- This event has passed.
January 25 @ 8:00 am - 5:00 pm
The Houston Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cyber Security Strategies Conference.
Threat Intelligence and Layered Security in the WannaCry Era
The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside
Senior Systems Engineer, South Central
The New Art of War: Prevention Through Isolation
The state of malware has continued to evolve, but the two constants of web and email infiltration remain the same. Despite the infrastructure investments being made to secure organizations, relying on detection of good versus bad results in significant numbers of infections that continue to impact users. In this discussion, Danny Le talks about the challenges of a legacy detection approach and how a technology that has been leveraged in various previous ways is now providing a whole new level of protection with a new twist. Prevention Through Isolation.
Danny brings years of experience from working both in the private sector and world class security companies, such as Proofpoint and Menlo Security. He has extensive experience in the hospitality and financial sector and is uniquely positioned to provide insight into challenges faced by large enterprises. Danny continues to share his passion for state of the art technologies with organizations of all sizes while working as a senior systems engineer for Menlo Security. He credits his success to all of his mentors and, as time permits, continues to pay it forward by working with the youth of today as a guest speaker at security events and local universities.
Ransomware – The Threat Is Real
Ransomware has become a Board-level conversation. The threat from ransomware continues to grow as experts say that up to 40% of all email spam contains ransomware. Ransomware has become so prolific that it is no longer a question of “if” you are going to get hit with this type of malware, but when. A solid backup vendor and process is the only way to get ransomware protection, but not all backup vendors completely solve the issue.
Test, Test and Test Again – Know the Time of Your Last Successful Backup
For effective ransomware protection, it is critical to know the exact time of your last good backup. This is the point that you can be assured that your data is fully protected, uncorrupted, and available for recovery. Testing should include running trial recoveries up to the point of actually launching a backup application. This ensures that all files, settings, applications, and data are available for recovery. Unitrends Recovery Assurance software performs automatic testing of backup data, settings, and applications, doing trial recoveries to ensure your backup is working and your ransomware protection is effective. This gives you 100% confidence you can meet your Recovery Point Objectives (RPOs) and Recovery Time Objectives (RTOs).
Better Data to your SIEM: The ability to make decisions based on evidence HINGES on Your ability to capture, access and use it.
Field Chief Technology Officer
Business-Driven Security, Identity and the New Age of Risk
In the constantly changing landscape of cyber risk, security and risk management teams (including executives and board members) are increasingly forced to take ownership of and accountability relating to digital risks. Yet, many lack the critical knowledge to make effective risk management decisions and incorporate them into their overall business strategy. This inevitably leads to security strategies which are ineffective and reactionary. This presentation will outline RSA’s Business-Driven Security strategy, and will focus particularly on the importance of leveraging identity and access management (IAM) as a key tool in the battle against adversaries both within and outside your environment.
Does Your Time to First Byte Bite?
Securing Cloud Networks
Moving to the cloud presents many benefits, including the elimination of self-managed hardware, increased efficiency in development, and improved capabilities to scale resources based on demand. The dynamic nature of these environments and increased importance on speed and agility also bring new challenges with regards to security. In this presentation I will discuss some of the common cloud use cases and how the Palo Alto Next-Generation Security Platform can be used to enhance visibility and control of network traffic as part of a robust overall cloud security program.
Aaron Lennon is a Security Architect at Critical Start, a cybersecurity company with a cloud-first approach. Aaron is a Certified Information Systems Security Professional (CISSP) and AWS Architect with extensive experience in network design, security architecture and security operations. Aaron helps organizations navigate their transition to the cloud by incorporating established security standards and best practices into cloud architecture design and operational management.
Security Global Enablement Manager
Create a Culture of Cyber Security Leadership
Enable business leaders at your organization to prioritize and discuss security in their initiatives. It’s time to open managers eyes to the fact that while you have implemented security controls and good policy, without proactive measures 1 in 14 employees will fall victim to social engineering attacks. In this interactive session we will discuss how you can help change the culture of your organization to create Cyber Security champions that integrate security leadership principles into the business including SDLC, governance processes, access controls, projects and communications. Come away with actionable ideas and content you can use to change the game and build a culture of Cyber Security Leadership.
Director, Product Marketing for Enterprise Software
The smartphone is the primary communication and computing device for many of today’s consumers. This dependency on mobile devices will translate into a majority of enterprise computing outside of traditional PC computing. This will have the greatest impact with on campus (non-office-based) and off campus mobile workers who are becoming increasingly connected by rich real time communications powered by mobile applications running on wearable devices such as smart glasses. The rise of IoT in the enterprise, or the Enterprise of Things, will allow these workers to instantly connect with assets in the field to gain immediate understanding of the situation around them.
This session will explore the impact that these connected workers and endpoints will have on your enterprise and its ability to drive growth. Attendees will also learn security concerns that come with these new tools and how to best address them.
The Enemy Within: Understanding Insider Threats
Sonya Wilcox brings over 15 years of IT industry experience to Varonis, a company specializing in Data Governance and User Behavior Analytics. As a Systems Engineer for Varonis’s public sector in the TOLA region, she works closely with organizations to understand the value of digital assets and the importance of data classification as part of an overall data security profile. Sonya’s past experience includes architecting and implementing secure, redundant messaging and Active Directory systems for large enterprises. Sonya will share commonsense insight into how organizations identify and solve the often overlooked challenges related to risk associated with manual process used to enforce data classification, user authentication, permissions access & authorization, and accountability controls.
Mary McDonald Miller
Regional Sales Manager
The Top 5 Wi-Fi Security Mistakes
Learn how to avoid the top 5 deployment mistakes that leave managers and their networks open to compromise.
As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.
How do different security models stand up to this new reality, and how secure is your connection? We’ll cover the following during our session:
- The top 5 Wi-Fi security mistakes
- Viewing exactly what’s happening on your network
- Building an authentication and encryption model that doesn’t force user workarounds
- Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
- Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
Mary McDonald Miller serves as regional sales manager for the South Texas and Louisiana market at Aerohive Networks, a leader in cloud networking and enterprise Wi-Fi. In this role, Miller develops, manages and drives strategic relationships with commercial and public accounts. She has worked in the network space and lived in Texas since 1999.
Senior Manager – Sales Engineers
CSI and your Organization
We will review how an organization can be effected by a breach and other aspects to consider. We aim to provide things to think about when looking at tools and strategies for protecting your company from threats.