Loading Events

« All Events

  • This event has passed.

Austin (Cybersecurity)

September 27 @ 8:00 am - 5:00 pm

Event Navigation


September 27
8:00 am - 5:00 pm
Event Category:


The Driskill
604 Brazos Street
Austin, TX 78701
United States
  + Google Map
8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

8:45am - 9:15amSession One

Ted Gruenloh
Chief Operating Officer

Speaker’s Bio:

Ted has worked with web and network security technologies for more than 15 years. He began his career in technology as a full-stack engineer in web development and design. As Chief Operating Officer, Ted guides the overall development of Sentinel IPS, the CINS Active Threat Intelligence System, and all other supporting technologies. You may also find him presenting at a trade show or information security conference, spreading the word about shared threat intelligence.

One of Sentinel’s first employees, Ted is not afraid to get his hands dirty supporting Sentinel customers or lending a hand in Sentinel software development. Ted received his Bachelor of Business Administration from the University of Iowa (Go Hawks!) and his Master of Education (Secondary Mathematics) from the University of North Texas.

He resides in the DFW area with his wife and two sons, which keep him busy on seemingly every ball field, basketball court, and Boy Scout campground in the North Texas area. He can also be found swinging a hammer for Habitat for Humanity or riding his beloved bicycle for Team in Training.

9:15am - 9:45amSession Two

Jessie Gibbons
Channel Sales Engineer

Sophos Synchronized Security

Ever had a shower thought thinking about how it seems silly that nobody has made a firewall that shares threat information with endpoint protection software on the network?  Well guess what…Synchronized Security from Sophos does just that!  Stop by to see it in action with a live demo!

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Ricky Allen
Vice President

The Race to Modern Authentication

The proper authentication of users is becoming increasingly complex due to the challenges faces through phishing activity, password guessing, and available password dumps.  The race to properly identify and validate the user for both internal and external applications is a top initiative for information security programs.  Modern Authentication is more than just a two factor or one time password – it involves a change in the way an employee works and keeps their passwords safe.   It will take preparation and planning to win the race – join us for this session to discuss requirements gathering, integration of cloud sites, multi-factor options, user impact, account provisioning, and monitoring requirements for a Modern Authentication solution.

Speaker’s Bio:

Ricky Allen is the Vice President for Critical Start and President of the South Texas ISSA chapter.  He holds certifications such as SABSA Security Architecture, CISSP, CISA, and Six Sigma.  Ricky previously held roles at Accenture as an executive in their strategic information security consulting practice and at HP Enterprise Security Products as the practice lead for developing Security Operations programs for ArcSight SIEM products. Ricky was focused on retail and manufacturing industries while at PwC where he managed penetration testing and risk assessments for companies across the US.   Ricky has presented at conferences such as BSides, Black Hat, API Cybersecurity, HOU.SEC.CON, SANS,  SecureWorld, and Data Connectors.   Ricky is based in Houston, TX and has a degree in Management Information Systems from Texas A&M University.

10:45am - 11:15amSession Four

Mike Boose
Channel Sales Engineer

The Changing Landscape of DDoS Attacks – Advanced DDoS Is Here – Are You Ready?

Distributed Denial of Service (DDoS) attacks have entered a new era!  Historically DDoS attackers have used a “brute force” approach to making an online services unavailable by overwhelming your company’s internet connection. DDoS targets wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and presents a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications.  Brute force attacks have morphed into more sophisticated, multi-vector attacks.  Your adversaries are patient, launching targeted attacks using deception & “smokescreen” tactics to take down your network.  The frequency of DDoS attacked has risen dramatically as well.  The emergence of IOT devices has led to larger, more destructive attacks from Lizard Stressor, to Mirai & now Memcache.  2018 has seen the first DDoS exceeding I tbps! (1.3 tbps & 1.7 tbps attacks)

Arbor will discuss the misconceptions & facts about modern day DDoS attacks and best practices to protect your company against DDoS attacks while providing maximum network availability.  “Bandwidth saturation” will impact your business – an attack that exceeds your internet pipe is all it takes.  In this new world, “peace time” no longer exists so having a DDoS protection strategy is critical!  With 30+% of DDOS attacks causing havoc at the Application Layer  with potential data exfiltration, the stakes could not be higher.

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Mark Jordan

Beyond Backup

How hyper-convergence and hybrid cloud adoption has forced organizations to reconsider their backup and continuity needs.

Speaker’s Bio:

Mark Jordan is CTO at Unitrends. He leads the presales engineering team, supports strategic sales opportunities with account teams, promotes partner engagement, follows industry trends and direction to shape product priorities, and evangelizes Unitrends solutions and roadmaps. Mark joined Unitrends in 2002 and has spent over 25 years in the information technology industry.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Rob Anderson
Partner and Chief Operating Officer, Secure Data Solutions

Grant Gowery
Account Executive, Arctic Wolf

Managed SOC


About Secure Data Solutions

Secure Data Solutions provides comprehensive results giving our clients confidence in their security strategy and eco-system to focus on their core business.

Using fundamental and leading edge security technologies, Secure Data Solutions provides expertise and visibility in all aspects of Network and Cyber-Security. Through our discovery process, we align technical and financial requirements to create a holistic reference architecture specific to each client.

This ensures our partnership with each client delivers a well developed security plan and eco-system to meet your ongoing security challenges.

1:00pm - 1:30pmSession Seven

Sonya Wilcox

Turtles, Trust, and the Future of Cybersecurity

Faith in our institutions is collapsing, and GDPR is at the door. What would cybersecurity look like if we started from scratch, right now, in our hybrid, interdependent world?  It would focus relentlessly on data. Learn how a data-centric security approach can reduce risk, increase efficiency and re-engineer trust in a society where faith has been shaken by unstoppable breaches.

Speaker’s Bio:

Sonya Wilcox brings over 15 years of IT industry experience to Varonis, a company specializing in Data Governance and User Behavior Analytics.  As a Systems Engineer for Varonis’s public sector in the TOLA region, she works closely with organizations to understand the value of digital assets and the importance of data classification as part of an overall data security profile. Sonya’s past experience includes architecting and implementing secure, redundant messaging and Active Directory systems for large enterprises. Sonya will share commonsense insight into how organizations identify and solve the often overlooked challenges related to risk associated with manual process used to enforce data classification, user authentication, permissions access & authorization, and accountability controls.

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

David Coleman
Senior Product Evangelist

An Overview of WLAN Security

As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.

So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:

  • The 5 tenets of WLAN security
  • Choosing the proper authentication and encryption model that doesn’t force user workarounds
  • Utilizing Private PSK technology
  • Device and user access control
  • Future challenges for Wi-Fi security and WPA3
2:15pm - 3:00pmSession Nine

Bob Riley
Regional Expert, Mobility

Mobility, it is not just a technology; it is a mindset and more and more a way of life today.

Mobility, mobile technology, our dependence and interdependence upon them is growing every single day, but we are ignoring the vulnerabilities and inherent security gaps that come with the race to something new and innovative.  Many profess that the explosion of mobile device availability and use is one of the single most empowering aspects of technology to happen in the last three decades.


  • Then why are mobile devices so unsecure?
  • Why, do we simply accept that?
  • How did we get to this point?


Let us look at the brief history of the “mobility” mindset, where we are today, what we can expect in the future, and how we can better secure ourselves, and our enterprises.

Speaker’s Bio:

Bob Riley’s experience in information technology and security started over 30 years ago in the United States Marine Corps, where he served for over 12 years on active duty as an electronics, communications, and surveillance maintenance chief, instructor and inspector for the Headquarters Marine Corps Inspector General.  In his current position Bob serves as a Mobile Security Expert for Check Point Software Technologies, were he works closely with organizations to help them secure the mobile endpoint and implement “common sense” security best practices for mobile devices.  To that position Bob brings over two decades of Fortune 500 experience doing the same through the evolutions of Mobile, Security, and IT itself.  Bob holds several specific and several industry agnostic Information Security certifications to include the CISSP, CCSP, CRISC and the ITILv3F.

3:00pm - 3:15pmBreak / Vendor Booth Time
3:15pm - 3:45pmSession Ten

Collin Woo
Senior Solutions Engineer

The Bots are Coming!

Actually, they are here. They now represent over 50 percent of internet traffic. But not all bots are bad. There are many good bots, such as chat bots and search engine bots, that we rely on in our day-to-day digital lives. You do need to know the difference and take control of your bot traffic—they cannot be ignored and you cannot just block them all. In this presentation, we will look at the growth of bots, good bots versus bad bots, what to look for in a bot mitigation solution and a few use cases.

Download the Presentation

Speaker’s Bio:

Collin Woo, Senior Solutions Engineer at Oracle Dyn, is known for collaborating with technology minded individuals who are passionate about web performance and security. After spending over a decade working in Fortune 500 companies implementing and consulting various cloud-based solutions, Collin knows what truly drives customers for the need-for-speed and how best to secure infrastructures of all sizes. In the last year, Collin has evangelized the importance of optimizing web performance while maintaining security at a number of conferences most notably Interop ITX and several regional Data Connector Security Tech Summits across the country.

3:45pm - 4:15pmSession Eleven

Danny Murphy
Head of Technical Delivery

Why Security Should Start with Data

Something about the way we approach cybersecurity needs to change. What we think threats look like simply isn’t an accurate picture any more.

The majority of security budgets are spent tackling external threats, despite research suggesting that the biggest risk to your security actually comes from within your organization. A strong security strategy puts data at the centre makes it the priority.

This presentation will take you through what threats actually look like, as well as how to adopt a data-centric cybersecurity strategy. The agenda is as follows:

  • What does a threat look like?
  • The real threat to your security
  • The 4 pillars of data-centric audit and protection
  • A day in the life of a threat
  • About Lepide


Speaker’s Bio:

Danny brings over 10 years’ experience in the IT industry to the Lepide Leadership team. With award winning success in leading global Pre-Sales and Support teams, coupled with his knowledge and enthusiasm for IT Security solutions, he helps to ensure Lepide delivers market leading products and support to their extensively growing customer base.

4:15pm - 4:45pmSession Twelve

Brian Ballinger
Account Executive

Win Big with IT Resilience

In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.

Download the Presentation

4:45pm - 5:15pmSession Thirteen

Gary Southwell,
Vice President & GM HPP Division

A practical (low cost) approach to securing East-West traffic

Firewalls do a great job securing the perimeter- but don’t see East West traffic.

Come to this session to learn of simple approaches to see, classify and secure East –west traffic with minimal effort and cost.

            Things you will learn:

  1. System logs provide only part of the picture
  2. Network traffic tells you the whole story
  • if you can access it properly
  1. Classifying traffic flows and taking action
  • Applying programmatic rules to enforce security policies
Prize Drawings for All In Attendance