- This event has passed.
January 18 @ 8:00 am - 5:00 pm
The Columbus Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Cyber Security Strategies Conference.
Senior Network Engineer
Know Before You Go: Your Journey to the Cloud Doesn’t Have to be Filled with Potholes and Dead-ends
The presentation will provide a baseline of the advantages of an IT strategy which includes public cloud; including “pets vs. cattle”, scaling up vs. scaling out, taking advantage of the economy of scale. The presentation will also cover common pitfalls that Nexum has observed which can derail a cloud migration project with devastating side effects; and how to avoid them.
Senior Vice President
9 Pitfalls To Avoid When Implementing an IAM Solution
IAM implementations are fraught with both technical and career challenges and dangers. In this 30-minute briefing, we’ll review some of the most common pitfalls encountered by teams implementing IAM solutions and review the best practices in order to avoid them – and be a hero.
Co-Founder and Chief Technology Officer
The Power of Your People: How to Rally Your Troops Against Phishing
This presentation will walk you through how to build a phishing protection program for your company. We reach beyond technical solutions to provide tips on getting management buy-in and how to architect the program so that it’s both effective and engaging. We wrap with some simple, free steps you can kick off as soon as you get back to the office!
The Dangers of Mobile Malware
In elementary school, Matt Pannebaker once drew a picture of a rabbit that got him three gold stars. Since that time he’s honed his show-and-tell skills to achieve the positon of Sophos Sales Engineer, covering Southern Ohio and Kentucky. When he’s not selling the Sophos’ Endpoint, Mobile, Firewalls, Encryption and other solutions, he’s a husband, a father of three rambunctious boys and one wily dachshund, and gets away from it all through cycling and hiking.
East Solutions Architect
Balancing Negative and Positive Security Models to Strengthen Endpoint Protection
Organizations have almost universally deployed endpoint security, yet with less than stellar efficacy
s, to predict the next unknown attack or unknown vulnerability. The advent of modern phishing campaigns, fileless malware, nation-state tool kits, and new vulnerabilities, highlights the need for a fresh look at OS-Centric Positive Security Models to protect data on endpoints.
In today’s threat landscape, new forms of malware are taking their toll on business and government agencies, crippling those organizations by victimizing users in a number of ways. In this session, PC Pitstop’s CEO, Rob Cheng, discusses the growing ransomware epidemic, the best practices to utilize in defense, and where in the world these practices are best utilized.
Regional Sales Director, Ohio Valley
Next Generation Endpoint Protection – What you need to know
In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.
Sr. Director Product Marketing
The smartphone is the primary communication and computing device for many of today’s consumers. This dependency on mobile devices will translate into a majority of enterprise computing outside of traditional PC computing. This will have the greatest impact with on campus (non-office-based) and off campus mobile workers who are becoming increasingly connected by rich real time communications powered by mobile applications running on wearable devices such as smart glasses. The rise of IoT in the enterprise, or the Enterprise of Things, will allow these workers to instantly connect with assets in the field to gain immediate understanding of the situation around them.
This session will explore the impact that these connected workers and endpoints will have on your enterprise and its ability to drive growth. Attendees will also learn security concerns that come with these new tools and how to best address them.
David Wiseman is head of the global product and field marketing teams at BlackBerry. In his role, David oversees worldwide product positioning, product messaging, product marketing strategy, go-to market strategy, demand generation programs and pipeline development for BlackBerry’s enterprise software and services.
Regional Sales Manager
The Top 5 Wi-Fi Security Mistakes
As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.
So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:
- The top 5 Wi-Fi security mistakes
- Viewing exactly what’s happening on your network
- Building an authentication and encryption model that doesn’t force user workarounds
- Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
- Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
Principal Systems Engineer, Central Region
Infrastructure Based Security
As the enterprise continues to be bombarded with advanced and increasingly more sophisticated attacks, the CISO must shift to accomplish three critical objectives:
Gain Superior Visibility and Control over their environment
Automate tasks that enhance security posture
Utilize integrated systems that identify breaches and facilitate rapid remediation
This can only be done by partnering with vendors that have strong threat research, broad capabilities, powerful tools and integrations with existing tools.
Fortinet offers it’s Fabric as a foundational component to this vision.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Andrew is an Account Executive at Zerto helping clients solve problems focused towards reducing risk and exposure to an organization’s treasured data sets with business continuity through Zerto’s platform. Zerto’s award-winning solution provides enterprises with continuous data replication & recovery designed specifically for virtualized infrastructures and cloud environments.
Andrew has 12 years of experience in information technology covering a wide range of solutions in this time and ultimately focuses towards helping his clients succeed. He’s based in Columbus covering all of OH.
A new approach to email security
Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.
Romain is a presales engineer at Vade Secure, a company which provides predictive email defense powered by artificial intelligence to its customers.
Throughout his career in Cyber Security Romain has worked for various European companies Airbus Defense & Space and Stormshield, and now helps companies all around to world to protect from email-borne threats.