Loading Events

« All Events

  • This event has passed.

Columbus (Cybersecurity)

January 18 @ 8:00 am - 5:00 pm

Event Navigation


January 18
8:00 am - 5:00 pm
Event Category:


Embassy Suites Dublin
5100 Upper Metro Place
Dublin, OH 43017
United States
  + Google Map


The Columbus Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cyber Security Strategies Conference.

8:45am - 9:15amSession One

Peter Scudamore
Senior Network Engineer

Know Before You Go: Your Journey to the Cloud Doesn’t Have to be Filled with Potholes and Dead-ends

The presentation will provide a baseline of the advantages of an IT strategy which includes public cloud; including “pets vs. cattle”, scaling up vs. scaling out, taking advantage of the economy of scale. The presentation will also cover common pitfalls that Nexum has observed which can derail a cloud migration project with devastating side effects; and how to avoid them.

9:15am - 9:45amSession Two

Ginny Turley
Senior Vice President

9 Pitfalls To Avoid When Implementing an IAM Solution

IAM implementations are fraught with both technical and career challenges and dangers. In this 30-minute briefing, we’ll review some of the most common pitfalls encountered by teams implementing IAM solutions and review the best practices in order to avoid them – and be a hero.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Todd O’Boyle
Co-Founder and Chief Technology Officer

The Power of Your People: How to Rally Your Troops Against Phishing

This presentation will walk you through how to build a phishing protection program for your company. We reach beyond technical solutions to provide tips on getting management buy-in and how to architect the program so that it’s both effective and engaging. We wrap with some simple, free steps you can kick off as soon as you get back to the office!

10:45am - 11:15amSession Four

Matt Pannebaker
Sales Engineer

The Dangers of Mobile Malware

Speaker’s Bio:

In elementary school, Matt Pannebaker once drew a picture of a rabbit that got him three gold stars.  Since that time he’s honed his show-and-tell skills to achieve the positon of Sophos Sales Engineer, covering Southern Ohio and Kentucky.  When he’s not selling the Sophos’ Endpoint, Mobile, Firewalls, Encryption and other solutions, he’s a husband, a father of three rambunctious boys and one wily dachshund, and gets away from it all through cycling and hiking.

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Josh Etsten
East Solutions Architect

Balancing Negative and Positive Security Models to Strengthen Endpoint Protection

Organizations have almost universally deployed endpoint security, yet with less than stellar efficacy against advanced attacks. Next-Generation endpoint solutions are struggling with algorithmic-based models of past ‘bad’ behaviors, to predict the next unknown attack or unknown vulnerability. The advent of modern phishing campaigns, fileless malware, nation-state tool kits, and new vulnerabilities, highlights the need for a fresh look at OS-Centric Positive Security Models to protect data on endpoints.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Rob Cheng

Defeating Ransomware

In today’s threat landscape, new forms of malware are taking their toll on business and government agencies, crippling those organizations by victimizing users in a number of ways. In this session, PC Pitstop’s CEO, Rob Cheng, discusses the growing ransomware epidemic, the best practices to utilize in defense, and where in the world these practices are best utilized.

1:00pm - 1:45pmSession Seven

Preston Perich
Regional Sales Director, Ohio Valley

Next Generation Endpoint Protection – What you need to know

In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.

1:45pm - 2:00pmBreak/ Vendor Booth Time
2:00pm - 2:30pmSession Eight

David Wiseman
Sr. Director Product Marketing


The Connected Worker and the Enterprise of Things

The smartphone is the primary communication and computing device for many of today’s consumers. This dependency on mobile devices will translate into a majority of enterprise computing outside of traditional PC computing. This will have the greatest impact with on campus (non-office-based) and off campus mobile workers who are becoming increasingly connected by rich real time communications powered by mobile applications running on wearable devices such as smart glasses. The rise of IoT in the enterprise, or the Enterprise of Things, will allow these workers to instantly connect with assets in the field to gain immediate understanding of the situation around them.

This session will explore the impact that these connected workers and endpoints will have on your enterprise and its ability to drive growth. Attendees will also learn security concerns that come with these new tools and how to best address them.

Download the Presentation

Speaker’s Bio:

David Wiseman is head of the global product and field marketing teams at BlackBerry. In his role, David oversees worldwide product positioning, product messaging, product marketing strategy, go-to market strategy, demand generation programs and pipeline development for BlackBerry’s enterprise software and services.

2:30pm - 3:00pmSession Nine

Mike Fortenberry
Regional Sales Manager

The Top 5 Wi-Fi Security Mistakes   

As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.


So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:


  • The top 5 Wi-Fi security mistakes
  • Viewing exactly what’s happening on your network
  • Building an authentication and encryption model that doesn’t force user workarounds
  • Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
  • Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
3:00pm - 3:15pmBreak / Vendor Booth Time
3:15pm - 3:45pmSession Ten

Christian Barnes
Principal Systems Engineer, Central Region

Infrastructure Based Security

As the enterprise continues to be bombarded with advanced and increasingly more sophisticated attacks, the CISO must shift to accomplish three critical objectives:

Gain Superior Visibility and Control over their environment

Automate tasks that enhance security posture

Utilize integrated systems that identify breaches and facilitate rapid remediation

This can only be done by partnering with vendors that have strong threat research, broad capabilities, powerful tools and integrations with existing tools.

Fortinet offers it’s Fabric as a foundational component to this vision.

3:45pm - 4:15pmSession Eleven

Andrew Gray
Account Executive

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

Speaker’s Bio:

Andrew is an Account Executive at Zerto helping clients solve problems focused towards reducing risk and exposure to an organization’s treasured data sets with business continuity through Zerto’s platform.  Zerto’s award-winning solution provides enterprises with continuous data replication & recovery designed specifically for virtualized infrastructures and cloud environments.

Andrew has 12 years of experience in information technology covering a wide range of solutions in this time and ultimately focuses towards helping his clients succeed.  He’s based in Columbus covering all of OH.


Prize Drawing for All in Attendance
4:15pm - 5:00pmSession Twelve

Romain Basset
Presales Engineer


A new approach to email security

Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.

Download the Presentation

Speaker’s Bio:
Romain is a presales engineer at Vade Secure, a company which provides predictive email defense powered by artificial intelligence to its customers.

Throughout his career in Cyber Security Romain has worked for various European companies Airbus Defense & Space and Stormshield, and now helps companies all around to world to protect from email-borne threats.

Prize Drawings for All in Attendance