- This event has passed.
May 17 @ 8:00 am - 5:00 pm
The Philadelphia Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cybersecurity issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Sr. Systems Engineer – PA
A Synchronized Approach to Security
Discussion of the current cybersecurity threats and how to coordinate an automated response.
Tom Bulthaupt has been in the network/security field for most of his professional career.
He worked at BBN during the early days of building out the ARPANET, as well as, the private encrypted networks supporting government and the military data. For the last 20 years, his focus has been on network and endpoint security, helping customers secure their infrastructure against the ever escalating threats.
Tom provides a hands-on knowledge of threats, consequences, and the required remedies facing businesses today.
Executive Sales Manager
Innovative Endpoint Management – A Holistic Approach to Vulnerability Management, Patching, OS-Upgrades and Software Distribution
Zero Day Vulnerability, Windows Fall Anniversary Update, Office 365 Migration: Are any of these topics causing your blood pressure to rise? This seminar will show you how you can automate OS-migrations, software deployment projects, and effective security exploit management all from one easy to use Endpoint Management Suite. No university degree or nerd glasses required – buckle up!
Turtles, Trust and The Future of Cybersecurity
Faith in our institutions is collapsing, and GDPR is at the door. What would cybersecurity look like if we started from scratch, right now, in our hybrid, interdependent world? It would focus relentlessly on data. Learn how a data-centric security approach can reduce risk, increase efficiency and re-engineer trust in a society where faith has been shaken by unstoppable breaches.
Kilian Englert has more than 10 years of information security experience. As Technical Marketing Manager at Varonis, Kilian supports a wide range of security initiatives by helping Varonis’ customers and employees get the most out of the company’s products to tackle today’s biggest security challenges. Kilian joined Varonis in 2010 as a corporate sales engineer, then transitioned to a field engineer covering the South West US. Before joining Varonis, Kilian worked as an information security engineer at Merck. He holds a CISSP certification and frequently presents on topics related to security and technology. Kilian is also a regular panelist on the Inside Out Security Show podcast.
Solved: Your Shared Responsibility for Security In the Cloud
While you moved your data to the cloud, your liability for its security did not go with it. Cloud vendors call it the “Shared Responsibility Model” and it describes where their Service Level Agreement stops and your responsibility starts. To make sure there are no gaps between their technology and yours, you need to deploy many of the same tools you would deploy in your own datacenter. You need to deploy them across all your SaaS and you need to manage them across all your cloud.
Avanan, The Cloud Security Platform, protects data in any SaaS. Partnering with the industry’s most trusted security vendors, it offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, insider threats and more. The cloud-based platform is completely out-of-band and can be deployed in one click.
It is the next generation of cloud security.
Cybersecurity Product Manager
Create Your Cloud Security Strategy
Public, private, and hybrid cloud architectures are rapidly transforming the landscape of traditional data centers and your security strategies must transform with them.
Agile teams, DevOps, and microservices provide unlimited options and scalability, but cloud systems must be secured against the constant threats launched against them.
The dynamic ability to automatically increase or decrease your computing footprint to meet scalability demands is a wonderful cloud benefit, but how do you secure what you cannot see?
Join this Bob Erdman to learn about cloud security best practices for protecting your systems.
We’ll show you how to:
- Gain visibility into your cloud security blind spot
- Maintain a consistent security policy across traditional, hybrid, and cloud deployed systems
- What are the shared responsibilities of operating in a secure cloud environment
- Create an automated cloud security assessment model
This session will arm you with the information you need to secure your systems against today’s most pressing threats.
Bob has more than two decades of experience securing Linux, Unix, and Windows platforms. He has implemented security solutions for government, healthcare, and other corporate entities covering a wide variety of technologies.
BU Lead, Director of Security Products
AI/ML Endpoint Protection – Deploying a cognitive, data-driven analytics platform for the reliability, efficiency and security of enterprise networks and IoT/OT environments
Rick Pither is in charge of Global Security Sales for SparkCognition. In this role, he is responsible for driving sales of the cutting-edge, AI-powered cybersecurity platform that the company deploys.
Pither’s areas of specialty include IT cybersecurity, virtualization, hybrid cloud, protocol analysis and network management.
Prior to SparkCognition, Pither held various executive positions at McAfee, VMware, and Secureworks over his 24-year career in cybersecurity. He has spoken at numerous conferences and summits; most recently at the Association of Anti-Money Laundering Specialists conference.
Pither values strong recruiting efforts and operational excellence to increase selling time of his team and is passionate about coaching and mentoring.
Pither earned his bachelor’s degree in management and marketing from Purdue University.
Rethink Security with Zero Trust
Last year $86B was spent on cybersecurity yet a stunning 2/3rds of companies were still breached. And worse, those that were breached averaged five or more separate breaches. Bottom line: Something has to change. Today’s security is not secure.
Tom Desilets is the President of PhillyCom Inc. Tom has worked in the technology field since 1994, starting his career with Bell Atlantic Network Integration. Other companies that Tom has worked for include Wang Global, Nortel and Heavy Water Ltd. He is also a graduate of Villanova University and makes his home in the western suburbs of Philadelphia, PA. His technical experience delves into areas such as Ethernet, VoIP, storage, virtualization, network optimization, network monitoring, cloud computing and more. Throughout his career Tom has always strived to achieve excellence in delivering products and services to his customers. It is this commitment and passion upon which Tom has founded PhillyCom Inc.
Olav has over 25 years of experience in Information Technology as an Engineer and Sales Director in the areas of Cybersecurity, Networking, and Storage. As the Sales Director for the Mid-Atlantic Region, he is responsible for helping organizations secure their data residing in cloud applications, platforms, and mobile/BYOD devices by leveraging Bitglass’ ZeroDay Core technology. He holds a BSEE from Virginia Tech.
Establishing the Role of Prevention in Endpoint Security
The current landscape of the cyber security industry is shifting towards endpoint detection and response while pushing responsibility to the IT Admins. Large security companies are no longer holding themselves responsible for stopping malware and keeping networks and devices secure. In an alternate approach we’ll shift the focus towards prevention and not putting the burden on IT Admins.
In this session you’ll learn:
- The current landscape of endpoint security.
- A shift of responsibility in security and data protection.
- An alternate approach to the mainstream cyber security practices.
- Growing attack vectors in the malware industry.
State of Endpoint Security
Ponemon Institute estimates an average breach cost of $3.5 million in 2017, with a 27% probability that a U.S. company will experience a breach in the next 24 months. Just in one recent example, shipping company Maersk lost over $300 million when ransomware infected its systems. Malware is winning with a never ending supply of new attack vectors, previously unseen methods and malware variants. Why, after companies have invested billions of dollars in endpoint security, are they still so vulnerable?
This interactive presentation will discuss the reasons behind the vulnerable state of endpoint security, along with the evolution of traditional Antivirus (AV), and the rise of Next-Generation Antivirus (NGAV) products powered by Machine Learning and Endpoint Detection and Response (EDR) solutions. It will then look into the latest endpoint security trends that promise to increase efficacy, lower TCO and deliver a more robust feature set without requiring organizations to rip and replace their existing security stack.
Teresa Wingfield is Director of Product Marketing at Nyotron where she frequently engages with customers to understand their endpoint protection challenges. Teresa has worked in the security industry for over a decade. Most recently, she managed McAfees’s portfolio of cloud workload and data center security solutions. She has also managed product lines in mobile security at VMware, virtual machine protection and website security at Symantec and file integrity monitoring at Active Reasoning (acquired by Oracle).
Risks Hiding in Plain Sight: Mobile & Web App Vulnerability Benchmarks
As NowSecure’s Chief Mobility Officer, industry veteran Brian Reed brings over a 15 years experience in mobile, apps, security and operations management including Good Technology, BlackBerry, ZeroFOX and BoxTone working with Fortune 2000 global customers and government agencies. With more than 25 years building innovative products and scaling operations, Brian is a dynamic speaker and compelling storyteller who brings unique insights and global experience. Brian is a graduate of Duke University.
Solving for the Insider Threat