- This event has passed.
October 5 @ 8:15 am - 4:00 pm
The Austin Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech-Security Strategies Conference.
Today’s Threat Landscape
This presentation will focus on the Who, What, and How of recent attacks along with the various threat vectors and prevalence of each one.
Threat Intelligence and Layered Security in the WannaCry Era
The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.
CONSULTING SYSTEMS ENGINEER
A New Way to Look at IT Security with Endpoint Modeling
Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling results and visibility into all network Endpoint behavior. With great accuracy, extremely low noise, and supporting evidence, endpoint modeling discovers and tracks the regular behavior of each device in a way that makes possible the automatic recognition of potentially harmful activities. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others.
The Modern Honeynet: Using Deception to Catch Attackers
Regional Sales Director
Leverage the Cloud to Minimize the Impact of Ransomware
Jeff Stepanik is a Regional Sales Director at Druva. He received his education at Kent State University. For over 18 years, his consultative selling approach has assisted organizations in providing IT solutions focused on backup and recovery, disaster recovery, security archive and governance. He has assisted organizations designing and deploying multi-million dollar IT solutions down to solution fixes that run a couple thousand dollars. Jeff has spent his career working for solution providers like Druva, EMC, Spectra Logic, Pillar Data Systems along with a few value added resellers. In his spare time, Jeff can be found with his two boys, at the gym, on his mountain bike or one of his motorcycles. For more information, Jeff can be reached at 832-370-3952, jeff.stepanik@dr
Disaster Happens – Don’t Be Held Hostage
Finding your organization at the center of a data heist used to be the burden of enterprise IT, but in today’s data-centric world, no business is safe. IT security incidents have nearly doubled since 2011, according to PricewaterhouseCoopers, and concern among small and midsize businesses has risen alongside this risk. Join us to learn more about Carbonite’s newest additions to their arsenal – EVault & DoubleTake. We’ll also cover best practices for backing up your data and how you can take your defenses to the next level with DRaaS.
South Central Engineering Manager
Building the Security Strategy for the Future
With the ever changing threat landscape and increasing attacks, are you prepared for the future? Join us to learn about our approach to providing a complete network security consolidation platform for public and private cloud, network perimeter and internal segmentation, along with endpoint and Mobile security, bringing total vision and management from one console. Learn about a comprehensive and complete security solution.
Over 18 years involvement with Network Security with many of these years spent in the legal and payment processing financial sectors.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
The threat within (and how to address it)
2017 has been a year full of high profile data breaches and this week, global accounting firm Deloitte has joined the list of those affected. A resourceful hacker gained entry to Deloitte’s email server via an administrative account which gave them full, privileged levels of access to sensitive information
If there’s one idea I’d like everyone to walk away with after this talk, it’s that we have a responsibility to our customers, our shareholders and to our staff to do more to address the threat within. We all need to ensure we take a more sensible and proactive approach to keeping track of changes being made by our privileged users to our critical IT systems, to ensure we’re managing data access permissions more effectively and to assess whether we really know enough about what’s happening to our files and folders.
Senior Vice President
Risk Driven IAM: Tackle IAM with a Risk Based Approach
Identity Access Management is a complex matrix of requirements meant to assure that only the right people have access to your data. This requires the creation of a rules, roles, and a method of preserving information about access rights. In other words, we create “big data” that then must be mined to find the most risky individuals and risky behaviors. By starting with a risk-based approach, finding those behaviors and individuals is easier. Explore with us as we examine how risk values can be assigned as you build the database so that analyzing and reporting become easier.