Loading Events

« All Events

  • This event has passed.

Tampa (Cybersecurity)

April 20 @ 8:15 am - 3:00 pm

Event Navigation

Details

Date:
April 20
Time:
8:15 am - 3:00 pm
Event Category:

Venue

DoubleTree by Hilton Tampa Airport Westshore
4500 West Cypress Street
Tampa,FL33607United States  + Google Map
Phone:
1-800-514-3956
Website:
http://www.doubletreetampawestshore.com/

Full PDF Agenda

Overview

The Tampa Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Todd Stephenson, CISA
Security & Compliance Specialist

How to Launch an Effective Security Risk Management Program

Security risk is an organizational challenge, reaching far beyond the IT team to involve stakeholders at every level and business function. Yet even today, many leaders struggle to engage the people, processes and technologies necessary to effectively manage the organization’s security risk.

ControlScan Security & Compliance Specialist Todd Stephenson has seen the struggle first hand, having discussed security and compliance issues with organizations of every shape and size. Through his experience, Todd has identified the common barriers preventing the launch of an effective security risk management program.

Speaker’s Bio:

Todd Stephenson is a Certified Information Systems Auditor (CISA) who has spent the last decade helping organizations understand and implement effective information security management as well as comply with information security standards such as PCI, HIPAA, GLBA, SOC, NIST 800-53, and ISO 27001. At ControlScan, Todd helps companies connect their security and compliance goals with technologies and services to efficiently meet those goals.

Todd is an active participant in several information security forums, including the AIIM Global Community of Information Professionals and the Data Protection Association. He also contributes to the ControlScan security and compliance blog on ControlScan.com.

9:15am - 9:45amSession Two

Val Hristov

Disaster Happens; Don’t Be Held Hostage

Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest additions to their arsenal – EVault & DoubleTake. We’ll also cover best practices for backing your data and how you can take your defenses to the next level with DRaaS.

Download the Presentation

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Steve Weber
Channel Sales Engineer, Sales

Keep Ransomware Out.  How you can stop ransomware and exploits before they strike

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

·        Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
·        Detect: quickly and easily detect and isolate attacks
·        Respond: laser in on critical alerts and address them with simple to understand security intelligence

Download the Presentation

Speaker’s Bio:

Stephen Weber has been in the IT field for over 20 years with experience both as a customer, managed service provider and vendor. His experience ranges from AutoNation USA Systems Engineer, Wilkes & McHugh, PA Network Engineer, MSP Owner to Sales Engineer. Currently, he is the Channel Sales Engineer for Sophos covering all of Florida.

 

10:45am - 11:15amSession Four

Jae Kim
Regional Director

Jorge Garcia
Senior Solutions Architect

Next Generation Endpoint Protection 

In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.

11:15am - 11:45amBreak / Vendor Booth Time/Lunch
11:45am - 12:30pmSession Five

John Madigan
Security Engineer

Strategies for Advanced Threat Prevention

The Advanced Threat Prevention presentation will cover how to implement strategies to prevent advanced malware from entering the enterprise, and why having a security policy that simply detects malware rather than blocking it in real time means your network may have already been compromised.

Download the Presentation

Speaker’s Bio:

John Madigan is an accomplished Security Engineer with 18 years of experience in the area of Network Security. Prior to joining Check Point in 2009, much of John’s career had been spent designing and implementing security controls in the telecom, government, and banking sectors. John spent his first 5 years at Check Point as a Professional Services Consultant, serving some of the largest global Check Point customers, and is now a pre-sales Security Engineer and based in Tampa, FL. When John is not working he enjoys scuba diving and underwater photography.

 

12:30pm - 1:00pmBreak / Vendor Booth Time
1:00pm - 1:30pmSession Six

Douglas Jones Southeast Regional Sales Manager, Behavioral Analytics

Cyber Weapons: Learn the Tools Attackers Use

Attackers leverage a variety of tools to break into networks and expand their footprint. This session will educate you on the tools that are used to perform command and control, reconnaissance, lateral movement and data exfiltration. Using these tools, attackers can remain undetected for months.

Attend an informative presentation to gain a quantitative view of attack tools based on the findings from the industry-first Cyber Weapons Report. You’ll probably be surprised how little of the attack tools are malware.

During the session, Palo Alto Networks security expert Douglas Jones will explain:

  • The top malware, hacking, admin, and remote desktop tools associated with attacks and risky behavior
  • How each type of attack tool maps back to stages in the Cyber Kill Chain
  • How Behavioral Analytics can help you find active attackers in your network
1:30pm - 2:00pmSession Seven

Brian Gittinger
Sales Engineer

Facing Cyber Threats Head On

For many, the 2013 data breach at Target stores served as an introduction to cyber threats.  In reality, cyber attacks have a much longer and deeper heritage and this heritage will inherently drive the future of cyber security.  Based on experiences on the front lines of the most advanced cyber attacks, Brian will deliver a brief history of how cybersecurity has evolved and offer insights into where the cyber security industry will be heading in coming years.

Download the Presentation

2:00pm - 2:15pmBreak / Vendor Booth Time
2:15pm - 2:45pmSession Eight

Michael Brengs
Managing Partner

Creating a Cloud-First Identity and Access Management Foundation

At the perimeter of IT security is Identity and Access Management (IAM). Without it, data and user information is at risk. The ability for IT to scale its IAM program as the organization grows is important from a financial perspective and also from a security angle. Scalability and flexibility are fundamentals of on-premises and cloud-based solutions, but which is right for your organization?

This presentation will cover:

·         Why move to the cloud – Cloud vs. On-Premises Comparison
·         Security concerns to consider
·         Affordability of an IDaaS solution
·         Competitive wins & use cases

Speaker’s Bio:

Michael Brengs has over 23 years of experience in the software industry and has been deploying identity management solutions since joining OpenNetwork Technologies in 2000 (acquired by BMC Software), and later with Oblix (acquired by Oracle). He is currently a managing partner with Optimal IdM and responsible for the worldwide sales organization. Mr. Brengs attended the University of South Florida where he earned an undergraduate degree in Management Information Systems.

2:45pm - 3:00pmBreak / Vendor Booth Time
Prize Drawings for All in Attendance
3:00pm - 3:30pmSession Nine

Todd Blaese 
Senior Sales Engineer

Defense in depth, sense in breadth

An effective security strategy requires an organization to balance the fundamental dichotomy of locking down an environment versus user freedom.  Ivanti security delivers a defense in depth approach reducing the impact on the end user while implementing effective security controls.

Download the Presentation

Prize Drawings for All in Attendance

Sponsors