Loading Events

« All Events

  • This event has passed.

Jacksonville (Cybersecurity)

March 1 @ 8:00 am - 3:00 pm

Event Navigation


March 1
8:00 am - 3:00 pm
Event Category:


Jacksonville Marriott
4670 Salisbury Road
Jacksonville, FL 32256
United States
  + Google Map
(904) 296-2222


The Jacksonville Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

8:45am - 9:15amSession One

Adrien Gendre
Chief Solution Architect


A new approach to email security

Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.

Speaker’s Bio:

Chief Solution Architect at Vade Secure, Speaker at the M3AAWG, Adrien is an email security guru. He works with and for the biggest IT and Email Related companies in the world, giving him a global vision on email threat.

9:15am - 9:45amSession Two

J.J. Singley
VP Sales

Covering the AV Gap: The Role of Anti-Evasion and Other Approaches

If AV could prevent all infections, this would be the only security control we’d need to safeguard endpoints. Recognizing that antivirus solutions cannot stop all attacks, enterprises turn to other types of technologies to address the remaining endpoint security gap. Some of these approaches involve restricting application capabilities using whitelisting and containment, while others focus on mitigating the risks associated with exploits.

Join this session to learn:

  • What gaps exist in today’s endpoint security architecture and why?
  • The pros and cons of the various antivirus augmentation technologies available today
  • How Anti-Evasion will improve the security posture of your organization in a meaningful way
9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Bryan Wolski
Sr. Systems Engineer

The Top 5 Wi-Fi Security Mistakes

Attend our Wi-Fi security presentation and see how to avoid the top 5 deployment mistakes that leave managers and their networks open to compromise.

As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.

So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:

  • The top 5 Wi-Fi security mistakes
  • Viewing exactly what’s happening on your network
  • Building an authentication and encryption model that doesn’t force user workarounds
    • Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
  • Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
10:45am - 11:15amSession Four

Mitch Moosbrugger
Regional Director – Southeast

Securing the Privileged Pathway – The Most Travelled Cyber Attack Route

Privileged Accounts are a built in vulnerability.

It’s been well documented that privileged accounts are required to carry out a breach. Put yourself in the hacker’s shoes…need access to a particular network segment or want to change firewall rules to enable external communication?  Need to gain access to the domain controller?  Want to dump the database table to capture a competitors customer list?  Unprotected, unmonitored privileged accounts are the way to go – and at least 80% of advanced attacks involve stolen credentials.

Speakers Bio:

Join Mitch Moosbrugger of CyberArk to learn how to secure the most travelled cyber attack route – the privileged pathway. Mitch will walk through real-life examples where attackers gain complete control of an organization or IT infrastructure – and show how a privilege solution could have prevented the attack.

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Liz Leon
Solution Architect

Timothy Yungwirth
Territory Manager


Cyber Exposure – The Next Frontier

The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program.

Join our session to learn how CISOs can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.

Download the Presentation

Speaker’s Bio:

Liz Leon has been with Tenable for the four years, most recently serving as a solution engineer. Liz specializes in security implementations and solutions planning. Throughout her time in engineering, she has helped countless companies gain visibility over their cyber exposure using Tenable’s solutions.

Timothy Yungwirth is a Territory Manager for Florida. For  ten years, he has worked closely with clients helping them evaluate and acquire the right solution for their critical business initiatives. Currently, his focus is on helping customers reduce risk by bringing greater awareness to their cyber exposure gap.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:15pmSession Six

Bill Banks
Security Engineer – North Florida

Securing Someone Else’s Computer – Why Cloud Security Should be a Priority

Adding Cloud to your infrastructure can be a great way to add resiliency or stand up new services without the need to purchase expensive hardware.  But, the migration to cloud can be fraught with security concerns.  Our presentation will highlight some of security considerations when migrating to the cloud, including the default security options, advanced threat protection, and visibility of traffic and threats.

Download the Presentation

Speaker’s Bio:

Bill Banks has been in IT security for over 18 years with the first 15 dedicated to state and local government, including the City of Tallahassee, Florida Department of Highway Safety and Motor Vehicles, and the Division of Administrative Hearings.  His current position as security engineer is with Check Point Software Technologies covering the North Florida area.  Bill has dedicated his career to securing information and infrastructure and continues that endeavor serving as the security expert for the North Florida area.  He also enjoys writing about himself in the third person.

1:15pm - 1:45pmSession Seven

Paula Moeller
Director, Regional Sales

Network 3.0:  Networking of only trusted identities

How to overcome networking complexity and insecurity that makes your business vulnerable

  • Learn about a new identity-based networking paradigm to overcome the underlying flaw in IP
  • Understand how ‘provable’ device identity helps to unify networking and security to overcome the risk and cost of your network
  • No disruption to existing infrastructure

Download the Presentation

Speaker’s Bio:

Paula Moeller is the Director of Sales for the Southeast at Tempered Networks. Formerly, Paula has held Sales positions with publicly traded companies such as Secure Computing, Blue Coat and Imperva, as well as early stage companies such as AlgoSec and Zscaler.  Combined, Paula has over 30 years of Sales and Leadership experience with the last 21 years dedicated to Cyber Security.  Earlier in her career, Paula consulted with numerous companies to help them design and implement their first security solutions.

1:45pm - 2:00pmBreak / Vendor Booth Time
2:00pm - 2:30pm Session Eight


Troy Drewry
Product Manager

Future-proofing Multi-Factor Authentication

Are your remote access needs growing or becoming more diverse? Are you having challenges supporting access from a variety of devices? How do you make sure that their policies are consistent? Do multiple authentication policies create a security risk for your organization? We’ll address these questions and more during our session.

Prize Drawings for All in Attendance