Loading Events

« All Events

  • This event has passed.

New Orleans (Cybersecurity)

May 9 @ 8:00 am - 4:00 pm

Event Navigation


May 9
8:00 am - 4:00 pm
Event Category:


The New Orleans Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

8:45am - 9:15amSession One

Ted Gruenloh


Threat Intelligence and Layered Security in the WannaCry Era

The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.

9:15am - 9:45amSession Two

Jill Tillery
Channel Account Manager

The Power of Your People: How to Rally Your Troops Against Phishing

This presentation will walk you through how to build a phishing protection program for your company. We reach beyond technical solutions to provide tips on getting management buy-in and how to architect the program so that it’s both effective and engaging. We wrap with some simple steps you can kick off as soon as you get back to the office!

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Ricky Allen
VP of Services

Street Creds

It’s undeniable, one of the easiest and most effective ways for attackers to gain access to your critical systems and sensitive data is simply to ask for it. In this presentation, I will discuss some steps that can be taken to help mitigate this risk through detection of credential theft, enforcing device & identity authentication and restricting lateral movement of attackers.

Speaker’s Bio:

Ricky Allen is the VP of Services for Critical Start Inc. and President of the South Texas ISSA chapter.  He holds certifications such as SABSA Security Architecture, CISSP, CISA, and Six Sigma.  Ricky previously held roles at Accenture as an executive in their strategic information security consulting practice and at HP Enterprise Security Products as the practice lead for developing Security Operations programs for ArcSight SIEM products. Ricky was focused on retail and manufacturing industries while at PricewaterhouseCoopers where he performed penetration testing and risk assessments for companies across the US.   Ricky has presented at conferences such as BSides, Black Hat, API Cybersecurity, HOU.SEC.CON, SANS,  SecureWorld, and Data Connectors.   Ricky is based in Houston, TX and has a degree in Management Information Systems from Texas A&M University.

10:45am - 11:15amSession Four

Rob Anderson
COO, Secure Data Solutions

Today’s Threat Landscape

This presentation will focus on the Who, What, and How of recent attacks along with the various threat vectors and prevalence of each one.

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Scott Renegar
Director, Sales Engineering

Threat Lifecycle Management

Download the Presentation

Speaker’s Bio:

Scott Renegar is a technology sales leader with more than 20 years of enterprise software sales experience and a solid background in network and endpoint security. He has held positions at LogRhythm, Dell, Symantec, and the Federal Reserve Bank.  Scott’s efforts are currently focused on helping his Customers to measurably reduce their risk, through the use of technology which provides rapid detection and response.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Rick Elliott
Solutions Consultant


10 File Transfer Risks and How to Avoid Them

You know what good cybersecurity practices look like; maybe you even set them up in your organization. Files are encrypted in transit, workstations and servers are protected with strong password policies, firewalls and blacklists secure the internal network from intruders, and employees are well versed in what a phishing attack looks like. Everything is going well … and then you’re hit with a critical data breach, and you’re not sure why. Hadn’t you covered all the bases?

In reality, it’s easy to miss certain exposures and vulnerabilities that endanger your files. The smallest gap in security can risk everything—and leave you with a mess. But fortunately, once you’ve identified the weak areas, they’re often simple to fix.

Join GoAnywhere Solutions Consultant Rick Elliott to explore the ten file transfer perils that organizations often run into, including:

  • Giving away your user IDs and passwords via FTP transfers
  • Exposing data to the DMZ (Demilitarized Zone)
  • Not securing your system with the right permissions

Risks and insecurities are everywhere, and sometimes they’re hard to spot. Learn how to avoid common pitfalls, then discover how you can safeguard your data with a secure file transfer solution like GoAnywhere MFT.

1:00pm - 1:30pmSession Seven

Stephen Kuitu

Why attackers love email and what you can do about it

Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?

In this session, you’ll learn:

  • How your email can be used as an entry point for multiple types of attack
  • The damaging impact attacks have on organizations
  • Why your employees could be the weakest link in your email security
  • How to enhance your email security and thus your overall cyber resilience
1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

Nick Hensley, CISSP
Channel SE

Reducing Cyber Exposure for the Modern Attack Surface

Download the Presentation

Speaker’s Bio:

Nick Hensley, CISSP has over 15 years of experience working in the Security Industry.  His experience includes consulting, management roles, senior security positions, penetration testing, vulnerability management, forensics, electronic discovery, and compliance.

2:15pm - 2:45pmSession Nine

Mary Miller
Regional Sales Manager

What Comes Next in Wi-Fi: Why Increasing Speed Isn’t Enough

Optimizing user mobile experience requires more than high speed Wi-Fi. IT professionals are facing challenges of capacity, flexibility, security, privacy, and visibility as they evaluate complex combinations of WLAN standards, management, and technology like MU-MIMO. This session covers 802.11ac and upcoming WLAN standards (specifically 802.11ax), iBeacons, and building robust wireless networks.

Download the Presentation

2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm- 3:30pmSession Ten

Edward Dunn

Email and Data Archiving: What I.T. Pros Need to Know

Prize Drawings for All in Attendance
3:30pm - 4:00pmSession Eleven

Frank Hansen
Director of Channel Sales

The Ransomware Epidemic

In today’s threat landscape, new forms of malware are taking their toll on business and government agencies, crippling those organizations by victimizing users in a number of ways. In this session, PC Matic’s, Frank Hansen discusses the growing ransomware epidemic, the best practices to utilize in defense, and where in the world these practices are best utilized.

Prize Drawings for All in Attendance