Loading Events

« All Events

  • This event has passed.

Hartford (Cybersecurity)

July 19 @ 8:00 am - 3:00 pm

Event Navigation


July 19
8:00 am - 3:00 pm
Event Category:


Hilton Hartford
315 Trumbull St.
Hartford, CT 06103
United States
  + Google Map


The Hartford Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 9:00amCheck-In and Opening Introductions
9:00am- 9:30amSession One

Christopher Luzins
Key Account Manager – North America


9 Pitfalls To Avoid When Implementing an IAM Solution

IAM implementations are fraught with both technical and career challenges and dangers. In this 30-minute briefing, we’ll review some of the most common pitfalls encountered by teams implementing IAM solutions and review the best practices in order to avoid them – and be a hero.

9:30am - 10:00amSession Two

Jonathan Lange
Executive Sales Manager


Innovative Endpoint Management – A Holistic Approach to Vulnerability Management, Patching, OS-Upgrades and Software Distribution

Zero Day Vulnerability, Windows Fall Anniversary Update, Office 365 Migration: Are any of these topics causing your blood pressure to rise? This seminar will show you how you can automate OS-migrations, software deployment projects, and effective security exploit management all from one easy to use Endpoint Management Suite. No university degree or nerd glasses required – buckle up!

Download the Presentation

10:00am - 10:30amBreak / Vendor Booth Time
10:30am - 11:00amSession Three

Ben Darsigny
Account Executive

Why attackers love email and what you can do about it

Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?

In this session, you’ll learn:

  • How your email can be used as an entry point for multiple types of attack
  • The damaging impact attacks have on organizations
  • Why your employees could be the weakest link in your email security
  • How to enhance your email security and thus your overall cyber resilience
11:00am - 11:30amSession Four

Kevin Kennedy
Senior Sales Engineer

Cybercrime Threats & Techniques:  State of Malware

In 2017, hackers had a huge impact on businesses, with major outbreaks of ransomware like WannaCry and NotPetya.  Join Malwarebytes to look back as we take a deep dive in what threats grabbed not only our attention but the world’s attention and hear our predictions for 2018.

Download the Presentation

Speaker’s Bio:

Kevin Kennedy joined Malwarebytes to provide senior-level, pre-sales technical support in the Northeast.  Previous stints included Ziften, an Endpoint Detection & Response vendor, and 10 years at Symantec/Veritas.  Specific areas of concentration included channel enablement and public sector customers.

11:30am - 12:00pmBreak / Vendor Booth Time / Lunch
12:00pm - 12:30pmSession Five

Jonathan Borgesen
Principal Security Consultant, SMP

Cyber Security Automation….And where it’s taking us

Download the Presentation

Speaker’s Bio:

Jonathan has nearly a decade of experience with working in the Cyber Security Industry.  During that time Jonathan has focused on educating himself and organizations on modern threats as well as the best course of action to protect against those threats. Through this methodology, Jonathan has assisted many organizations meet their security goals whether it be on the Endpoint, Network, or in the Cloud.

12:30pm - 1:00pmBreak / Vendor Booth Time
1:00pm - 1:45pmSession Six

Michael Dalton
Sr. Identity Engineer

SecurID Access: Understanding Identity Assurance

Download the Presentation

Speaker’s Bio:

Michael Dalton is a Sr Identity Engineer at RSA, the Security Division of Dell/EMC.  Over the past 25 years, his work as a security focused field sales engineer has provided a unique insight into common challenges and creative solutions available.

Michael published Network Computing magazine articles on Preparing for a Network Audit, Content Monitoring Suites to prevent Traffic Scams, Identity and Access Management product reviews and wrote the Audit and Monitoring section of the Syngress SSCP Study Guide. He lives in West Hartford, CT with his phenomenal wife Kim, sons Ben and Clark and loves to go hiking!

1:45pm - 2:15pmSession Seven

Steven Wimmer

Security Operations Without Going Blind

2:15pm - 2:30pmBreak / Vendor Booth Time
2:30pm - 3:00pmSesson Eight

Michael Herring  

Solved: Your Shared Responsibility for Security In the Cloud

When you moved your data to the cloud, your liability for its security did not go with it. Cloud vendors call it the “Shared Responsibility Model” and it describes where their Service Level Agreement stops and your responsibility starts. To make sure there are no gaps between their technology and yours, you need to deploy many of the same tools you would deploy in your own datacenter. You need to deploy them across all your SaaS and you need to manage them across all your cloud assets.

Avanan, The Cloud Security Platform, protects data in any SaaS or IaaS. Partnering with the industry’s most trusted security vendors, it offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, insider threats and more. The cloud-based platform is completely out-of-band and can be deployed in one click. It is the next generation of cloud security.

Download the Presentation

Prize Drawings for All in Attendance