May 17 @ 8:00 am - 5:00 pm
The Philadelphia Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cybersecurity issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Executive Sales Manager
Innovative Endpoint Management – A Holistic Approach to Vulnerability Management, Patching, OS-Upgrades and Software Distribution
Zero Day Vulnerability, Windows Fall Anniversary Update, Office 365 Migration: Are any of these topics causing your blood pressure to rise? This seminar will show you how you can automate OS-migrations, software deployment projects, and effective security exploit management all from one easy to use Endpoint Management Suite. No university degree or nerd glasses required – buckle up!
AI/ML Endpoint Protection – Deploying a cognitive, data-driven analytics platform for the reliability, efficiency and security of enterprise networks and IoT/OT environments
Rick Pither is in charge of Global Security Sales for SparkCognition. In this role, he is responsible for driving sales of the cutting-edge, AI-powered cybersecurity platform that the company deploys.
Pither’s areas of specialty include IT cybersecurity, virtualization, hybrid cloud, protocol analysis and network management.
Prior to SparkCognition, Pither held various executive positions at McAfee, VMware, and Secureworks over his 24-year career in cybersecurity. He has spoken at numerous conferences and summits; most recently at the Association of Anti-Money Laundering Specialists conference.
Pither values strong recruiting efforts and operational excellence to increase selling time of his team and is passionate about coaching and mentoring.
Pither earned his bachelor’s degree in management and marketing from Purdue University.
Tom Desilets is the President of PhillyCom Inc. Tom has worked in the technology field since 1994, starting his career with Bell Atlantic Network Integration. Other companies that Tom has worked for include Wang Global, Nortel and Heavy Water Ltd. He is also a graduate of Villanova University and makes his home in the western suburbs of Philadelphia, PA. His technical experience delves into areas such as Ethernet, VoIP, storage, virtualization, network optimization, network monitoring, cloud computing and more. Throughout his career Tom has always strived to achieve excellence in delivering products and services to his customers. It is this commitment and passion upon which Tom has founded PhillyCom Inc.
Olav has over 25 years of experience in Information Technology as an Engineer and Sales Director in the areas of Cybersecurity, Networking, and Storage. As the Sales Director for the Mid-Atlantic Region, he is responsible for helping organizations secure their data residing in cloud applications, platforms, and mobile/BYOD devices by leveraging Bitglass’ ZeroDay Core technology. He holds a BSEE from Virginia Tech.
Establishing the Role of Prevention in Endpoint Security
The current landscape of the cyber security industry is shifting towards endpoint detection and response while pushing responsibility to the IT Admins. Large security companies are no longer holding themselves responsible for stopping malware and keeping networks and devices secure. In an alternate approach we’ll shift the focus towards prevention and not putting the burden on IT Admins.
In this session you’ll learn:
- The current landscape of endpoint security.
- A shift of responsibility in security and data protection.
- An alternate approach to the mainstream cyber security practices.
- Growing attack vectors in the malware industry.
State of Endpoint Security
Ponemon Institute estimates an average breach cost of $3.5 million in 2017, with a 27% probability that a U.S. company will experience a breach in the next 24 months. Just in one recent example, shipping company Maersk lost over $300 million when ransomware infected its systems. Malware is winning with a never ending supply of new attack vectors, previously unseen methods and malware variants. Why, after companies have invested billions of dollars in endpoint security, are they still so vulnerable?
This interactive presentation will discuss the reasons behind the vulnerable state of endpoint security, along with the evolution of traditional Antivirus (AV), and the rise of Next-Generation Antivirus (NGAV) products powered by Machine Learning and Endpoint Detection and Response (EDR) solutions. It will then look into the latest endpoint security trends that promise to increase efficacy, lower TCO and deliver a more robust feature set without requiring organizations to rip and replace their existing security stack.
Josh Etsten leads the East Solutions Architects team at Nyotron. His work focus is empowering customers to protect data and assets from sophisticated cyber-attacks. Josh has worked with large Financial, Healthcare, Defense, Government organizations across the globe implementing endpoint security solutions. He has over 18 years IT Security experience and 10 years in endpoint security, including at 3 startups, and on the Symantec Endpoint product management team.