Loading Events

« All Events

Dallas (Cybersecurity)

December 5 @ 8:00 am - 5:00 pm

Event Navigation

Details

Date:
December 5
Time:
8:00 am - 5:00 pm
Event Category:

Overview

The Dallas Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cyber Security Strategies Conference.

8:45am - 9:15amSession One
9:15am - 9:45amSession Two
9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three
10:45am - 11:15amSession Four
11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:30pmSession Five
12:30pm - 12:45pmBreak / Vendor Booth Time
12:45pm - 1:30pmSession Six
1:30pm - 2:00pmSession Seven

Ricky Kumar
Advanced Solutions Architect

Security-centric Culture

Instilling a security first mindset that permeates across everything that you do within your organization is vitally important in today’s world.  Delve into some fundamental techniques that can be employed to make security the norm rather than the exception.

2:00pm - 2:15pmBreak / Vendor Booth Time
2:15pm - 2:45pmSession Eight
2:45pm - 3:15pmSession Nine

Alain Espinosa
Director of Security Operations, MSS

3:15pm - 3:30pmBreak / Vendor Booth Time
3:30pm - 4:00pmSession Ten
4:00pm - 4:45pmSession Eleven

Mike Hamilton
Founder & President

Managing Up:  Creating a Compelling Executive Justification for Improving Detection and Response

Threats are up, resources are down, and executive expectations are somewhere between unreasonable and impossible. Organizational leadership typically understands the least about IT security, yet when it doesn’t work, their jobs may be on the line (as well as your own). The question is:  How do you position IT security spend most effectively to avoid the hefty negative impact of a security breaches once they inevitably occur?

The speaker will present ideas on conducting a conversation focused on risk management of foreseeable events, with examples of outcomes to avoid the negative consequences. He will share ideas you can use to improve your own detection and response capabilities, plus describe the benefits of managed detection and response and cost avoidance options.  You’ll come away with the business case for these improvements that is quite compelling.

Speaker’s Bio:

Michael has 30 years of experience in information security, as a practitioner, consultant, executive and entrepreneur. As former Chief Information Security Officer for the City of Seattle, Michael managed information security policy, strategy, and operations for 30 government agencies. Prior, Michael was the Managing Consultant for VeriSign Global Security Consulting and in that role provided expertise for hundreds of organizations, from Fortune 100 to small private colleges, and in nearly every sector.

Michael is former Vice-Chair for the DHS State, Local, Tribal and Territorial Government Coordinating Council. His awards include Member of the Year with the Association of City and County Information Systems (ACCIS), and Collaboration Award from the Center for Digital Government. Michael recently served as a Policy Advisor for the State of Washington Office of the CIO.

4:45pm - 5:15pmSessions Twelve

Rene Kolga
Senior Director of Product Management

AV, EDR, NGAV…What’s Next in Endpoint Protection?

Antivirus has been around since the 1980s. How did it evolve in the past decade? What about hot machine learning-powered Next Generation Antivirus products promoted by well-funded startups? Or should we assume compromise and focus on the Endpoint Detection and Response (EDR) instead? What are the pros and cons of these approaches and where is endpoint security going next?

This interactive presentation will discuss the reasons behind the vulnerable state of endpoint security and include a demo of the infamous Rubber Ducky that remains practically unstoppable by today’s endpoint protection products.

You will leave the presentation with the following knowledge:

  • Understand the current state of endpoint security and latest attacks
  • Explore available endpoint protection tools, including Endpoint Detection and Response (EDR)
  • Learn about benefits and shortcomings of modern endpoint protection tools and approaches
  • See an advanced file-less attack in action
  • Learn the latest best practices and solutions that promise to reduce threat surface and minimize breaches

Download the Presentation

Speaker’s Bio:

Rene Kolga, CISSP, has over 20 years of industry experience, including expertise in endpoint protection, insider threat, encryption and vulnerability management. Rene runs Product teams at multiple Silicon Valley startups as well as Fortune 500 companies, including Symantec, Citrix, Altiris, ThinAir and Nyotron. Earlier in his career, Rene managed Customer Success and QA teams. Rene earned his Computer Science degree from Tallinn University of Technology. He also received an MBA from University of Utah. Rene frequently speaks on security topics at industry conferences like BlackHat, Gartner and (ISC)2 as well as provides commentary for publications like Forbes, CNN, US News and others.

Sponsors