- This event has passed.
Ft. Lauderdale (Cybersecurity)
December 14, 2017 @ 8:15 am - 3:00 pm
The Ft. Lauderdale Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech Security Strategies Conference.
Today’s Threats -Ransomware and Intercept X
Security technologies are constantly evolving, but are they working together to respond to threats? Learn how Sophos defends your endpoints, data, and network and how the Synchronized Security platform enables immediate response.
Stephen Weber has been in the IT industry for 20+ years. Holding many roles throughout his career, including Network Engineer, Business Owner of an MSP and now Sales Engineer at Sophos.
Ransomware and You – Advanced protection for Modern Threats
WannaCry and the constant barrage of ransomware outbreaks have left businesses reeling as they struggle to prevent infection. IT professionals are left wondering how to protect their companies and employees from crippling ransomware attacks. To best defend against ransomware, we must look back at the history of ransomware to understand how it was created, spreads, and changes. In this presentation, we will take a deeper look into the history of ransomware and see how the evolution provides us with key insights into how to prevent future infections.
Samuel Shiflett is a Security Engineer who works for Check Point. Sam has worked at Check Point for two years after training in Israel extensively during the Fall of 2015. He holds a bachelor’s degree in information technology from the University of South Florida and is currently pursuing a master’s degree in cyber security with a concentration in cyber intelligence. A native of Pensacola, Samuel now resides in Ft. Lauderdale with his wife.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
The Impact of DDoS Attacks – The Stakes Have Changed – Are You Prepared??
Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk. From the Mirai Botnet to the recent Wannacry ransomware attack, see how DDoS attacks are being used as a “smokescreen” for other nefarious activities.
Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.
Edward (Ted) Poe
Regional Sales Director
Is there an Easy Button? – How to protect against Advanced Attacks including file-less, memory based attacks, ransomware, exploit kits, malware, adware, rootkits, callbacks and script-based attacks
From ransomware, extortionware and nation-state attacks to emerging underground services like malware and hacking as a service, there’s no limit to the number of risks enterprises and individuals deal with every day. In the face of these vulnerabilities, what is a “NextGen” endpoint solution? Why do legacy solutions continue to lose ground against both traditional malware threats and the advanced attacks? Join this session to hear about the various “Next Gen” tools in the market space and learn how to see past the hype and make an informed decision for your enterprise.
Director, North American Channels
It’s Time to Rethink Security
Last year, over $80 billion was spent on cyber security (Gartner), yet 2/3rds of organizations were still breached (Forrester). The reason? 81% of data breaches involved weak, default or stolen passwords (Verizon). Join Centrify to learn why current threats and today’s hybrid IT environment require changes to old security models and how Identity Services defends your organization against the most common cyberattacks. We’ll examine: the current (broken) state of security and the role identity plays in cyber attacks, the massive rethink underway that redefines security to follow identity, how identity services reduce the risk of breaches by over 50%, and how Centrify can uniquely help reduce risk through the power of identity services.
Senior Sales Engineer
DEVICES & YOUR BUSINESS
Device based fraud detection in the modern age and what questions to ask
Bradd has more than 25 years experience in Enterprise IT, with an emphasis on authentication, security, and fraud detection.
Director, Product Marketing for Enterprise Software
The Connected Worker and the Enterprise of Things
The smartphone is the primary communication and computing device for many of today’s consumers. This dependency on mobile devices will translate into a majority of enterprise computing outside of traditional PC computing. This will have the greatest impact with on campus (non-office-based) and off campus mobile workers who are becoming increasingly connected by rich real time communications powered by mobile applications running on wearable devices such as smart glasses. The rise of IoT in the enterprise, or the Enterprise of Things, will allow these workers to instantly connect with assets in the field to gain immediate understanding of the situation around them.
This session will explore the impact that these connected workers and endpoints will have on your enterprise and its ability to drive growth. Attendees will also learn security concerns that come with these new tools and how to best address them.
Chris Hazelton is Director, Product Marketing for Enterprise Software at BlackBerry. A former industry analyst turned IT software marketer, Chris has been working in management and security for enterprise endpoints for over 10 years. Chris leads the product marketing team for BlackBerry Enterprise software and services that secure today’s Enterprise of Things for over 20,000 companies around the world. He also oversees Global Industry Analyst Relations as well as BlackBerry’s Competitive Intelligence. Prior to BlackBerry, Chris led the Enterprise Mobility research practice at 451 Research where he authored over 500 reports on emerging mobile software and services impacting IT. While at IDC, Chris was the worldwide smartphone analyst, researching emerging trends in the mobile and wireless space that impacted the design and deployment of smartphones in enterprise and consumer markets.