August 2 @ 8:00 am - 5:00 pm
The Cincinnati Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Key Account Manager – North America
9 Pitfalls To Avoid When Implementing an IAM Solution
IAM implementations are fraught with both technical and career challenges and dangers. In this 30-minute briefing, we’ll review some of the most common pitfalls encountered by teams implementing IAM solutions and review the best practices in order to avoid them – and be a hero.
Transforming Secure Access for Improved Identity Assurance
As identity theft and credential-based attacks continue to rise, organizations are left wondering what they can do differently to protect access to their critical resources and data. If you’re looking for a new approach – one that minimizes identity risk and enables your business to be open and agile – then you can’t afford to miss this presentation. Join Tony Karam of RSA to learn how to transform the way you secure access to the modern digital enterprise.
Tony Karam is currently a Senior Consultant for Identity Product Marketing at RSA. A big believer that security “takes a village”, Tony brings to his role more than 15 years of B2B information security experience – including previously leading RSA’s global authenticator strategy. Prior to his return to RSA, Tony held various senior-level marketing and product management roles at BeyondTrust, Positive Technologies and Wave Systems.
Manager, Security Practice Relationships & Offerings
Current Cyber Threat Trends and Actionable Next Steps that Make Business Sense
Hear about some of the current tools, methods, and motivations of malicious actors. In tandem, what are some effective responses that won’t leave your organization buying the proverbial $1,000 safe to protect a $100 bill.
Director of Americas Marketing
Tim O’Connor works for Cadre Information Security as the lead of knowledge services and vCISO team member. He is a professional public speaker, has been working in IT for 20+ years and holds a number of certifications including CISSP, CTT+, MCSE, CISSO, CWNE, Security+ and CISSM. Tim has authored over a dozen books, has written for a number of publications and is certified as a commercial rotorcraft pilot and flight instructor. His principle hobbies include antique motorcycles, astrophotography, mentalism and doing science outreach.
Defending Your Organization Against Ransomware
Sean Heffley has been in IT for over 20 years and the past 5 years have been focused on cybersecurity. During his 3.5 years at LogRhythm, Sean has earned the respect of both current and prospective customers by being honest, knowledgeable and personable. Sean has worked with a variety of clients in every vertical, ranging from Fortune 500 companies to smaller organizations with the IT staff of 1. He has presented at many security events and welcomes deep technical discussions.
Sean and his wife live in Pittsburgh, Pa and raise 4 children (all under the age of 8). Hence, when Sean isn’t working he spends the majority of his time playing with and cleaning up after his children. He also considers himself a reluctant expert on Disney Princesses, Power Rangers and Teenage Mutant Turtles.
The Top Wi-Fi Security Mistakes in 2018