Loading Events

« All Events

  • This event has passed.

San Antonio (Cybersecurity)

April 27, 2017 @ 8:15 am - 4:15 pm

Event Navigation


April 27, 2017
8:15 am - 4:15 pm
Event Category:


205 E. Houston Street
San Antonio, TX 78205
United States
  + Google Map

Download PDF Agenda


The San Antonio Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Ted Gruenloh
Chief Operations Officer

Threat Intelligence and Layered Security in the Post-Target Breach Era

The term “Threat Intelligence” is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.

Download the Presentation

9:15am - 9:45amSession Two

Randy Watkins
Director of Security Architecture, Critical Start

LOL, Passwords

Historically, emphasis was placed on the complexity of passwords to thwart the use of legitimate credentials by attackers. As recent breaches have shown, this approach has been unsuccessful. Additionally, password requirements have been met with user disapproval, and are often met with a rise of management costs due to forgotten password resets.

Advancements in technology have evolved the recommendations provided by industry leading frameworks. In this presentation, we will cover some of the best practices for securing you user accounts to mitigate compromise.

Speaker’s Bio:

Randy Watkins is passionate about security. A respected author and speaker on cybersecurity trends, Randy is well versed in how to apply security technologies in practical and meaningful ways to improve vulnerability management and security infrastructure. Randy holds numerous security certifications, including CEH (certified ethical hacker). He has a keen understanding of the complexities of system architecture, as well as how emerging technologies complement existing solutions. Randy holds a Bachelor’s Degree in Information Systems Security and an Associate Degree in Computer Networking Systems.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Aaron Ausherman
Solutions Engineer

David Dunkel
Enterprise Sales Development

Next Generation Endpoint Protection 

In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.

10:45am - 11:15amSession Four

Duncan McAlynn
Solutions Director

Securing the Digital Workplace 

Cyber Threats are only increasing.  Attackers are shifting their tactics as we shift our security strategies.  Join us for a discussion about the every changing threat landscape and how you can more effectively protect your company from these threats.  In this session we will talk about how cyber threats have increased in 2016, where attackers are shifting to, and what industry experts are recommending to address these shifts.

Download the Presentation

11:15am - 11:45amBreak / Vendor Booth Time/Lunch
11:45am - 12:15pmSession Five

Sonya Wilcox
Systems Engineer

The Enemy Within

Ransomware is both scourge and savior. While it’s not typically considered an insider threat, it acts from the inside, using insider identities, encrypting files that insiders have access to on endpoints and file shares. Learn how organizations are using ransomware to identify and confront vulnerabilities that expose them to rogue employees, abusive administrators, and hackers.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Carol Rosaire
Territory Sales Engineer

Transform Your Security: Protect Your Organization. Enable the Business

· Discover how next-generation vulnerability management can help you see and understand assets and threats never visible before.
· Assets and vulnerabilities appear and disappear within seconds. See unknown and shadow assets and eliminate vulnerability blind spots.
· Gain critical context – a deeper, real-time prioritized scope and understanding of which corrective actions to take first and why they’re important.

1:00pm - 1:45pmSession Seven

Richard Devera
Security Engineer

Dynamic Threats to the Modern Data Center

Protecting today’s data center networks requires greater flexibility and innovation to keep pace with increasingly sophisticated threats.  We will discuss the threat landscape and methods of mitigating risk to the modern data center.

Download the Presentation

Speaker’s Bio:

Richard Devera is the Security Architect at Check Point Software Technologies, Inc., the worldwide leader in securing the Internet.  Richard has been working with Check Point since 1996.  His background includes 20+ years of industry security experience.  Richard is involved in providing best practices security strategies for enterprise networks in both the commercial and government sectors. He is one of the thought leaders within the company providing feedback for real-world customer deployment strategies and technology direction to the products team.

Richard has held several successful positions at Check Point from a Security Engineer, Area SE Manager, to Regional SE Director.  Prior to joining Check Point, Richard worked as a contractor for NASA – Johnson Spaceflight Center (JSC) in Houston.  He held the position as a network security architect providing consulting and network security strategies to protect the data and communications between the Mission Control Center and other Space Operations Centers in across the world to support the Space Shuttle and the International Space Station.

1:45pm - 2:00pmBreak / Vendor Booth Time
2:00pm - 2:30pmSession Eight

Kevin Peterson
Director, Security & Network Transformation

Holy Jurassic Security –  Top 10 Signs Your Infrastructure Might Be Nearing Extinction

Download the Presentation

2:30pm - 3:00pmSession Nine

Ted Lee
Systems Engineering Manager

The Game has Changed…Ready or Not!

Download the Presentation

Speaker’s Bio:

Ted has been an IT systems security practitioner for over 15 years. In that time he has successfully sold and implemented global security tools for Fortune 50 customers in most major verticals. He has previously worked for Symantec supporting customers across North America and Dell Computers internal IT as a senior network engineer. In his current role, Ted relies upon his security background to assist customers in utilizing ForeScout’s CounterACT Network Access Control platform to secure their networks from BYOD/guest users and computers, insider threats and mobile devices.

3:00pm - 3:15pmBreak / Vendor Booth Time
3:15pm - 3:45pmSession Ten

Steve Winter
Account Executive

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one.  Backup solutions don’t solve these problems as they are not true disaster recovery for the business.  What types of disasters will impact the business?  Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience.  Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

3:45pm - 4:15pmSession Eleven

James Lee

Under the Hoodie – Results of 128 Pen Tests