- This event has passed.
April 26 @ 8:00 am - 2:30 pm
The Baltimore Area Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cybersecurity issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Director of Product Management
The Power of Your People: How to Rally Your Troops Against Phishing
This presentation will walk you through how to build a phishing protection program for your company. We reach beyond technical solutions to provide tips on getting management buy-in and how to architect the program so that it’s both effective and engaging. We wrap with some simple steps you can kick off as soon as you get back to the office!
Channel Sales Engineer
How to Discover unknown network threats.
What are the Essential Network Protection Technologies
We will cover the tools that can be leveraged to gain deeper insight into the traffic that is running across your network and how to manage those applications. We will also discuss the essential network technologies that your firewall should be providing to keep your organization safe.
Kerry has been in the IT field for nearly 20 years. He owned and operated a successful MSP providing Network Security and analysis. He has worked with SMB to Enterprises helping them keep their network and data safe. Currently he is the Channel Sales Engineer for the Mid-Atlantic region covering MD, DC, VA & WV.
10 File Transfer Risks and How to Avoid Them
You know what good cybersecurity practices look like; maybe you even set them up in your organization. Files are encrypted in transit, workstations and servers are protected with strong password policies, firewalls and blacklists secure the internal network from intruders, and employees are well versed in what a phishing attack looks like. Everything is going well … and then you’re hit with a critical data breach, and you’re not sure why. Hadn’t you covered all the bases?
In reality, it’s easy to miss certain exposures and vulnerabilities that endanger your files. The smallest gap in security can risk everything—and leave you with a mess. But fortunately, once you’ve identified the weak areas, they’re often simple to fix.
In this session, join GoAnywhere Solutions Consultant Rick Elliott to explore the ten file transfer perils that organizations often run into, including:
· Giving away your user IDs and passwords via FTP transfers
· Exposing data to the DMZ (Demilitarized Zone)
· Not securing your system with the right permissions
Risks and insecurities are everywhere, and sometimes they’re hard to spot. Learn how to avoid common pitfalls, then discover how you can safeguard your data with a secure file transfer solution like GoAnywhere MFT.
Win Big with IT Resilience
In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.
Cyber Exposure – The Next Frontier
The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program.
Join our session to learn how CISOs can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.
Chris Edson is Tenable’s Solutions Engineer covering the Mid-Atlantic and the Carolinas. He has been with Tenable for four years, first as a Support Engineer, gaining in depth product knowledge and, most recently, as a Solutions Engineer. Chris specializes in implementing security solutions in the modern IT environment so that customer’s can gain the critical level of insight required to manage their cyber exposure.
Gabe Safford is Tenable’s Territory Manager for Maryland, D.C. and Virginia. He works closely with clients to help them evaluate and acquire the right cybersecurity solutions to solve their critical IT challenges. Currently, his focus is on helping customers reduce risk by bringing greater awareness to their cyber exposure gap and prescribing actionable plans to mature their security posture.
Solved: Your Shared Responsibility for Security In the Cloud
While you moved your data to the cloud, your liability for its security did not go with it. Cloud vendors call it the “Shared Responsibility Model” and it describes where their Service Level Agreement stops and your responsibility starts. To make sure there are no gaps between their technology and yours, you need to deploy many of the same tools you would deploy in your own datacenter. You need to deploy them across all your SaaS and you need to manage them across all your cloud.
Avanan, The Cloud Security Platform, protects data in any SaaS. Partnering with the industry’s most trusted security vendors, it offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, insider threats and more. The cloud-based platform is completely out-of-band and can be deployed in one click.
It is the next generation of cloud security.
Vice President, Technology & Strategic Alliances
Protecting your Data from the Inside
Data Security is a term that covers a broad spectrum of approaches. Perimeter solutions are vital to keeping external threats out, but what if those threats get in? What if those threats have been inside all along? This presentation will discuss the notion of a trusted insider threat and a solution to help protect your critical file assets utilizing real-time activity monitoring.
Security Operations without going blind
The Recent Voice of the Analyst report surfaced some hard, cold realizations about Security Operations – most obvious is that it is an unattainable goal to detect complex intrusions by putting security analysts in front of screens 24/7 to monitor and analyze security events. Are Automation and AI solutions the answer? How do you get started without disrupting the infrastructure that you have in place?