Loading Events

« All Events

Cincinnati (Cybersecurity)

August 2 @ 8:00 am - 5:00 pm

Event Navigation


August 2
8:00 am - 5:00 pm
Event Category:


The Cincinnati Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

8:45am - 9:15amSession One
9:15am - 9:45amSession Two
9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Christopher Luzins
Key Account Manager – North America


9 Pitfalls To Avoid When Implementing an IAM Solution

IAM implementations are fraught with both technical and career challenges and dangers. In this 30-minute briefing, we’ll review some of the most common pitfalls encountered by teams implementing IAM solutions and review the best practices in order to avoid them – and be a hero.

10:45am - 11:15amSession Four
11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Tony Karam
Product Marketing

Transforming Secure Access for Improved Identity Assurance

As identity theft and credential-based attacks continue to rise, organizations are left wondering what they can do differently to protect access to their critical resources and data. If you’re looking for a new approach – one that minimizes identity risk and enables your business to be open and agile – then you can’t afford to miss this presentation. Join Tony Karam of RSA to learn how to transform the way you secure access to the modern digital enterprise.

Speaker’s Bio:

Tony Karam is currently a Senior Consultant for Identity Product Marketing at RSA. A big believer that security “takes a village”, Tony brings to his role more than 15 years of B2B information security experience – including previously leading RSA’s global authenticator strategy. Prior to his return to RSA, Tony held various senior-level marketing and product management roles at BeyondTrust, Positive Technologies and Wave Systems.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six



1:00pm - 1:30pmSession Seven

Jason Malacko
Manager, Security Practice Relationships & Offerings

Current Cyber Threat Trends and Actionable Next Steps that Make Business Sense

Hear about some of the current tools, methods, and motivations of malicious actors. In tandem, what are some effective responses that won’t leave your organization buying the proverbial $1,000 safe to protect a $100 bill.

Download the Presentation

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

Krishnan Natarajan
Director of Americas Marketing

2:15pm - 2:45pmSession Nine

Tim O’Connor

Speaker’s Bio:

Tim O’Connor works for Cadre Information Security as the lead of knowledge services and vCISO team member. He is a professional public speaker, has been working in IT for 20+ years and holds a number of certifications including CISSP, CTT+, MCSE, CISSO, CWNE, Security+ and CISSM. Tim has authored over a dozen books, has written for a number of publications and is certified as a commercial rotorcraft pilot and flight instructor. His principle hobbies include antique motorcycles, astrophotography, mentalism and doing science outreach.

2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:30pmSession Ten

Sean Heffley 
Sales Engineer, SME, Enterprise Sales Engineering

Defending Your Organization Against Ransomware

Speaker’s Bio:

Sean Heffley has been in IT for over 20 years and the past 5 years have been focused on cybersecurity.  During his 3.5 years at LogRhythm, Sean has earned the respect of both current and prospective customers by being honest, knowledgeable and personable.   Sean has worked with a variety of clients in every vertical, ranging from Fortune 500 companies to smaller organizations with the IT staff of 1.   He has presented at many security events and welcomes deep technical discussions.

Sean and his wife live in Pittsburgh, Pa and raise 4 children (all under the age of 8).  Hence, when Sean isn’t working he spends the majority of his time playing with and cleaning up after his children.  He also considers himself a reluctant expert on Disney Princesses, Power Rangers and Teenage Mutant Turtles.

3:30pm - 4:15Session Eleven
4:15pm - 4:45pmSession Twelve

Mike Fortenberry

The Top Wi-Fi Security Mistakes in 2018

Download the Presentation

4:45pm - 5:15pmSession Thirteen