Loading Events

« All Events

St. Louis (Cybersecurity)

December 6 @ 8:15 am - 5:00 pm

Details

Date:
December 6
Time:
8:15 am - 5:00 pm
Event Category:

Venue

Sheraton Westport Chalet Hotel St. Louis
191 Westport Plaza Drive
St. Louis,63146United States  + Google Map
Phone:
314-878-1500
Website:
http://www.starwoodhotels.com/sheraton/property/overview/index.html?propertyID=795

Overview

The St. Louis Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Joey Kilaita
Regional Sales Director, Midwest

Leverage the Cloud to Minimize the Impact of Ransomware

Download the Presentation

Speaker Bio: 

Joey Kilaita, Regional Sales Director, Chicago, grew up in the Druva HQ since it’s beginning stages.  When Druva opened up a position in his hometown of Chicago he couldn’t resist. His expertise is around the mobile Enterprise, specifically around governance, data collection, and restore and led him to the top of the sales team within Druva. He and Bob Pawloski (Sales Engineer) cover IL, IN, WI, MI, MO, MN, and IA. He is a huge San Jose Sharks and Golden State Warriors fan, so bonus points if you can relate!

9:15am - 9:45amSession Two

Lawrence Hatcher

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Eric Pierron

10:45am - 11:15amSession Four

Kelly Lipprand
Sales Engineer

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five
12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six
1:00pm - 1:30pmSession Seven
1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight
2:15pm - 2:45pmSession Nine

Anthony Ricci
Technical Product Manager

Speaker’s Bio:

Anthony Ricci is a business-savvy technology operations leader with 25 years of IT expertise. Drawing on a career history of results bridging business and technology to develop world-class IT solutions, Anthony has extensive expertise leading enterprise IT initiatives for mid-size to Fortune 50 organizations/client companies. As an established IT security subject matter expert, Anthony has gained industry visibility and a solid reputation. Sought after to share his knowledge and perspective, he is regularly invited to speak at key events by leading industry organizations, including Symantec annual partner round table, IRCE (Internet Retailer Conference and Exhibition), HostingCon (conference and trade show for web hosting and cloud service providers) and IREM (Institute of Real Estate Management).

Anthony holds an MBA from Georgia State University and a Bachelor of Science in Computer Information Systems from the University of Dayton.

2:45pm - 3:00pmBreak/ Vendor Booth Time
3:00pm - 3:30pmSession Ten

Sean Griesheimer

Business-Driven Security: A New Plan for Chaos 

We will discuss how and why key-business drivers shape your security operations. We go beyond the guidance provided by NIST, and take a look at Risk Management, Threat Intelligence, Incident Workflow & Classification, Staffing Models, Use Cases & Prioritization, Escalation Plans, Security Controls, and Key Performance Indicators.

Speaker’s Bio:

Sean comes from a vast background in financial planning, analysis, GRC, and Security.  Sean’s hands on experience as both a practitioner and a security engineer have proven to be tremendous assets for his colleagues and customers.  His abilities to connect across industry and organizations give him a leg up when engaged in those difficult cyber conversations.  Sean is currently completing his CISSP, CSA and numerous other Security certifications.  In addition, Sean is deeply embedded in the Kansas City technology community where you are likely to find him at ISC2 and ISSA events in his free time.

3:30pm - 4:00pmSession Eleven
4:00pm - 4:45pmSession Twelve

Dave Losen
Co-Founder

Security Metrics & Their Importance

Security Metrics and Metric driven security programs are great buzz words. However, it is important that professionals understand the benefits of tracking and trending security metrics, how to collect them, and to determine what actionable items they indicate. This talk will provide an overview of several industry standard security metrics, talk about their history, and show how a few may be used for the benefit of a proactive, modern, security team.

Download the Presentation

Speaker’s Bio:

As co-founder of Sergeant Laboratories and its Director of Customer Success, Dave Losen has spent over 20 years investigating, hacking, and developing advanced security tools, like the product AristotleInsight. He has the unique ability to bridge the gap between kiddy scripting hacker tools to advanced big data machine learning systems, while being able to explain it all in plain English. Dave holds a patent on system monitoring that is a method for detecting and recording user interactions on an enterprise network, then presenting the results in an organized report. He has also earned recognition, a Prosecution Team Award, from the Wisconsin Association of Computer Crime Investigators (WACCI) for his forensic analysis.

Sponsors