- This event has passed.
April 27 @ 8:15 am - 4:15 pm
The San Antonio Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Chief Operations Officer
Threat Intelligence and Layered Security in the Post-Target Breach Era
The term “Threat Intelligence” is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.
Historically, emphasis was placed on the complexity of passwords to thwart the use of legitimate credentials by attackers. As recent breaches have shown, this approach has been unsuccessful. Additionally, password requirements have been met with user disapproval, and are often met with a rise of management costs due to forgotten password resets.
Advancements in technology have evolved the recommendations provided by industry leading frameworks. In this presentation, we will cover some of the best practices for securing you user accounts to mitigate compromise.
Randy Watkins is passionate about security. A respected author and speaker on cybersecurity trends, Randy is well versed in how to apply security technologies in practical and meaningful ways to improve vulnerability management and security infrastructure. Randy holds numerous security certifications, including CEH (certified ethical hacker). He has a keen understanding of the complexities of system architecture, as well as how emerging technologies complement existing solutions. Randy holds a Bachelor’s Degree in Information Systems Security and an Associate Degree in Computer Networking Systems.
Enterprise Sales Development
Next Generation Endpoint Protection
In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.
Securing the Digital Workplace
Cyber Threats are only increasing. Attackers are shifting their tactics as we shift our security strategies. Join us for a discussion about the every changing threat landscape and how you can more effectively protect your company from these threats. In this session we will talk about how cyber threats have increased in 2016, where attackers are shifting to, and what industry experts are recommending to address these shifts.
The Enemy Within
Ransomware is both scourge and savior. While it’s not typically considered an insider threat, it acts from the inside, using insider identities, encrypting files that insiders have access to on endpoints and file shares. Learn how organizations are using ransomware to identify and confront vulnerabilities that expose them to rogue employees, abusive administrators, and hackers.
Territory Sales Engineer
Transform Your Security: Protect Your Organization. Enable the Business
· Discover how next-generation vulnerability management can help you see and understand assets and threats never visible before.
· Assets and vulnerabilities appear and disappear within seconds. See unknown and shadow assets and eliminate vulnerability blind spots.
· Gain critical context – a deeper, real-time prioritized scope and understanding of which corrective actions to take first and why they’re important.
Dynamic Threats to the Modern Data Center
Protecting today’s data center networks requires greater flexibility and innovation to keep pace with increasingly sophisticated threats. We will discuss the threat landscape and methods of mitigating risk to the modern data center.
Richard Devera is the Security Architect at Check Point Software Technologies, Inc., the worldwide leader in securing the Internet. Richard has been working with Check Point since 1996. His background includes 20+ years of industry security experience. Richard is involved in providing best practices security strategies for enterprise networks in both the commercial and government sectors. He is one of the thought leaders within the company providing feedback for real-world customer deployment strategies and technology direction to the products team.
Richard has held several successful positions at Check Point from a Security Engineer, Area SE Manager, to Regional SE Director. Prior to joining Check Point, Richard worked as a contractor for NASA – Johnson Spaceflight Center (JSC) in Houston. He held the position as a network security architect providing consulting and network security strategies to protect the data and communications between the Mission Control Center and other Space Operations Centers in across the world to support the Space Shuttle and the International Space Station.
Director, Security & Network Transformation
Holy Jurassic Security – Top 10 Signs Your Infrastructure Might Be Nearing Extinction
The Game has Changed…Ready or Not!
Ted has been an IT systems security practitioner for over 15 years. In that time he has successfully sold and implemented global security tools for Fortune 50 customers in most major verticals. He has previously worked for Symantec supporting customers across North America and Dell Computers internal IT as a senior network engineer. In his current role, Ted relies upon his security background to assist customers in utilizing ForeScout’s CounterACT Network Access Control platform to secure their networks from BYOD/guest users and computers, insider threats and mobile devices.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Under the Hoodie – Results of 128 Pen Tests