March 1 @ 8:00 am - 5:00 pm
The Jacksonville Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Covering the AV Gap: The Role of Anti-Evasion and Other Approaches
If AV could prevent all infections, this would be the only security control we’d need to safeguard endpoints. Recognizing that antivirus solutions cannot stop all attacks, enterprises turn to other types of technologies to address the remaining endpoint security gap. Some of these approaches involve restricting application capabilities using whitelisting and containment, while others focus on mitigating the risks associated with exploits.
Join this session to learn:
- What gaps exist in today’s endpoint security architecture and why?
- The pros and cons of the various antivirus augmentation technologies available today
- How Anti-Evasion will improve the security posture of your organization in a meaningful way
Sr. Systems Engineer
The Top 5 Wi-Fi Security Mistakes
Attend our Wi-Fi security presentation and see how to avoid the top 5 deployment mistakes that leave managers and their networks open to compromise.
As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.
So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:
- The top 5 Wi-Fi security mistakes
- Viewing exactly what’s happening on your network
- Building an authentication and encryption model that doesn’t force user workarounds
- Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
- Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
Regional Director – Southeast
Securing the Privileged Pathway – The Most Travelled Cyber Attack Route
Privileged Accounts are a built in vulnerability.
It’s been well documented that privileged accounts are required to carry out a breach. Put yourself in the hacker’s shoes…need access to a particular network segment or want to change firewall rules to enable external communication? Need to gain access to the domain controller? Want to dump the database table to capture a competitors customer list? Unprotected, unmonitored privileged accounts are the way to go – and at least 80% of advanced attacks involve stolen credentials.
Join Mitch Moosbrugger of CyberArk to learn how to secure the most travelled cyber attack route – the privileged pathway. Mitch will walk through real-life examples where attackers gain complete control of an organization or IT infrastructure – and show how a privilege solution could have prevented the attack.
Cyber Exposure – The Next Frontier
The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program.
Join our session to learn how CISOs can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.
Liz Leon has been with Tenable for the four years, most recently serving as a solution engineer. Liz specializes in security implementations and solutions planning. Throughout her time in engineering, she has helped countless companies gain visibility over their cyber exposure using Tenable’s solutions.
Timothy Yungwirth is a Territory Manager for Florida. For ten years, he has worked closely with clients helping them evaluate and acquire the right solution for their critical business initiatives. Currently, his focus is on helping customers reduce risk by bringing greater awareness to their cyber exposure gap.
Security Engineer – North Florida
Securing Someone Else’s Computer – Why Cloud Security Should be a Priority
Adding Cloud to your infrastructure can be a great way to add resiliency or stand up new services without the need to purchase expensive hardware. But, the migration to cloud can be fraught with security concerns. Our presentation will highlight some of security considerations when migrating to the cloud, including the default security options, advanced threat protection, and visibility of traffic and threats.
Bill Banks has been in IT security for over 18 years with the first 15 dedicated to state and local government, including the City of Tallahassee, Florida Department of Highway Safety and Motor Vehicles, and the Division of Administrative Hearings. His current position as security engineer is with Check Point Software Technologies covering the North Florida area. Bill has dedicated his career to securing information and infrastructure and continues that endeavor serving as the security expert for the North Florida area. He also enjoys writing about himself in the third person.
Director, Regional Sales