Loading Events

« All Events

  • This event has passed.

Detroit (Cybersecurity)

April 12 @ 8:00 am - 5:15 pm

Event Navigation


April 12
8:00 am - 5:15 pm
Event Category:


Somerset Inn
2601 West Big Beaver Rd
Troy, MI 48084
United States
  + Google Map
(248) 643-7800


The Detroit Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cyber Security Strategies Conference.

8:45am - 9:15amSession One

Jon Peppler
Sr Director, Americas Channel Sales – Menlo Security

The Internet and Email are Evil and The Alerts Have Made Us Numb

Security practitioners are facing the most difficult of times. They are confronted by a broad range of challenges including the constant flow of headlines highlighting security breaches, declining efficacy of legacy products, and a talent crisis for hiring and retaining security professionals. Web and Phishing Isolation provides a shift in the security landscape to address these challenges. Isolation technology also provides a dramatic reduction in security alerts, relieving the burden on overtaxed security and operations staff. This is the shift in the security landscape that many organizations are welcoming.

Download the Presentation

9:15am - 9:45amSession Two

Christopher Luzins
Key Account Manager – North America

9 Pitfalls To Avoid When Implementing an IAM Solution

IAM implementations are fraught with both technical and career challenges and dangers. In this 30-minute briefing, we’ll review some of the most common pitfalls encountered by teams implementing IAM solutions and review the best practices in order to avoid them – and be a hero.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Todd O’Boyle
Director of Product Management


The Power of Your People: How to Rally Your Troops Against Phishing

This presentation will walk you through how to build a phishing protection program for your company. We reach beyond technical solutions to provide tips on getting management buy-in and how to architect the program so that it’s both effective and engaging. We wrap with some simple steps you can kick off as soon as you get back to the office!

10:45am - 11:15amSession Four

Larry Herzog
Senior Channel Sales Engineer

Deep dive on the Dark Web
So you want to be a cybercriminal? Tales from the other side

So you want to be a cybercriminal?

This presentation will focus on the logistics around setting up a ransomware campaign.  We will discuss the dark web…various malware-as-a-service offerings…and how Sophos can protect against such threats.

Download the Presentation

Speaker’s Bio:

Larry Herzog has over 25 years of IT security experience.  He has worked extensively with public, private, educational, and military organizations.  Larry joined Sophos in April of 2014.


11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Mark Bower

Securing your organization and containing the insider threat 

Despite increasing investment in the cybersecurity market, we continue to see a rise in data breaches and their related costs, specifically those relating to the insider threat (accidental loss and malicious insider). Despite these types of incidents contributing approximately 80% of all breached records, CIO focus remains on the external threat.

In this presentation, we will question whether a new approach to data security needs to be applied: one that recognizes data security can’t be tackled in silo and instead a holistic more strategic approach must be taken to protect and secure data throughout its lifecycle in order to contain the insider threat and maintain compliance.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Mike Boose
Channel Sales Engineer

The Impact of DDoS Attacks – The Stakes Have Changed – Are You Prepared??

Distributed Denial of Service (DDoS) attacks have entered a new era!  Historically DDoS attacks have used a “brute force” approach to making an online services unavailable by overwhelming your company’s internet connection. The game has changed from the “brute force” approach to a more sophisticated, multi-vector attacks.  Your adversaries are patient, launching targeted attacks using deception & “smokescreen” tactics to take down your network.  The frequency of DDoS attacked has risen dramatically as well.  The emergence of IOT devices has led to larger, more destructive attacks from Lizard Stressor, to Mirai & now Memcache with a 1.7 tbps attack!

DDoS targets wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and presents a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about modern day DDoS attacks and best practices to protect your company against DDoS attacks while providing maximum network availability.  “Bandwidth saturation” will impact your business – an attack that exceeds your internet pipe is all it takes.  In this new world, “peace time” no longer exists so DDoS protection strategy is critical!

1:00pm - 1:30pmSession Seven

Paul Penziol
Enterprise Sales Engineer

Bolstering Security with UEBA

Download the Presentation

Speaker’s Bio:

Paul is an Enterprise Sales Engineer with LogRhythm focusing on next gen SIEM and cloud based UEBA. Prior to joining LogRhythm, Paul worked for several gas, electric, and nuclear energy providers where he helped formulate and implement cybersecurity programs aligned to providing regulatory compliance.

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

Chad Ordus
Account Executive

Win Big with IT Resilience

In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.

Download the Presentation

Speaker’s Bio:

Chad is an Account Executive at Zerto helping clients solve problems focused towards reducing risk and exposure to an organization’s treasured data sets with business continuity through Zerto’s platform.  Zerto’s award-winning solution provides enterprises with continuous data replication & recovery designed specifically for virtualized infrastructures and cloud environments.

Chad has 13 years of experience in information technology covering a wide range of solutions in this time and ultimately focuses towards helping his clients succeed.

2:15pm - 2:45pmSession Nine

Preston Perich
Regional Sales Director, Ohio Valley

Jason Luttrell, CISSP
Sr. Solutions Engineer

Next Generation Endpoint Protection – What you need to know

In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.

2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:30pmSession Ten

Rob Goss
Director, Regional Sales



Internet 3.0: Networking of only trusted identities

While Networking 1.0 was about networking all PCs and giving users access to the Internet, the current era of Networking 2.0 has been focused on networking everything. These things are being networked and attempts are being made to secure them with no provable identity. Instead, we’re creating complex networking and security policies based on an IP address as identity. This creates exponential attack vectors and makes networking much more complex, costly, and fragile, introducing risk for our mission critical infrastructure. To dramatically reduce the business risks that impact most organizations today, a new identity networking paradigm is required to fix the underlying flaw in IP: a flaw that afflicts all networking and security products. Only through provable device identity can we begin to unify networking and security, overcoming the risk, complexity, and cost of today’s networks. Lowering CapEx and OpEx through radical policy simplification and segmentation, with no disruption to existing infrastructure, is now possible. With Networking 3.0, organizations can securely connect, cloak, segment, move, failover, and disconnect any connected ‘thing’ instantly – anytime, anywhere, without worry.

Download the Presentation

Speaker’s Bio:

Rob is the Regional Sales Director for the Great Lakes region for Tempered Networks where he helps enterprise organizations address complex networking projects in the new era of connectivity for environments such as Industrial IoT, M2M, multi-cloud, etc. Prior to Tempered Networks, Rob spent 16 years at F5 Networks where he was instrumental in the company’s successful IPO as one of their original Solutions Engineers. Rob transitioned to Territory Account Manager in 2004, and was a top performer in helping his enterprise customers meet their vital application delivery goals. Before F5, Rob ran the AIX and Networking practice for a large IBM reseller in Houston Texas. Rob attended school at Western Michigan University and resides outside of Detroit, Michigan.


3:30pm - 4:15pmSession Eleven

Kevin Walter
Sales Director, Security

Aruba Secure Fabric 360:  NAC and UEBA

4:15pm - 4:45pmSession Twelve

Jess Ward
Area Vice President – South/Central Region

The Top 5 Wi-Fi Security Mistakes

As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.

So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:

  • The top 5 Wi-Fi security mistakes
  • Viewing exactly what’s happening on your network
  • Building an authentication and encryption model that doesn’t force user workarounds
  • Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
  • Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models

Download the Presentation

Prize Drawings for All in Attendance
4:45pm - 5:15pmSession Thirteen

Christopher Russell
Sales Engineer

Data Center Attack: The Game

In this session we will put you in the shoes of a CISO at a hospital to see if you can go back in time to prevent a data center attack from holding critical patient data hostage. See if you have the knowledge it takes to stop a data center attack, and if not, learn what defenses you need to prevent one.

You will be prompted to make decisions that will impact your security posture. Wrong choices could result in ransomware hijacking your patient data and putting lives at risk. Right choices will show you what happens with DevOps and IT work together, will allow doctors to see patient data, and the hospital will run as expected.

After we finish the game, we will review the changing data center and threat landscape and measures you can take to prevent, detect, and respond to emerging cyber attacks.

Prize Drawings for All in Attendance