Loading Events

« All Events

  • This event has passed.

Salt Lake City (Cybersecurity)

February 23, 2017 @ 8:15 am - 3:00 pm

Event Navigation


February 23, 2017
8:15 am - 3:00 pm
Event Category:


Hilton Salt Lake City Center
255 South West Temple
Salt Lake City, UT 84101
United States
  + Google Map

Download PDF Agenda


The Salt Lake City Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Daniel Budiansky
Sr. Systems Engineer, PacNW

Unifying data protection, leveraging the power of the cloud

Download the Presentation

9:15am - 9:45amSession Two


Bart Green
Named Account Manager – Utah from Fortinet

Security Fabric

Download the Presentation

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Paul Zindell
Channel Sales Engineer

Keep Ransomware Out.  How you can stop ransomware and exploits before they strike

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

·        Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
·        Detect: quickly and easily detect and isolate attacks
·        Respond: laser in on critical alerts and address them with simple to understand security intelligence

10:45am - 11:15amSession Four

Sharon Rosete
Account Executive

Phuong Nguyen
Senior Director, Technical Marketing

Next Generation Endpoint Protection 

In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.

11:15pm - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Derek Nash
Senior Sales Engineer

Cyber Hunting on Steroids: How Machine Learning Accelerates Cyber-Hunting 

No matter how well an organization is protected, a network breach will eventually occur. A talented, persistent group of hackers will eventually be able to bypass your prevention methods, given enough time.

The good news is that hackers always leave behind some faint traces that can be spotted and triaged. Automated hunting technologies, based on machine learning, make this approach accessible for any security team, at any size and with any level of skills.

Join our session to learn:

1 – The importance of implementing a proactive approach to security
2- The basics of cyber-hunting
3 – How machine learning makes cyber-hunting within reach

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Nick Kaloudis
Account Executive

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one.  Backup solutions don’t solve these problems as they are not true disaster recovery for the business.  What types of disasters will impact the business?  Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience.  Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

1:00pm - 1:30pmSession Seven

Eran Livne 
Principal Product Manager

Defense in depth, sense in breadth

An effective security strategy requires an organization to balance the fundamental dichotomy of locking down an environment versus user freedom.  Ivanti security delivers a defense in depth approach reducing the impact on the end user while implementing effective security controls.

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

Matthew Gardiner
Senior Product Marketing Manager


Explaining Bitcoins will be the easy part:  Email Borne Attacks and How You Can Defend Against Them

Download the Presentation

2:15pm - 2:30pmBreak / Vendor Booth Time
Prize Drawings for All in Attendance
2:30pm - 3:00pmSession Nine

Colm Foley
National Channel Sales Director

Visibility isn’t enough! It takes Actionable Intelligence!!

Providing a cybersecurity analytics platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives. Our advanced analytics engine creates functioning network models, tests networks to identify security risks, Measure needed actions, and provides critical information to quickly Prioritize issues. The result: reduced cybersecurity risk and lower incident response and maintenance costs.


Prize Drawings for All in Attendance

LogRhythm is unable to speak today, however, you can still stop by their table for more information.