Loading Events

« All Events

Kansas City (Cybersecurity)

November 1 @ 8:00 am - 5:00 pm

Event Navigation


November 1
8:00 am - 5:00 pm
Event Category:


The Kansas City Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

8:45am - 9:15amSession One

9:15am - 9:45amSession Two

Daniel Clark
Senior Sales Engineer

Fighting Back Against CryptoJacking

Cryptojacking has erupted onto the cybercrime scene, thanks to the surge in value of cryptocurrencies such as Bitcoin, Monero, and Ethereum.  Use this campaign to start new security conversations, demonstrate your expertise, and create opportunities for Sophos solutions.

Crooks are aggressively targeting laptops, desktops, servers, and even mobile devices. From a single device to entire networks, they infect as many devices as they can to mine for cryptocurrency on, or while using, other people’s computers. Simply put, you do the work, pay for the electricity and hardware, and they pocket the rewards.

Join us to learn how to fight back! We’ll explore the differences between legitimate mining and cryptojacking; how cryptojacking works; the costs of cryptojacking to today’s organizations; and practical steps you can take to avoid being a victim of cryptojacking.

Speaker’s Bio:

Daniel Clark is a Senior Security Professional with nearly thirty years of experience in securing information systems.  As a Sr. Sales Engineer with Sophos, Dan works with top companies to address the complexity of security.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Brendan Dalpe
Senior Security Consultant

The Zero-Trust Engine: A New Model for Event Analytics

Zero-trust isn’t just a buzzword, it’s a truly disruptive ideology, but while in existence for almost 10 years, vendors still fail to correctly embrace the methodology. Companies faced with a shortage of talent continue to be overwhelmed by logs and alerts from legacy correlation engines. It’s not a coincidence that breaches continue to occur!

Come learn how Critical Start applied a zero-trust methodology to event analytics to increase the efficiency of security organizations and find the true incidents from logs.

Speaker’s Bio:

During his tenure in the security industry, Brendan has served as an analyst, consultant and network engineer. He helps organizations strengthen their security posture by applying deep expertise in Next Generation Firewall and SIEM capabilities

10:45am - 11:15amSession Four

Rob Pollock
Central Region Channel Sales

The Changing Landscape of DDoS Attacks – Advanced DDoS Is Here – Are You Ready?

Distributed Denial of Service (DDoS) attacks have entered a new era!  Historically DDoS attackers have used a “brute force” approach to making an online services unavailable by overwhelming your company’s internet connection. DDoS targets wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and presents a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications.  Brute force attacks have morphed into more sophisticated, multi-vector attacks.  Your adversaries are patient, launching targeted attacks using deception & “smokescreen” tactics to take down your network.  The frequency of DDoS attacked has risen dramatically as well.  The emergence of IOT devices has led to larger, more destructive attacks from Lizard Stressor, to Mirai & now Memcache.  2018 has seen the first DDoS exceeding I tbps! (1.3 tbps & 1.7 tbps attacks)

Arbor will discuss the misconceptions & facts about modern day DDoS attacks and best practices to protect your company against DDoS attacks while providing maximum network availability.  “Bandwidth saturation” will impact your business – an attack that exceeds your internet pipe is all it takes.  In this new world, “peace time” no longer exists so having a DDoS protection strategy is critical!  With 30+% of DDOS attacks causing havoc at the Application Layer  with potential data exfiltration, the stakes could not be higher.

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:30pmSession Five
12:30pm - 12:45pmBreak / Vendor Booth Time
12:45pm - 1:15pmSession Six
1:15pm - 1:45pmSession Seven

David Coleman 
Senior Product Evangelist


An Overview of WLAN Security

As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.

So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:

  • The 5 tenets of WLAN security
  • Choosing the proper authentication and encryption model that doesn’t force user workarounds
  • Utilizing Private PSK technology
  • Device and user access control
  • Future challenges for Wi-Fi security and WPA3


Download the Presentation


1:45pm - 2:00pmBreak / Vendor Booth Time
2:00pm - 2:30pmSession Eight
2:30pm - 3:00pmSession Nine

Heather DeSiena  

How They Bypass Office 365 Security

The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.

During this session, we’ll demonstrate how to protect Office 365 from:

  • Email-based phishing, spoofing, and malware
  • Account takeover, insider threats, compromised Microsoft credentials
  • Loss of sensitive data from OneDrive, SharePoint and Office 365