware and Internet of Things attacks like Locky and Mirai, TJ has combated it all.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Duncan McAlynn
Principal Engineer, Security Evangelist

Defense in depth, sense in breadth

An effective security strategy requires an organization to balance the fundamental dichotomy of locking down an environment versus user freedom.  Ivanti security delivers a defense in depth approach reducing the impact on the end user while implementing effective security controls.

1:00pm - 1:30pmSession Seven

John Massengale
Sales Engineer, AccessData

Cory Wagner 

Leveraging the Cloud & Technology to Reduce Cost and Risk in eDiscovery

The continued growth of data volumes, increased adoption of cloud platforms and use of mobile devices for conducting day to day business is further complicating the process of eDiscovery. The collection and preservation of data, including from apps such as O365, Box and Gmail, can be cumbersome and time-consuming while risking your data integrity.

During this session, you will hear tips for efficiency gains that will save IT and legal teams precious time and costs when handling eDiscovery matters. You will learn how to leverage data protection initiatives to help streamline e-discovery tasks at your organization to cut time and costs by 50%, including:

•       Strategies to store and maintain visibility of data, reducing risk due to spoliation or employee termination.
•       Timely, efficiently and defensible data collection with reduced storage requirements.
•       Reduction of overall downstream data, reducing costs during review.

Download the Presentation

Speaker’s Bio:

John Massengale is a Sales Engineer at AccessData. John has been with the company for 11 years, serving in support, product management, and sales functions. His experience spans government, Corporate, and Legal clients both domestically and overseas, with focus on providing product support for Summation, FTK, AD Lab, and AD eDiscovery. In his most recent role as Sales Engineer, John meets regularly with customers and prospects to better understand their digital data challenges and demonstrate how AccessData products can be used to improve the efficiency and effectiveness of digital forensic investigations.


1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

Ron Mullins
Sales Engineer

Security Transformation 

2:15pm - 2:45pmSession Nine

Steve Costolo
Regional Sales Director, Behavioral Analytics

Cyber Weapons: Learn the Tools Attackers Use 

Attackers leverage a variety of tools to break into networks and expand their footprint. This session will educate you on the tools that are used to perform command and control, reconnaissance, lateral movement and data exfiltration. Using these tools, attackers can remain undetected for months.

Attend an informative presentation to gain a quantitative view of attack tools based on the findings from the industry-first Cyber Weapons Report. You’ll probably be surprised how little of the attack tools are malware.

During the session, Palo Alto Networks security expert Steve Costolo will explain:

•       The top malware, hacking, admin, and remote desktop tools associated with attacks and risky behavior
•       How each type of attack tool maps back to stages in the Cyber Kill Chain
•       How Behavioral Analytics can help you find active attackers in your network

2:45pm - 3:00pmBreak / Vendor Booth Time
Prize Drawing for All in Attendance
3:00pm - 3:30pmSession Ten

John Castillo

Keeping the Enterprise Always On with IT Resilience

Download the Presentation

Prize Drawings for All in Attendance