- This event has passed.
August 2 @ 8:00 am - 5:15 pm
About Our Event
The Cincinnati Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area.
THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Cybersecurity Strategies Conference.
An Industry perspective: How to leverage Isolation to 100% eliminate malware from email links and web browsing
Carlos’ 20 year career has spanned a wide breadth of Cyber Security industry solutions: cloud infrastructure security, endpoint security, governance risk and compliance, network security, threat detection and protection as well as isolation and virtualization based security solutions. His experience comes from his work at Cisco Systems, Citrix, Darktrace, Dome9 Security and now at Menlo Security. As an expert on security best practices, trends, and emerging technologies, Carlos helps Cyber Security executives to create value in light of limited security operations to properly protect, detect and respond to today’s cyber threats.
VP of Sales
Rethinking Ways To Prevent Malicious Code
Key Account Manager – North America
9 Pitfalls To Avoid When Implementing an IAM Solution
IAM implementations are fraught with both technical and career challenges and dangers. In this 30-minute briefing, we’ll review some of the most common pitfalls encountered by teams implementing IAM solutions and review the best practices in order to avoid them – and be a hero.
Channel Sales Engineer
Just Say No… to bad cybersecurity practices…
Come and hear why you should just say no…to bad cybersecurity practices. In a humorous, engaging and poignant talk, come listen to Matt cybersecurity practices you should… “Just Say No” to…
In elementary school, Matt Pannebaker once drew a picture of a rabbit that got him three gold stars. Since that time he’s honed his show-and-tell skills to achieve the positon of Sophos Sales Engineer, covering Southern Ohio and Kentucky. When he’s not selling the Sophos’ Endpoint, Mobile, Firewalls, Encryption and other solutions, he’s a husband, a father of three rambunctious boys and one wily dachshund, and gets away from it all through cycling and hiking.
Transforming Secure Access for Improved Identity Assurance
As identity theft and credential-based attacks continue to rise, organizations are left wondering what they can do differently to protect access to their critical resources and data. If you’re looking for a new approach – one that minimizes identity risk and enables your business to be open and agile – then you can’t afford to miss this presentation. Join Tony Karam of RSA to learn how to transform the way you secure access to the modern digital enterprise.
Tony Karam is currently a Senior Consultant for Identity Product Marketing at RSA. A big believer that security “takes a village”, Tony brings to his role more than 15 years of B2B information security experience – including previously leading RSA’s global authenticator strategy. Prior to his return to RSA, Tony held various senior-level marketing and product management roles at BeyondTrust, Positive Technologies and Wave Systems.
Manager, Security Practice Relationships & Offerings
Current Cyber Threat Trends and Actionable Next Steps that Make Business Sense
Hear about some of the current tools, methods, and motivations of malicious actors. In tandem, what are some effective responses that won’t leave your organization buying the proverbial $1,000 safe to protect a $100 bill.
Cybercrime Tactics and Techniques:
Q2 2018 Report
New ransomware, VPNFilter attacks, compromised routers, and increases of zero-day attacks are all indicators that cybercriminals are redirecting their energy to more potentially dangerous attacks. Download the Cybercrime Tactics and Techniques: Q2 2018 Report to learn more.
Attend this seminar to:
- Find out why the FBI is involved with VPNFilter attacks.
- See how backdoor attacks have gone up 442%
- Learn how GDPR regulations increase the theft risk of Personal Identifiable Information (PII)
- Hear why cryptominers are moving on to Android and MAC but Windows systems still need to be vigilant.
Creating an Effective Security Awareness Program – Using neuroscience and adult learning techniques to take the knowledge from the conference back to your fellow employees
This presentation introduces modern offerings in security awareness training and frankly covers both the advantages and pitfalls in implementing such programs.
Tim O’Connor works for Cadre Information Security as the lead of knowledge services and vCISO team member. He is a professional public speaker, has been working in IT for 20+ years and holds a number of certifications including CISSP, CTT+, MCSE, CISSO, CWNE, Security+ and CISSM. Tim has authored over a dozen books, has written for a number of publications and is certified as a commercial rotorcraft pilot and flight instructor. His principle hobbies include antique motorcycles, astrophotography, mentalism and doing science outreach.
Defending Your Organization Against Ransomware
Sean Heffley has been in IT for over 20 years and the past 5 years have been focused on cybersecurity. During his 3.5 years at LogRhythm, Sean has earned the respect of both current and prospective customers by being honest, knowledgeable and personable. Sean has worked with a variety of clients in every vertical, ranging from Fortune 500 companies to smaller organizations with the IT staff of 1. He has presented at many security events and welcomes deep technical discussions.
Sean and his wife live in Pittsburgh, Pa and raise 4 children (all under the age of 8). Hence, when Sean isn’t working he spends the majority of his time playing with and cleaning up after his children. He also considers himself a reluctant expert on Disney Princesses, Power Rangers and Teenage Mutant Turtles.
The process in which Cybersecurity is measured has been an ongoing struggle for many. Today we will discuss how we explore the “What”, the “How” and the “Why” of Information Risk Management programs, with the goal of providing clear direction and timelines for improvement, and justification for change.
Our measurement process is designed to explore the “How” of your security program. It’s unique mixture of tactical and strategic practices allow a cross-sectional view of specific technical activities, while giving a view into the strategy that drives the program.
As a Consulting Security Engineer, Mervyn is responsible for translating customer security and compliance requirements into actionable projects, then ultimately executing successful implementation of these solutions or programs. He holds a CISSP, in addition to Certified Ethical Hacker and Hacking Forensic Investigator certifications.
Mervyn joined RTT after spending just over 3 years with Surgical Care Affiliates, where he implemented and ran a security and compliance program responsible for around 200 medical facilities around the country. Mervyn, supported by a small team and trusted partners, helped SCA successfully transition into operation as a publicly traded company, while building the Information Risk Management program. In addition to implementing the technical controls necessary, including disk encryption and enhanced authorization procedures, he and his team improved and implemented Administrative Controls by educating end users and garnering increased Executive support for security initiatives.
Before joining SCA, Mervyn worked in Security and larger Information Technology capacities in Manufacturing and Forestry industries, including time spent as a Software Developer and a Server Engineer.
Mervyn holds a Masters Degree from Western Governors University in Information Security and Assurance.
The Top Wi-Fi Security Mistakes in 2018
Do I have a signature to detect that malware?
Signatures have been the primary solution for detecting malware since the early days. Today you can’t depend on signatures alone. What other technologies can we leverage? Is machine learning the answer? Could behavior monitoring actually solve all ills? What about sandbox technologies? Ken will discuss the good, the bad, and the ugly about different technology options for malware detection.
Ken has been in network security since the mid 90’s. He has participated in many security conferences including RSA, Black Hat, Def Con, and Grrr Con. But he really got his start as a youth bored at the store as he questioned the security controls used to prevent theft.