Loading Events

« All Events

Birmingham (Cybersecurity)

November 2 @ 8:15 am - 5:00 pm


November 2
8:15 am - 5:00 pm
Event Category:


The Birmingham Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Tech Security Conference.

8:45am - 9:15amSession One

Ted Gruenloh

Threat Intelligence and Layered Security in the WannaCry Era

The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.

9:15am - 9:45amSession Two

Kevin Cleary
Global Account Manager

Leverage the Cloud to Minimize the Impact of Ransomware

Download the Presentation

Speaker’s Bio:

Kevin is a seasoned professional with a history of cloud-based solutions selling, including nearly 6 years with Druva. He is Pittsburgh native who is based in Atlanta, GA and manages both regional and global accounts. He is a US Army veteran with an engineering degree from Rensselaer Polytechnic Institute and an MBA from Emory’s Goizueta Business School. He is an avid athlete who enjoys a variety of competitive sports in his free time.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three
10:45am - 11:15amSession Four

Ken Swain

Keep Ransomware Out.  How you can stop ransomware and exploits before they strike

From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.

Learn how you can get innovative endpoint protection without impacting performance.

·        Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
·        Detect: quickly and easily detect and isolate attacks
·        Respond: laser in on critical alerts and address them with simple to understand security intelligence

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

John Krug
Area Security Specialist – Southeast

The attack surface is expanding.  Can your endpoint security hold its own?

Modern cybersecurity requires you to adapt, evolve, and reassess as you progress. After all, hackers are doing the same – executing and selling new threats designed to exploit even the most advanced security strategy. Shrinking the attack surface is key—making it harder for threats to get through, and giving your security team and solutions a fighting chance to take on the ones that breach your defenses. The best way to go about it? Defense in depth – a layered approach designed to help you close the gaps and stay on top of your security posture.

•  Discover the full breadth of risk
•  Reduce the attack surface
•  Detect malicious activity
•  Analyze data for better results

Ivanti provides simple streamlined tools that automate security processes, simplifying prevention and freeing your team from the burden of detecting and investigating threat alerts. Join us for a discussion about the ever-changing threat landscape and how to more effectively protect your company from insidious attack.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:15pmSession Six
1:15pm - 1:45pmSession Seven

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation


1:45pm - 2:00pmBreak / Vendor Booth Time
2:00pm - 2:30pmSession Eight

Tony Munno
AVP, Mid-South and Federal Sales

Secure Data – A Safe Place in an Unsafe World 

The backing up of data has been important since computers became part of business yet many organizations have inadequate, outdated, nonfunctioning or even nonexistent backup operations.  In this session, we will have a brief discussion on questions like these:

Are you backing up critical data every day? Are you regularly meeting your backup window? Does your backup architecture need updating? Are you spending too much (or too little) on protecting your data? Can your company recover everything needed in a timely manner if a disaster struck? Does the possibility of a ransomware attack give you cause for concern?

2:30pm - 3:00pmSession Nine
3:00pm - 3:15pmBreak / Vendor Booth Time