Loading Events

« All Events

Ft. Lauderdale (Cybersecurity)

December 13 @ 8:00 am - 5:00 pm

Event Navigation


December 13
8:00 am - 5:00 pm
Event Category:


The Westin Fort Lauderdale
400 Corporate Drive
Fort Lauderdale, 33334
United States
  + Google Map


The Ft. Lauderdale Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

8:45am - 9:15amSession One
9:15am - 9:45amSession Two
9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Don Byrne  

How They Bypass Office 365 Security

The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.

During this session, we’ll demonstrate how to protect Office 365 from:

  • Email-based phishing, spoofing, and malware
  • Account takeover, insider threats, compromised Microsoft credentials
  • Loss of sensitive data from OneDrive, SharePoint and Office 365
10:45am - 11:30amSession Four
11:30am - 12:00pmBreak / Vendor Booth Time / Lunch
12:00pm - 12:45pmSession Five
12:45pm - 1:00pmBreak / Vendor Booth Time
1:00pm - 1:30pmSession Six
1:30pm - 2:00pmSession Seven
2:00pm - 2:15pmBreak / Vendor Booth Time
2:15pm - 2:45pmSession Eight

Paula Moeller
Director, Regional Sales


Segmentation Made Simple

Most networks are really good at making you feel overwhelmed, ill-equipped and exposed. Meanwhile, you’re being tasked with connecting virtually every ‘thing’, including machines and endpoints never intended to be networked. How can you securely connect such a wide array of distributed systems, devices, and equipment at scale?

The practical way forward is networking endpoints with provable identities using automated, policy-based orchestration for enterprise scale. Now, local and wide area micro-segmentation is not only possible, but simple.

As more machines require secure connectivity, networking seems to have become a black magic, since it’s impossible to give every device its own unique IP address. There’s an assortment of workarounds using multi-NAT environments, or Carrier Grade NAT, but it’s now virtually impossible to punch through and connect distributed systems. IP address limitations are prohibitive, making functions such as cloud peering between VPCs virtually impossible.

In this session, you’ll learn how to overcome previously impossible networking hurdles by giving your machines and endpoints a unique and provable identity. You can now easily and instantly provision, connect, disconnect, failover, or quarantine any connected resource using simple point-and-click orchestration for all your ‘things’ – on the ground, on the move, or in the cloud.