- This event has passed.
March 1 @ 8:00 am - 3:00 pm
The Jacksonville Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Chief Solution Architect
A new approach to email security
Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.
Chief Solution Architect at Vade Secure, Speaker at the M3AAWG, Adrien is an email security guru. He works with and for the biggest IT and Email Related companies in the world, giving him a global vision on email threat.
Covering the AV Gap: The Role of Anti-Evasion and Other Approaches
If AV could prevent all infections, this would be the only security control we’d need to safeguard endpoints. Recognizing that antivirus solutions cannot stop all attacks, enterprises turn to other types of technologies to address the remaining endpoint security gap. Some of these approaches involve restricting application capabilities using whitelisting and containment, while others focus on mitigating the risks associated with exploits.
Join this session to learn:
- What gaps exist in today’s endpoint security architecture and why?
- The pros and cons of the various antivirus augmentation technologies available today
- How Anti-Evasion will improve the security posture of your organization in a meaningful way
Sr. Systems Engineer
The Top 5 Wi-Fi Security Mistakes
Attend our Wi-Fi security presentation and see how to avoid the top 5 deployment mistakes that leave managers and their networks open to compromise.
As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.
So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:
- The top 5 Wi-Fi security mistakes
- Viewing exactly what’s happening on your network
- Building an authentication and encryption model that doesn’t force user workarounds
- Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
- Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
Regional Director – Southeast
Securing the Privileged Pathway – The Most Travelled Cyber Attack Route
Privileged Accounts are a built in vulnerability.
It’s been well documented that privileged accounts are required to carry out a breach. Put yourself in the hacker’s shoes…need access to a particular network segment or want to change firewall rules to enable external communication? Need to gain access to the domain controller? Want to dump the database table to capture a competitors customer list? Unprotected, unmonitored privileged accounts are the way to go – and at least 80% of advanced attacks involve stolen credentials.
Join Mitch Moosbrugger of CyberArk to learn how to secure the most travelled cyber attack route – the privileged pathway. Mitch will walk through real-life examples where attackers gain complete control of an organization or IT infrastructure – and show how a privilege solution could have prevented the attack.
Cyber Exposure – The Next Frontier
The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program.
Join our session to learn how CISOs can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.
Liz Leon has been with Tenable for the four years, most recently serving as a solution engineer. Liz specializes in security implementations and solutions planning. Throughout her time in engineering, she has helped countless companies gain visibility over their cyber exposure using Tenable’s solutions.
Timothy Yungwirth is a Territory Manager for Florida. For ten years, he has worked closely with clients helping them evaluate and acquire the right solution for their critical business initiatives. Currently, his focus is on helping customers reduce risk by bringing greater awareness to their cyber exposure gap.
Security Engineer – North Florida
Securing Someone Else’s Computer – Why Cloud Security Should be a Priority
Adding Cloud to your infrastructure can be a great way to add resiliency or stand up new services without the need to purchase expensive hardware. But, the migration to cloud can be fraught with security concerns. Our presentation will highlight some of security considerations when migrating to the cloud, including the default security options, advanced threat protection, and visibility of traffic and threats.
Bill Banks has been in IT security for over 18 years with the first 15 dedicated to state and local government, including the City of Tallahassee, Florida Department of Highway Safety and Motor Vehicles, and the Division of Administrative Hearings. His current position as security engineer is with Check Point Software Technologies covering the North Florida area. Bill has dedicated his career to securing information and infrastructure and continues that endeavor serving as the security expert for the North Florida area. He also enjoys writing about himself in the third person.
Director, Regional Sales
Network 3.0: Networking of only trusted identities
How to overcome networking complexity and insecurity that makes your business vulnerable
- Learn about a new identity-based networking paradigm to overcome the underlying flaw in IP
- Understand how ‘provable’ device identity helps to unify networking and security to overcome the risk and cost of your network
- No disruption to existing infrastructure
Paula Moeller is the Director of Sales for the Southeast at Tempered Networks. Formerly, Paula has held Sales positions with publicly traded companies such as Secure Computing, Blue Coat and Imperva, as well as early stage companies such as AlgoSec and Zscaler. Combined, Paula has over 30 years of Sales and Leadership experience with the last 21 years dedicated to Cyber Security. Earlier in her career, Paula consulted with numerous companies to help them design and implement their first security solutions.
Future-proofing Multi-Factor Authentication
Are your remote access needs growing or becoming more diverse? Are you having challenges supporting access from a variety of devices? How do you make sure that their policies are consistent? Do multiple authentication policies create a security risk for your organization? We’ll address these questions and more during our session.