- This event has passed.
New Orleans (Cybersecurity)
May 9 @ 8:00 am - 4:00 pm
The New Orleans Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Threat Intelligence and Layered Security in the WannaCry Era
The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.
Channel Account Manager
The Power of Your People: How to Rally Your Troops Against Phishing
This presentation will walk you through how to build a phishing protection program for your company. We reach beyond technical solutions to provide tips on getting management buy-in and how to architect the program so that it’s both effective and engaging. We wrap with some simple steps you can kick off as soon as you get back to the office!
It’s undeniable, one of the easiest and most effective ways for attackers to gain access to your critical systems and sensitive data is simply to ask for it. In this presentation, I will discuss some steps that can be taken to help mitigate this risk through detection of credential theft, enforcing device & identity authentication and restricting lateral movement of attackers.
Ricky Allen is the VP of Services for Critical Start Inc. and President of the South Texas ISSA chapter. He holds certifications such as SABSA Security Architecture, CISSP, CISA, and Six Sigma. Ricky previously held roles at Accenture as an executive in their strategic information security consulting practice and at HP Enterprise Security Products as the practice lead for developing Security Operations programs for ArcSight SIEM products. Ricky was focused on retail and manufacturing industries while at PricewaterhouseCoopers where he performed penetration testing and risk assessments for companies across the US. Ricky has presented at conferences such as BSides, Black Hat, API Cybersecurity, HOU.SEC.CON, SANS, SecureWorld, and Data Connectors. Ricky is based in Houston, TX and has a degree in Management Information Systems from Texas A&M University.
Today’s Threat Landscape
This presentation will focus on the Who, What, and How of recent attacks along with the various threat vectors and prevalence of each one.
Director, Sales Engineering
Threat Lifecycle Management
Scott Renegar is a technology sales leader with more than 20 years of enterprise software sales experience and a solid background in network and endpoint security. He has held positions at LogRhythm, Dell, Symantec, and the Federal Reserve Bank. Scott’s efforts are currently focused on helping his Customers to measurably reduce their risk, through the use of technology which provides rapid detection and response.
10 File Transfer Risks and How to Avoid Them
You know what good cybersecurity practices look like; maybe you even set them up in your organization. Files are encrypted in transit, workstations and servers are protected with strong password policies, firewalls and blacklists secure the internal network from intruders, and employees are well versed in what a phishing attack looks like. Everything is going well … and then you’re hit with a critical data breach, and you’re not sure why. Hadn’t you covered all the bases?
In reality, it’s easy to miss certain exposures and vulnerabilities that endanger your files. The smallest gap in security can risk everything—and leave you with a mess. But fortunately, once you’ve identified the weak areas, they’re often simple to fix.
Join GoAnywhere Solutions Consultant Rick Elliott to explore the ten file transfer perils that organizations often run into, including:
- Giving away your user IDs and passwords via FTP transfers
- Exposing data to the DMZ (Demilitarized Zone)
- Not securing your system with the right permissions
Risks and insecurities are everywhere, and sometimes they’re hard to spot. Learn how to avoid common pitfalls, then discover how you can safeguard your data with a secure file transfer solution like GoAnywhere MFT.
Why attackers love email and what you can do about it
Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
Nick Hensley, CISSP
Reducing Cyber Exposure for the Modern Attack Surface
Nick Hensley, CISSP has over 15 years of experience working in the Security Industry. His experience includes consulting, management roles, senior security positions, penetration testing, vulnerability management, forensics, electronic discovery, and compliance.
Regional Sales Manager
What Comes Next in Wi-Fi: Why Increasing Speed Isn’t Enough
Optimizing user mobile experience requires more than high speed Wi-Fi. IT professionals are facing challenges of capacity, flexibility, security, privacy, and visibility as they evaluate complex combinations of WLAN standards, management, and technology like MU-MIMO. This session covers 802.11ac and upcoming WLAN standards (specifically 802.11ax), iBeacons, and building robust wireless networks.
Email and Data Archiving: What I.T. Pros Need to Know
Director of Channel Sales
The Ransomware Epidemic
In today’s threat landscape, new forms of malware are taking their toll on business and government agencies, crippling those organizations by victimizing users in a number of ways. In this session, PC Matic’s, Frank Hansen discusses the growing ransomware epidemic, the best practices to utilize in defense, and where in the world these practices are best utilized.