- This event has passed.
Kansas City (Cybersecurity)
September 21, 2017 @ 8:15 am - 5:15 pm
The Kansas City Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Tech-Security Strategies Conference.
Threat Intelligence and Layered Security in the WannaCry Era
The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.
Leveraging Machine Analytics to Reduce Risk
Business-Driven Security: A New Plan for Chaos
We will discuss how and why key-business drivers shape your security operations. We go beyond the guidance provided by NIST, and take a look at Risk Management, Threat Intelligence, Incident Workflow & Classification, Staffing Models, Use Cases & Prioritization, Escalation Plans, Security Controls, and Key Performance Indicators.
Sean comes from a vast background in financial planning, analysis, GRC, and Security. Sean’s hands on experience as both a practitioner and a security engineer have proven to be tremendous assets for his colleagues and customers. His abilities to connect across industry and organizations give him a leg up when engaged in those difficult cyber conversations. Sean is currently completing his CISSP, CSA and numerous other Security certifications. In addition, Sean is deeply embedded in the Kansas City technology community where you are likely to find him at ISC2 and ISSA events in his free time.
Tom Winburn, GCIH
Security Consulting Systems Engineer
Network and Security, how to mix oil and water
Tom Winburn is the Consulting Systems Engineer for Cisco’s Security Portfolio covering Enterprise customers in the midwest. With over 18 years of experience in IT ranging from Layer 1 networking to Network Engineering eventually to Cybersecurity Operations and Engineering, penetration testing, incident response. He is well versed in various aspects of Enterprise security challenges. He has worked in various business segments including DoD, Telecom, and other IT based companies. His credentials include a Masters Degree in Cybersecurity, and is a GIAC Certified Incident Handler (GCIH)
Securing the Digital Workplace
Cyber Threats are only increasing. Attackers are shifting their tactics as we shift our security strategies. Join us for a discussion about the every changing threat landscape and how you can more effectively protect your company from these threats. In this session we will talk about how cyber threats have increased in 2016, where attackers are shifting to, and what industry experts are recommending to address these shifts.
Securing your Company’s Assets with Packets
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Central Region Channel Sales
The Impact of DDoS Attacks – The Stakes Have Changed – Are You Prepared??
Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk. From the Mirai Botnet to the recent Wannacry ransomware attack, see how DDoS attacks are being used as a “smokescreen” for other nefarious activities.
In today’s threat landscape, new forms of malware are taking their toll on business and government agencies, crippling those organizations by victimizing users in a number of ways. In this session, PC Pitstop’s CEO, Rob Cheng, discusses the growing ransomware epidemic, the best practices to utilize in defense, and where in the world these practices are best utilized.
Cloudpath: Security starts with secure access
Join us for a discussion about secure device access and how Ruckus addresses secure access ranging from K-12 to Smart City solutions. Also, learn the basics of secure access in both wired and wireless environments.
Next Generation Endpoint Protection – What you need to know
In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.
Channel Account Manager
A Massive Rethink of Security
Last year, over $80 billion was spent on cyber security (Gartner), yet 2/3rds of organizations were still breached (Forrester). The reason? 81% of data breaches involved weak, default or stolen passwords (Verizon).
Join us to learn why current threats and today’s hybrid IT environment require changes to old security models and how Identity Services defends your organization against the most common cyberattacks.
· The current (broken) state of security and the role identity plays in cyber attacks
· The massive rethink underway that redefines security to follow identity
· How identity services reduce the risk of breaches by over 50%
· How <partner> and Centrify uniquely help reduce risk through the power of identity services
Senior Security Analyst
Keep Ransomware Out. How you can stop ransomware and exploits before they strike
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
- Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
- Detect: quickly and easily detect and isolate attacks
- Respond: laser in on critical alerts and address them with simple to understand security intelligence
As a Senior Security Analyst with Sophos Dan is responsible for consulting with partners and customer throughout North America. Dan joined Sophos in 2014
Dan has been working in the Information Technology for over thirty years and specializes in network, endpoint and mobile security. He has consulted to numerous fortune 500 companies throughout the world.
Dan began his information security career as a member of the United State Navy where he was responsible for maintaining ship-based encryption devices used to secure communication between naval aircraft.
Dan studied Business Management at Maryville University in St. Louis, MO.