- This event has passed.
December 17, 2015 @ 8:15 am - 1:30 pm
The Albuquerque Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech-Security Strategies Conference.
Solving the Mobile Security Gap
Smartphones and tablets give us unprecedented access to the critical business information we need to work faster and accurately. Providing your employees with access to that information on the devices they choose has many benefits, but it also exposes your business to risk. Come to our session to learn more!
Ryan Kane is the Fortinet Secure Wireless and Access Technologies specialist supporting clients in the Southwest United States. He has over 12 years of experience introducing innovative technology solutions to complex problems with an emphasis on mobility and security.
Terry Zechman is the Fortinet Systems Engineer supporting security platform sales in New Mexico, Arizona, and Nevada. He has over 25 years of experience in retail, manufacturing, logistics, and public sector industries. Prior to joining Fortinet, Terry worked for the City of Scottsdale, Arizona, where he deployed Fortinet security solutions and wireless access throughout the Scottsdale Public Library system. He holds degrees in Electrical Engineering from Pennsylvania State University and Information Technology from Albright College.
Stop Attackers in their Tracks: How to Incorporate Smart Detection Strategies
If an attacker was on your network would you know? How long would the breach go undetected? Statistics show that attackers can remain hidden on a network up to 200 days before being detected, and cause untold damage in that time period.
And while it’s accepted that perimeter defenses cannot provide 100% protection against attacker’s technology that lets you find attackers quickly and efficiently has been a challenge.
LightCyber delivers on the promise of just that. Accurate, efficient detection of attackers after they have breached your network, providing you clarity about the attacker from network intelligence combined with added context detailing using our ability to access critical device data. Combined together, LightCyber lets you quickly zero in on the exact device accessed by the attacker, which allows fast remediation to stop damage before it happens.
Jim Thor has over 20 years of IT experience, including roles focused on Information Security, Network Engineering and Communications, and Systems Administration. Jim has worked directly for Fortune 100 companies, and has consulted with companies of all sizes. Jim thoroughly understands not only the network and applications that traverse it, but also the procedures and controls that help to promote the security and stability of the corporate infrastructure. Jim possesses certifications from (ISC)², Cisco, Microsoft, Checkpoint, and others.
Managing Encrypted Traffic in Your Environment
Regional Security Specialist
Total Threat Protection with Office 365
Many organizations are recognizing the benefits of moving to Office 365. Office 365 makes email server management easier, but migrating your emails to the cloud raises some serious business challenges to ensure that your emails are secure, retained and always easily accessible. Barracuda offers security and storage solutions to meet each challenge quickly and as the low cost and simplicity that you’ve come to expect from Office 365.