- This event has passed.
April 4 @ 8:00 am - 5:00 pm
The Dallas Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Chief Operating Officer
7 Security Mindsets to Adopt Today
It can be easy to get caught up in thinking if you just had that new shiny device, your network security burden would be lighter. The reality is that no one device can solve your problem, and these days it takes a completely new perspective to tackle security in the real world. In this presentation, we’ll discuss 7 security mindsets – some new, some old – and how they can help you make smarter, more practical decisions about protecting your network.
The Impact of DDoS Attacks – The Stakes Have Changed – Are You Prepared??
Distributed Denial of Service (DDoS) attacks have entered a new era! Historically DDoS attacks have used a “brute force” approach to making an online services unavailable by overwhelming your company’s internet connection. The game has changed from the “brute force” approach to a more sophisticated, multi-vector attacks. Your adversaries are patient, launching targeted attacks using deception & “smokescreen” tactics to take down your network. The frequency of DDoS attacked has risen dramatically as well. The emergence of IOT devices has led to larger, more destructive attacks from Lizard Stressor, to Mirai & now Memcache with a 1.7 tbps attack!
DDoS targets wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and presents a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about modern day DDoS attacks and best practices to protect your company against DDoS attacks while providing maximum network availability. “Bandwidth saturation” will impact your business – an attack that exceeds your internet pipe is all it takes. In this new world, “peace time” no longer exists so DDoS protection strategy is critical!
The New Art of War: Prevention Through Isolation
The state of malware has continued to evolve, but the two constants of web and email infiltration remain the same. Despite the infrastructure investments being made to secure organizations, relying on detection of good versus bad results in significant numbers of infections that continue to impact users. In this discussion, Danny Le talks about the challenges of a legacy detection approach and how a technology that has been leveraged in various previous ways is now providing a whole new level of protection with a new twist. Prevention Through Isolation.
Danny Le brings years of experience from working both in the private sector and world-class security companies, such as Proofpoint and Menlo Security. He has extensive experience in the hospitality and financial sector and is uniquely positioned to provide insight into challenges faced by large enterprises. Danny continues to share his passion for state of the art technologies with organizations of all sizes while working as a senior systems engineer for Menlo Security. He credits his success to all of his mentors and, as time permits, continues to pay it forward by working with the youth of today as a guest speaker at security events and local universities.
Thriving in Threatening Times with IT Resilience
How backup and continuity plays in a world where ransomware is prevalent and how IT resilience is the new hot buzz phrase in the industry.
Mark Jordan is CTO at Unitrends. He leads the presales engineering team, supports strategic sales opportunities with account teams, promotes partner engagement, follows industry trends and direction to shape product priorities, and evangelizes Unitrends solutions and roadmaps. Mark joined Unitrends in 2002 and has spent over 25 years in the information technology industry. Follow Mark on Twitter @MarkCJordan.
Evolution of Security
Gone are the times where traditional perimeter security saved the day. In today’s fast paced IT environment, companies are discovering the traditional methods aren’t cutting it alone. Join Secure Data Solutions and Arctic Wolf Networks to discuss the challenges of managing a complex security environment and how to get actionable results.
Fileless Malware: A Deepish Dive Into the Threat
Fileless Malware. Where did it come from? What does it look like? What in the heck can we do about it? Join Erich Mueller for a roller coaster review of the origins of Fileless Malware and how it’s evolved into the growing threat that it represents today.
Erich Mueller, CISSP is a Sr. Security Solutions Engineer with Cybereason. A former accountant, Erich has been in the Security Industry for 13 years in capacities as both an Analyst and an SE. After 7 years at Allstate Insurance as both a member of the Computer Security Incident Response Team (CSIRT) and developer/custodian of their Data Leak Prevention process, he transitioned to “the dark side” and has been with Symantec, RSA and Fidelis Cybersecurity before joining the Cybereason team last year. Erich earned his bachelor’s degree from Salve Regina University in Rhode Island majoring in Accounting and Financial Management.
Vice President of Product Marketing
Recovering From Ransomware Attacks
Ransomware is a growing threat to your business, and the consequences of an attack could be devastating—from data loss and downtime to lost revenue and damage to your reputation. Worse, should you pay the ransom, there’s no guarantee that you’ll get your data back. In fact, in about half of all reported cases, businesses didn’t. To truly safeguard your vital business systems and applications, you must adopt a ransomware protection strategy. Spend time with Christophe Bertrand, Arcserve’s Vice President of Product Marketing to learn more.
Christophe Bertrand is the Vice President of Product Marketing at Arcserve. Christophe has 25 years of experience in services, software and high-end systems marketing as well as a deep passion for the product marketing discipline and product launches.
Christophe has spent most of his career in the data storage and data protection space with companies such as Legato Systems (now EMC), VERITAS (now Symantec), Maxtor, Hitachi Data Systems and most recently DataDirect Networks where he ran product, channel and vertical marketing.
At Arcserve, Christophe has spearheaded many product launches including its award-winning UDP software and appliance. Christophe was part of the executive team that took Arcserve independent. He has acquired an extensive global experience built on many hours in the field with analysts, customers, channel and alliance partners. He has also spoken publicly at many customer and industry events, in English, French and Spanish.
Christophe earned an MBA from Bradford University (England), a BA in European Business Administration from Middlesex University (England) and a Maitrise degree from the ESC Reims Business School (France).
Senior Director, Americas Field Marketing
Cybercrime Tactics and Techniques: The State of Malware.
In 2017, hackers had a huge impact on businesses, with major outbreaks of ransomware like WannaCry and NotPetya. Join Malwarebytes to look back as we take a deep dive in what threats grabbed not only our attention but the world’s attention and hear our predictions for 2018.
Fortinet Security Fabric – Securing enterprise networks’ multiple attack surfaces
Addressing security challenges with a simple architectural approach that allows for network security without compromise.
Soheil Samouhi is a systems engineer for major accounts in the North Texas region since May 2015. He received his B.S in computer science from St. John’s University in Jamaica, NY and his M.S in telecommunications from Polytechnic University of New York. He holds various information technology and network security industry certifications as well. He has 12 years of experience working in various network security engineering and consulting roles in many different industries including healthcare and utilities.
Security Product Manager
Create Your Cloud Security Strategy
Public, private, and hybrid cloud architectures are rapidly transforming the landscape of traditional data centers and your security strategies must transform with them.
Agile teams, DevOps, and microservices provide unlimited options and scalability, but cloud systems must be secured against the constant threats launched against them.
The dynamic ability to automatically increase or decrease your computing footprint to meet scalability demands is a wonderful cloud benefit, but how do you secure what you cannot see?
Join this Bob Erdman to learn about cloud security best practices for protecting your systems.
We’ll show you how to:
- Gain visibility into your cloud security blind spot
- Maintain a consistent security policy across traditional, hybrid, and cloud deployed systems
- What are the shared responsibilities of operating in a secure cloud environment
- Create an automated cloud security assessment model
This session will arm you with the information you need to secure your systems against today’s most pressing threats.
Bob has more than two decades of experience securing Linux, Unix, and Windows platforms. He has implemented security solutions for government, healthcare, and other corporate entities covering a wide variety of technologies.
Risks Hiding in Plain Sight: Mobile & Web App Vulnerability Benchmarks
As NowSecure Chief Mobility Officer, industry veteran Brian Reed brings over a dozen years experience in mobile, security and risk including Good Technology, BlackBerry, ZeroFOX and BoxTone. With more than 25 years driving customer value through innovative solutions and strong go-to-market strategies, Brian is a compelling speaker who brings unique insights with a global track record of success scaling startups and mid-size organizations. Brian is a graduate of Duke University.
Shifting to AI/ML/NLP Endpoint Protection- Should organization stay with legacy endpoint security stack, migrate to NGAV, or something else?
Rick Pither runs global security sales for SparkCognition. In this role, he is responsible for driving sales of the cutting-edge AI-powered cybersecurity platform the company deploys.
Areas of specialty include IT cybersecurity, virtualization, hybrid cloud, protocol analysis and network management.
Prior to SparkCognition, Pither held various executive positions at McAfee, VMware, and Secureworks over his 24 year career. He has spoken at numerous conferences and summits, most recently at the Association of Anti-Money Laundering Specialists conference.
Pither earned his bachelor’s degree in management and marketing from Purdue University.
Does Your Time to First Byte Bite?