Loading Events

« All Events

Milwaukee (Cybersecurity)

October 25 @ 8:00 am - 5:00 pm

Event Navigation


October 25
8:00 am - 5:00 pm
Event Category:


Hyatt Regency Milwaukee
333 West Kilbourn Avenue
Milwaukee, WI 53203
United States
  + Google Map
+1 414 276 1234


The Milwaukee Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cyber Security Strategies Conference.

8:45am - 9:15amSession One

Lennart Van Den Ende
VP Sales Engineering, Menlo Security

Definitively Solve Web Threats and Phish through Isolation

Eventually, all deterministic solutions for malware and phishing start to fail and can be bypassed. The state of the detection art is less effective tomorrow. Rather than relying on technology to determine what is good and what is bad, what if prevention technology assumed everything to be bad, to be potentially malicious? This is the foundation underlying “isolation”.

Come hear how isolation provides an “air gap” between the enterprise and the web, yet still allows browsing and communication. Make it safe to click again.

9:15am - 9:45amSession Two

Larry Herzog Jr.
Senior Channel Sales Engineer

Stop Unknown Threats: Deep Learning for Deeper Cybersecurity

With 75% of malware threats unique to a single organization, reactive endpoint security alone is not enough.

Join this webinar to learn how the predictive deep learning technology in Sophos Intercept X detects new and unseen malware, protecting you from never-seen-before attacks.  We’ll cover:

  • The latest malware trends and attack techniques
  • Why traditional endpoint protection alone is not enough
  • How Intercept X uses predictive deep learning to detect unseen malware
  • What the experts are saying about Intercept X

We’ll also explore additional advanced protection capabilities in Intercept X, including anti-ransomware and anti-exploit technology, and why it’s the world’s most comprehensive endpoint protection.

Speaker’s Bio:

Larry has over 20 years of IT security experience. He has worked extensively with public, private, educational, and military organizations.  Larry joined Sophos in April of 2014.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Chris Wilson

Are You Avoiding These Top 10 File Transfer Risks?

You know what good cybersecurity practices look like. Maybe you even set them up in your organization. Files are encrypted in transit, workstations and servers are protected with strong password policies, firewalls and blacklists secure the internal network from intruders, and employees are well versed in what a phishing attack looks like. Everything is going well … and then you’re hit with a critical data breach, and you’re not sure why. Hadn’t you covered all the bases?

It’s easy to miss certain exposures and vulnerabilities that endanger your files. The smallest gap in security can risk everything—and leave you with a mess. But fortunately, once you’ve identified the weak areas, they’re often simple to fix.

In this presentation, GoAnywhere Partner Manager Chris Wilson will explore the ten file transfer perils that organizations often run into, including:

  • Giving away your user IDs and passwords via FTP transfers
  • Exposing data to the DMZ (Demilitarized Zone)
  • Not securing your system with the right permissions

Risks and insecurities are everywhere, and sometimes they’re hard to spot. Learn how to avoid common pitfalls, then discover how you can safeguard your data with a secure file transfer solution like GoAnywhere MFT.

Speaker’s Bio:

Chris Wilson manages GoAnywhere partners in North America for HelpSystems. He has over 25 years of experience managing and developing business and technical integration partners. Chris conceived and enhanced numerous HelpSystems products in the application development, BI, and cybersecurity space and now works with ISVs, systems integrators, and MSPs to protect their customers’ sensitive data in transit via GoAnywhere.

10:45am - 11:15amSession Four

Josh Ray
Account Executive

Why attackers love email and what you can do about it

Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?

In this session, you’ll learn:

·        How your email can be used as an entry point for multiple types of attack

·        The damaging impact attacks have on organizations

·        Why your employees could be the weakest link in your email security

·        How to enhance your email security and thus your overall cyber resilience


Speaker’s Bio:

Josh Ray is a Commercial Sales Representative with over 5 years of security experience, and 12 years in the IT Industry. Josh is responsible for growing the Mimecast user base in the Minnesota, Wisconsin, and Dakotas region by increasing Cyber Resilience in email. Previous to Mimecast Josh spent several years working at Trend Micro, where he was exposed to security products across many different corporate layers. He also worked with IBM, Keynote Systems, and Triton Digital Media where he was exposed to many different types of IT organizations and types of software development.

Josh graduated from Texas Tech University with a Bachelors in Communication Studies, Masters in Communication Studies, and an MBA. His Master’s thesis focused on online communication channels and social norms. Josh currently volunteers as the membership chair at The Conservancy on Oak Lawn Park in Dallas as well as with the Texas Tech Alumni Association of Dallas.

11:15am - 11:45amKeynote Session / Seated Lunch

Special Agent Jamie Butcher

Join SA Jamie Butcher in his discussion regarding National Cybersecurity. 

11:45am - 12:15pmSession Six

Alex Crepas
Security Engineer

Cyber Exposure – The Next Frontier

The attack surface for today’s IT landscape is a far cry from the past. Once focused on protecting traditional data centers, cybersecurity professionals are increasingly guarding a complex litany of modern assets like cloud instances, web-based applications, mobile devices, application containers and more. Failure to appropriately manage the unique characteristics of these technologies as a whole can jeopardize the entire risk management program. Join us for a discussion on how companies can reduce their risk and close their overall cyber exposure gap resulting from today’s challenging attack surfaces.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Seven

Connor Lind
Cyber Security Account Executive

Autonomous Cyber Defense: AI and the Immune System Approach

From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network – before they turn into a full-blown crisis.


Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.


Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.

1:00pm - 1:30pmSession Eight

David Coleman 
Senior Product Evangelist


An Overview of WLAN Security

As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.

So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:

  • The 5 tenets of WLAN security
  • Choosing the proper authentication and encryption model that doesn’t force user workarounds
  • Utilizing Private PSK technology
  • Device and user access control
  • Future challenges for Wi-Fi security and WPA3

Download the Presentation


1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Nine

About Trend Micro

250+ million endpoints. 500,000+ companies worldwide. One security software company.

For nearly 30 years, Trend Micro’s unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats.

The depth of our experience remains unmatched. From the endpoint to the network to the cloud, we’ve got you covered with a connected threat defense recognized by analysts, customers, and industry gurus of all kinds.

2:15pm - 2:45pmSession Ten

Steve Shelton  

How They Bypass Office 365 Security

The move to SaaS has changed the phishing landscape: your Office 365 inbox is the #1 threat vector and your Office 365 credentials are their #1 target. In this talk, we will demonstrate the techniques attackers use to bypass Microsoft’s defenses. Learn how they use Microsoft’s own services to fool filters and utilize built-in tools to launch them internally–bypassing your email security gateway.

During this session, we’ll demonstrate how to protect Office 365 from:

  • Email-based phishing, spoofing, and malware
  • Account takeover, insider threats, compromised Microsoft credentials
  • Loss of sensitive data from OneDrive, SharePoint and Office 365
2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:30pmSession Eleven

Laurence Young
Solutions Architect

Security-centric Culture

Instilling a security-first mindset that permeates across everything that you do within your organization is vitally important in today’s world.  Delve into some fundamental techniques that can be employed to make security the norm rather than the exception.

3:30pm - 4:00pmSession Twelve

Murtaza Hafizji
RSA Product Marketing

Transforming Secure Access

As identity theft and credential-based attacks continue to rise, organizations wonder how this can be when they’re investing so much time and effort deploying identity and access management solutions. Unfortunately, despite their best efforts, Identity has become the most consequential attack vector to the modern enterprise. They are essentially outmatched by increasing identity risks. If you’re feeling the pressure, you can’t afford to miss this presentation. Join Murtaza Hafizji of RSA to learn how to transform the way you secure access in the modern enterprise.  You’ll learn how identity intelligence, business context and threat intelligence work together to build a strong foundation for secure access and an overall high degree of identity assurance.

Speaker’s Bio:

Murtaza leads the go to market strategy for RSA SecurID® Access, RSA’s industry-leading Identity and Access Assurance solution. In his 7 years at RSA, he has served in both marketing and sales roles helping customers to effectively address their toughest information security challenges. Murtaza takes a special interest in BYOD and BYOI practices and how they impact information security overall.  He loves to travel and has been to more than 25 countries and speaks 5 languages. Murtaza holds a Bachelor’s degree in Information Technology and is pursuing his MBA.

4:00pm - 4:30pmSession Thirteen

Robert Arandjelovic
Director of Product Marketing

Delivering Integrated Cyber Defense in the Cloud Generation

Hackers are finding new ways to steal data and infiltrate organizations daily.  Integrated Cyber Defense helps you improve security, reduce complexity, and lower cost. Robert Arandjelovic, Director of Product Marketing at Symantec, will discuss the inherent challenges affecting integrated cyber defense in the cloud generation including pressures of multiple environments, budget, traffic visibility, and cloud architecture.

Key takeaway- Understand the blueprint for unifying cloud and on-premises security to provide advanced threat protection and information protection across all endpoints, networks, email, and cloud applications.

Speaker’s Bio:

Robert Arandjelovic is Symantec’s Americas Director of Product Marketing, responsible for aligning the company’s endpoint, network, messaging and cloud security solutions with the evolving business climate and threat landscape. Previously, Robert served as Symantec’s EMEA Director of Product Marketing since 2014. With over 18 years of experience in the industry, Robert has been a first-hand witness to the evolution of networking and cyber security technologies, as well as their rising strategic importance to businesses.

4:30pm - 5:00pmSession Fourteen

Thomas Scott
Solutions Consultant

Protecting Your Data: What You Need to Know about Cloud Security and the Dark Web

Effectively leveraging the cloud is not just about migrating data and applications. Security must travel into the cloud as well. When organizations fail to understand that security in the cloud is a shared responsibility, the consequences can be disastrous (and profitable for threat actors!). In this session, Armor will demonstrate the vulnerability of your unprotected data in the cloud via a real-world experiment using “honeypots” disguised as a healthcare web portal. You will learn:

  • The most likely attacks your organization will face
  • How active and dynamic security controls can mitigate risk
  • Simple steps you can take to prevent a breach
  • Why your data is so valuable on the Dark Web (findings from Armor’s Black Market Report)


Speaker’s Bio:

Thomas Scott serves as a Solutions Consultant at Armor. He is responsible for working with customers globally to build world-class server security and compliance for cloud, on-premise, and hybrid ecosystems. He previously worked as the Cybersecurity Operations Team Lead for Mary Kay where he was responsible for all aspects of monitoring and alerting in both on-premise and cloud environments. He graduated Cum Laude from Texas A&M University attaining his BBA in Management Information Systems.