Loading Events

« All Events

  • This event has passed.

Des Moines (Cybersecurity)

February 15 @ 8:00 am - 5:00 pm

Event Navigation

Details

Date:
February 15
Time:
8:00 am - 5:00 pm
Event Category:

Overview

The Des Moines Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

8:45am - 9:15amSession One

Jessica Cole
Regional Channel Manager – N. Central, from Unitrends

Protecting your Digital Assets and Business Continuity Best Practices

The only thing harder than defending yourself against Ransomware is explaining why you didn’t protect yourself from an attack.  This session will discuss challenges IT professional face today and best practices around backup and disaster recovery.

9:15am - 9:45amSession Two

Ginny Turley
Sr. Vice President

 

9 Pitfalls To Avoid When Implementing an IAM Solution

IAM implementations are fraught with both technical and career challenges and dangers. In this 30-minute briefing, we’ll review some of the most common pitfalls encountered by teams implementing IAM solutions and review the best practices in order to avoid them – and be a hero.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Todd O’Boyle
Director of Product Management

The Power of Your People: How to Rally Your Troops Against Phishing

This presentation will walk you through how to build a phishing protection program for your company. We reach beyond technical solutions to provide tips on getting management buy-in and how to architect the program so that it’s both effective and engaging. We wrap with some simple steps you can kick off as soon as you get back to the office!

10:45am - 11:15amSession Four

Larry Herzog
Sales Engineer

Stopping Unknown Threats with Sophos Intercept X

The threat landscape has shifted from known threats to unknown threats, making defenders’ jobs harder.  In order to stay ahead of the malicious actors, new approaches and methodologies are needed.  See how Sophos is answering the call with new predictive analysis techniques.

Download the Presentation

Speaker’s Bio:

Larry Herzog has over 25 years of IT security experience.  He has worked extensively with public, private, educational, and military organizations.  Larry joined Sophos in April of 2014.

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:30pmSession Five

Mike Motta

Securing your Company’s Assets with Packets

Download the Presentation

Speaker’s Bio:

Mike Motta is a well-respected instructor at Network Instruments University, with experience training thousands of people. A veteran of the IT industry, he has been using protocol analyzers on a daily basis for more than 30 years, earning his CNX certification status in 1995, GEDI certification in 2007 and WCNA certification in 2013. A network and application performance expert, Mike is the owner of Motta Network Experts in Kansas City, where he troubleshoots network problems and performs network assessments for corporations throughout North America.

Mike knows how to entertain as he trains students, making it easy to retain the information taught in his classes. With enthusiasm and extensive theoretical and hands-on knowledge of the Network Instruments products and Wireshark, there is no question too complex for Mike to answer. Class after class, students applaud Mike’s style and the relevant technical education they receive as a result of his instruction. A packet protocol guru, energetic educator, and performance management wizard, Mike delivers a valuable learning experience and equips his students with lasting real-world skills.

12:30pm - 12:45pmBreak / Vendor Booth Time
12:45pm - 1:15pmSession Six

Riley Monahan
Systems Engineer

The Enemy Within

Ransomware is both scourge and savior. While it’s not typically considered an insider threat, it acts from the inside, using insider identities, encrypting files that insiders have access to on endpoints and file shares. Learn how organizations are using ransomware to identify and confront vulnerabilities that expose them to rogue employees, abusive administrators, and hackers.

1:15pm - 1:45pmSession Seven

John Thomas

Why attackers love email and what you can do about it

Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?

In this session, you’ll learn:

  • How your email can be used as an entry point for multiple types of attack
  • The damaging impact attacks have on organizations
  • Why your employees could be the weakest link in your email security
  • How to enhance your email security and thus your overall cyber resilience

Download the Presentation

1:45pm - 2:00pmBreak / Vendor Booth Time
2:00pm - 2:30pmSession Eight

Alexander Crepas
Channel SE Manager

Reducing Cyber Exposure for the Modern Attack Surface

Download the Presentation

Speaker’s Bio:

Alexander has been working in the information security space for over 20 years in technical roles at ISS, IBM, Q1 Labs, Qualys, Sourcefire, and Tenable. He is passionate about vulnerability management and going back to the fundamentals for measuring risk.

2:30pm - 3:00pmSession Nine

Heather DeSiena
Account Manager

Solved: Your Shared Responsibility for Security In the Cloud

While you moved your data to the cloud, your liability for its security did not go with it. Cloud vendors call it the “Shared Responsibility Model” and it describes where their Service Level Agreement stops and your responsibility starts. To make sure there are no gaps between their technology and yours, you need to deploy many of the same tools you would deploy in your own datacenter. You need to deploy them across all your SaaS and you need to manage them across all your cloud.

Avanan, The Cloud Security Platform, protects data in any SaaS. Partnering with the industry’s most trusted security vendors, it offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, insider threats and more. The cloud-based platform is completely out-of-band and can be deployed in one click.

It is the next generation of cloud security and the only way to ensure there are no gaps in your cloud security.

Download the Presentation

3:00pm - 3:15pmBreak / Vendor Booth Time
3:15pm - 3:45pmSession Ten

Kimberly Pearson
Senior Systems Engineer

3 Things to consider in order to maintain Security and Packet-Level Visibility before, during and after your migration Cloud:

  1. Cloud-native solution
  2. Cost effective solution
  3. Location agnostic correlation capability – public, private or hybrid
3:45pm - 4:15pmSession Eleven

Jayme Albrecht
System Engineer

What’s in your packet?  A10 Networks SSLi eliminating the encryption blind spot

Are you confident you know what is leaving your company within TLS/SSL traffic?  Enabling security infrastructure to inspect previously invisible traffic, detect hidden threats and defend against them.   Organizations require the help of A10 SSLi to decrypt once, and feed to a variety of security devices.

Prize Drawings for All in Attendance
4:15pm - 4:45pmSession Twelve

Peter Lundstedt
Director, Information Security & Compliance, Drake University

Ryan Weston
ACS

Capitalizing on Breach Fascination

How to keep your Cybersecurity…SQUIRREL! Attend this session to learn how to take back control of your Cybersecurity strategy and avoid chasing shiny objects every time a new breach hits the headlines. Peter Lundstedt, Director, Information Security & Compliance for Drake University will discuss:

  • What is “Breach Fascination”
  • How it impacts your organization & Cybersecurity strategy
  • How to regain control of the conversation
  • How to leverage Breach Fascination to support your strategy

Download the Presentation

Speaker’s Bio:

Peter Lundstedt currently serves as the Director of Information Security & Compliance for Drake University, encompassing over 6,000 faculty, staff, and students from more than 40 U.S. states and 40 countries. He has been with Drake since 2014, and is responsible for all aspects of the security program, including risk management, governance, incident response, compliance, and business continuity. Peter has spent the majority of the last 10 years in a variety of security and privacy positions at organizations in central Iowa. He holds a degree in Systems and Network Administration, as well as several information security designations.

Prize Drawings for All in Attendance

Sponsors