Loading Events

« All Events

New Orleans (Cybersecurity)

May 9 @ 8:00 am - 5:00 pm

Event Navigation

Details

Date:
May 9
Time:
8:00 am - 5:00 pm
Event Category:

Overview

The New Orleans Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

8:45am - 9:15amSession One
9:15am - 9:45amSession Two

Jill Tillery
Channel Account Manager

The Power of Your People: How to Rally Your Troops Against Phishing

This presentation will walk you through how to build a phishing protection program for your company. We reach beyond technical solutions to provide tips on getting management buy-in and how to architect the program so that it’s both effective and engaging. We wrap with some simple steps you can kick off as soon as you get back to the office!

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Ricky Allen
VP of Services

Street Creds

It’s undeniable, one of the easiest and most effective ways for attackers to gain access to your critical systems and sensitive data is simply to ask for it. In this presentation, I will discuss some steps that can be taken to help mitigate this risk through detection of credential theft, enforcing device & identity authentication and restricting lateral movement of attackers.

Speaker’s Bio:

Ricky Allen is the VP of Services for Critical Start Inc. and President of the South Texas ISSA chapter.  He holds certifications such as SABSA Security Architecture, CISSP, CISA, and Six Sigma.  Ricky previously held roles at Accenture as an executive in their strategic information security consulting practice and at HP Enterprise Security Products as the practice lead for developing Security Operations programs for ArcSight SIEM products. Ricky was focused on retail and manufacturing industries while at PricewaterhouseCoopers where he performed penetration testing and risk assessments for companies across the US.   Ricky has presented at conferences such as BSides, Black Hat, API Cybersecurity, HOU.SEC.CON, SANS,  SecureWorld, and Data Connectors.   Ricky is based in Houston, TX and has a degree in Management Information Systems from Texas A&M University.

10:45am - 11:15amSession Four
11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five
12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Rick Elliott
Solutions Consultant

 

10 File Transfer Risks and How to Avoid Them

You know what good cybersecurity practices look like; maybe you even set them up in your organization. Files are encrypted in transit, workstations and servers are protected with strong password policies, firewalls and blacklists secure the internal network from intruders, and employees are well versed in what a phishing attack looks like. Everything is going well … and then you’re hit with a critical data breach, and you’re not sure why. Hadn’t you covered all the bases?

In reality, it’s easy to miss certain exposures and vulnerabilities that endanger your files. The smallest gap in security can risk everything—and leave you with a mess. But fortunately, once you’ve identified the weak areas, they’re often simple to fix.

Join GoAnywhere Solutions Consultant Rick Elliott to explore the ten file transfer perils that organizations often run into, including:

  • Giving away your user IDs and passwords via FTP transfers
  • Exposing data to the DMZ (Demilitarized Zone)
  • Not securing your system with the right permissions

Risks and insecurities are everywhere, and sometimes they’re hard to spot. Learn how to avoid common pitfalls, then discover how you can safeguard your data with a secure file transfer solution like GoAnywhere MFT.

1:30pm - 2:00pmSession Seven

John Harb
Account Executive

Win Big with IT Resilience

In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.

2:00pm - 2:15pmBreak / Vendor Booth Time
2:15pm - 2:45pmSession Eight

Steve Heaney
Account Executive

Why attackers love email and what you can do about it

Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?

In this session, you’ll learn:

  • How your email can be used as an entry point for multiple types of attack
  • The damaging impact attacks have on organizations
  • Why your employees could be the weakest link in your email security
  • How to enhance your email security and thus your overall cyber resilience
2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:30pmSession Nine
3:30pm - 4:00pmSession Ten

Mary Miller
Regional Sales Manager

What Comes Next in Wi-Fi: Why Increasing Speed Isn’t Enough

Optimizing user mobile experience requires more than high speed Wi-Fi. IT professionals are facing challenges of capacity, flexibility, security, privacy, and visibility as they evaluate complex combinations of WLAN standards, management, and technology like MU-MIMO. This session covers 802.11ac and upcoming WLAN standards (specifically 802.11ax), iBeacons, and building robust wireless networks.

Download the Presentation

4:00pm - 4:30pmSession Eleven
4:30pm - 5:00pmSession Twelve

Frank Hansen

Sponsors