October 26 @ 8:15 am - 5:00 pm
The Nashville Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech-Security Strategies Conference.
Erich Kron, CISSP-ISSAP
Security Awareness Advocate
Surviving Social Engineering and Ransomware Attacks
Throwing money at a problem doesn’t make it go away. Social engineering methods and the ‘evil genius” cyber criminals behind the attacks are furiously innovating, keeping IT off-guard.
Attackers are moving their focus from attacking the hardened network perimeter to attacking your users. This has made Ransomware and CEO Fraud incidents skyrocket, costing billions of dollars in losses.
How do you keep up and what are the most effective methods for securing your organization to combat cybercrime? This presentation will cover the ransomware and CEO Fraud epidemics and proven methods of protecting your organization against these phishing-based attacks, like creating a “human firewall”.
Threat Life Cycle Management
Threat Lifecycle Management (TLM) is a framework that puts you a step ahead of your attackers by providing an end-to-end security workflow that combines people, process, and technology. It empowers your team by sorting through the noise to highlight and investigate high-priority threats.
Shawn started his professional information technology career in the late 1990’s while working as a civilian contractor in the Pentagon. Over the last 15 years roles and responsibilities progressively increased in architecture, security, sales and business. He then joined one of the first Managed Security Service Providers, Counterpane Internet Security (prior to being acquired by British Telecom). Leveraging his early Secure Operation Center (SOC) expertise he was brought to Computer Sciences Corporation to help establish their Global Logical SOC. In addition, as the sole proprietor of Networking And Computers, LLC he provided full stack security and support to medium sized business. Prior to his business being acquired, Shawn was acting as the Chief Security Officer (CSO) for these clients and provided total risk management. In addition, Shawn was a Series A investor in OculusVR which was acquired by Facebook for 2 billion. Now, as part of the team at LogRhythm, Shawn enjoys helping clients understand and shape a holistic security strategy with LogRhythm at the core.
In Shawn’s spare time he enjoys offshore fishing. This year he participated in the world’s largest bill fishing tournament, the White Marlin Open, having a grand prize of approximately $4 million.
Web and Email: Malware’s evil twins
The state of malware has continued to evolve, but the two constants of web and email infiltration remain the same. Despite the infrastructure investments being made to secure organizations, relying on detection of good versus bad results in significant numbers of infections that continue to impact users. In this discussion, Danny Le talks about the challenges of a legacy detection approach and how a technology that has been leveraged in various previous ways is now providing a whole new level of protection with a new twist. Prevention Through Isolation.
Danny brings years of experience from working both in the private sector and world class security companies, such as Proofpoint and Menlo Security. He has extensive experience in the hospitality and financial sector and is uniquely positioned to provide insight into challenges faced by large enterprises. Danny continues to share his passion for state of the art technologies with organizations of all sizes while working as a senior systems engineer for Menlo Security. He credits his success to all of his mentors and, as time permits, continues to pay it forward by working with the youth of today as a guest speaker at security events and local universities.
Area Security Specialist – Southeast
The attack surface is expanding. Can your endpoint security hold its own?
Modern cybersecurity requires you to adapt, evolve, and reassess as you progress. After all, hackers are doing the same – executing and selling new threats designed to exploit even the most advanced security strategy. Shrinking the attack surface is key—making it harder for threats to get through, and giving your security team and solutions a fighting chance to take on the ones that breach your defenses. The best way to go about it? Defense in depth – a layered approach designed to help you close the gaps and stay on top of your security posture.
• Discover the full breadth of risk
• Reduce the attack surface
• Detect malicious activity
• Analyze data for better results
Ivanti provides simple streamlined tools that automate security processes, simplifying prevention and freeing your team from the burden of detecting and investigating threat alerts. Join us for a discussion about the ever-changing threat landscape and how to more effectively protect your company from insidious attack.
Cloud Security Sales Manager – South Region
Safe Journey to the Cloud
Companies are looking to modernize existing business applications to improve agility, performance, and sometimes recognize cost savings by moving workloads to the cloud. Experience shows that security is often neglected or viewed as an inhibitor as customers struggle with loss of control, consistency and compliance. In this presentation Eric Meadows, a Cloud Security Champion from Check Point, will provide insight into cloud adoption, provide four simple steps every company should be taking to secure “any” cloud and share the four shared characteristics he sees in successful cloud deployments with customers.
Senior Consulting Engineer, Southeast
The Foundation for Digital Resilience – A contextual understanding of risk – AT ALL TIMES
Providing a network modeling and risk scoring platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives. RedSeals advanced analytics engine creates a functioning model of your entire as built network so you can understand and continuously monitor your whole network, accelerate response to security incidents and network vulnerabilities. Measure resilience with your RedSeal Digital Resilience Score, benchmark, and set targets to actively manage the digital resilience of your network and security posture.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Keep Ransomware Out. How you can stop ransomware and exploits before they strike
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
· Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
· Detect: quickly and easily detect and isolate attacks
· Respond: laser in on critical alerts and address them with simple to understand security intelligence
Physical Approaches To Address Insider Threat
Every one of us – regardless of our occupation – are potential targets for cyber-attack. Much effort and expense is invested in building firewalls to prevent hackers from penetrating our computer networks. While it is prudent to take these steps, we often find that we are still unprotected from attacks launched from inside the network. Hackers have learned that penetration from within can be easier and more successful when compared to launching an attack from the outside. The industry calls this “insider threat”. We hope to better define where insider threats originate – and what steps can be taken to reduce one’s vulnerability to such risks. Our discussion will be less technical and more practical. We will examine how to address security through physical preventive measures. We will identify several easily implemented and cost effective measures that we can undertake to help keep our networks safe.
Senior Sales Engineer
Protect Your Data from Insider Threats
The greatest threat to enterprise security is the people already on the payroll. To do their jobs, employees, contractors, consultants and vendors must have legitimate access to sensitive and valuable data stored in enterprise databases and file shares. However, when insiders abuse this access, or when insiders are exploited by outside attackers, enterprise data is exposed. Detection and containment of insider threats requires an expert understanding of both users and how they use enterprise data.