- This event has passed.
Des Moines (Cybersecurity)
February 15 @ 8:00 am - 5:00 pm
The Des Moines Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Protecting your Digital Assets and Business Continuity Best Practices
The only thing harder than defending yourself against Ransomware is explaining why you didn’t protect yourself from an attack. This session will discuss challenges IT professional face today and best practices around backup and disaster recovery.
Sr. Vice President
9 Pitfalls To Avoid When Implementing an IAM Solution
IAM implementations are fraught with both technical and career challenges and dangers. In this 30-minute briefing, we’ll review some of the most common pitfalls encountered by teams implementing IAM solutions and review the best practices in order to avoid them – and be a hero.
Director of Product Management
The Power of Your People: How to Rally Your Troops Against Phishing
This presentation will walk you through how to build a phishing protection program for your company. We reach beyond technical solutions to provide tips on getting management buy-in and how to architect the program so that it’s both effective and engaging. We wrap with some simple steps you can kick off as soon as you get back to the office!
Stopping Unknown Threats with Sophos Intercept X
The threat landscape has shifted from known threats to unknown threats, making defenders’ jobs harder. In order to stay ahead of the malicious actors, new approaches and methodologies are needed. See how Sophos is answering the call with new predictive analysis techniques.
Larry Herzog has over 25 years of IT security experience. He has worked extensively with public, private, educational, and military organizations. Larry joined Sophos in April of 2014.
Securing your Company’s Assets with Packets
Mike Motta is a well-respected instructor at Network Instruments University, with experience training thousands of people. A veteran of the IT industry, he has been using protocol analyzers on a daily basis for more than 30 years, earning his CNX certification status in 1995, GEDI certification in 2007 and WCNA certification in 2013. A network and application performance expert, Mike is the owner of Motta Network Experts in Kansas City, where he troubleshoots network problems and performs network assessments for corporations throughout North America.
Mike knows how to entertain as he trains students, making it easy to retain the information taught in his classes. With enthusiasm and extensive theoretical and hands-on knowledge of the Network Instruments products and Wireshark, there is no question too complex for Mike to answer. Class after class, students applaud Mike’s style and the relevant technical education they receive as a result of his instruction. A packet protocol guru, energetic educator, and performance management wizard, Mike delivers a valuable learning experience and equips his students with lasting real-world skills.
The Enemy Within
Ransomware is both scourge and savior. While it’s not typically considered an insider threat, it acts from the inside, using insider identities, encrypting files that insiders have access to on endpoints and file shares. Learn how organizations are using ransomware to identify and confront vulnerabilities that expose them to rogue employees, abusive administrators, and hackers.
Why attackers love email and what you can do about it
Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Channel SE Manager
Reducing Cyber Exposure for the Modern Attack Surface
Alexander has been working in the information security space for over 20 years in technical roles at ISS, IBM, Q1 Labs, Qualys, Sourcefire, and Tenable. He is passionate about vulnerability management and going back to the fundamentals for measuring risk.
Solved: Your Shared Responsibility for Security In the Cloud
While you moved your data to the cloud, your liability for its security did not go with it. Cloud vendors call it the “Shared Responsibility Model” and it describes where their Service Level Agreement stops and your responsibility starts. To make sure there are no gaps between their technology and yours, you need to deploy many of the same tools you would deploy in your own datacenter. You need to deploy them across all your SaaS and you need to manage them across all your cloud.
Avanan, The Cloud Security Platform, protects data in any SaaS. Partnering with the industry’s most trusted security vendors, it offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, insider threats and more. The cloud-based platform is completely out-of-band and can be deployed in one click.
It is the next generation of cloud security and the only way to ensure there are no gaps in your cloud security.
Senior Systems Engineer
3 Things to consider in order to maintain Security and Packet-Level Visibility before, during and after your migration Cloud:
- Cloud-native solution
- Cost effective solution
- Location agnostic correlation capability – public, private or hybrid
What’s in your packet? A10 Networks SSLi eliminating the encryption blind spot
Are you confident you know what is leaving your company within TLS/SSL traffic? Enabling security infrastructure to inspect previously invisible traffic, detect hidden threats and defend against them. Organizations require the help of A10 SSLi to decrypt once, and feed to a variety of security devices.
Director, Information Security & Compliance, Drake University
Capitalizing on Breach Fascination
How to keep your Cybersecurity…SQUIRREL! Attend this session to learn how to take back control of your Cybersecurity strategy and avoid chasing shiny objects every time a new breach hits the headlines. Peter Lundstedt, Director, Information Security & Compliance for Drake University will discuss:
- What is “Breach Fascination”
- How it impacts your organization & Cybersecurity strategy
- How to regain control of the conversation
- How to leverage Breach Fascination to support your strategy
Peter Lundstedt currently serves as the Director of Information Security & Compliance for Drake University, encompassing over 6,000 faculty, staff, and students from more than 40 U.S. states and 40 countries. He has been with Drake since 2014, and is responsible for all aspects of the security program, including risk management, governance, incident response, compliance, and business continuity. Peter has spent the majority of the last 10 years in a variety of security and privacy positions at organizations in central Iowa. He holds a degree in Systems and Network Administration, as well as several information security designations.