Loading Events

« All Events

  • This event has passed.

Phoenix (Cybersecurity)

November 16 @ 8:15 am - 4:00 pm

Details

Date:
November 16
Time:
8:15 am - 4:00 pm
Event Category:

Venue

Hilton Scottsdale Resort & Villas
6333 North Scottsdale Road
Scottsdale,85250United States  + Google Map
Phone:
480-948-7750
Website:
http://www3.hilton.com/en/hotels/arizona/hilton-scottsdale-resort-and-villas-SCTSHHF/index.html

Overview

The Phoenix Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

 

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Brian Damschen
Regional Sales Director, Southwest District

Leverage the Cloud to Minimize the Impact of Ransomware

Download the Presentation

With 20 years of sales experience working with IT Professionals across all market segments, Brian has a firm grasp on what it takes to help companies apply unique and differentiated technologies to solve business challenges. He began his career in telecommunications and mobile solutions with Bell South and then Verizon Communications. Data networks and hosted infrastructure managed services were the focus during his time at Qwest and AT&T. He moved on to enterprise storage with Silicon Valley start up BlueArc, a company that specialized in high performance network attached storage which was acquired by Hitachi Data Systems. At Commvault he became well versed in data management and information governance and for the last 3 years he has been responsible for developing the Southwest Region at Druva.

 

9:15am - 9:45amSession Two

Brian Albrecht 
Sales Engineering Manager, Director

Threat Lifecycle Management: A New Approach to Cybersecurity

Speaker’s Bio:

Brian Albrecht, CISSP, is a Director of Sales Engineering at LogRhythm.  He is an experienced information security consultant with over 15 years of experience in the field of information technology and network security.  Prior to LogRhythm Brian worked with several Fortune 500 companies.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

John Coulter
Senior Channel Sales Engineer

Keep Ransomware Out.  How you can stop ransomware and exploits before they strike

When it comes to endpoint protection, this is no longer a game of cops and robbers. The age of the virus signature is proving ineffective against advanced threats. Today, we’re seeing an overwhelming number of attacks being hidden inside or exploiting legitimate software in order to evade defenses. We’re seeing skyrocketing costs when it comes to dealing with ransomware. And we’re seeing phishing as the preferred delivery method. See how Sophos is revolutionizing the detection and remediation of these nefarious threats, allowing firms to maintain their security bearing and protect their sensitive data.

10:45am - 11:15amSession Four

Chris Hoy
Solutions Engineer

 

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Erich Kron
Security Awareness Advocate

 

Surviving Social Engineering and Ransomware Attacks

Throwing money at a problem doesn’t make it go away. Social engineering methods and the ‘evil genius” cyber criminals behind the attacks are furiously innovating, keeping IT off-guard.

Attackers are moving their focus from attacking the hardened network perimeter to attacking your users. This has made Ransomware and CEO Fraud incidents skyrocket, costing billions of dollars in losses.

How do you keep up and what are the most effective methods for securing your organization to combat cybercrime? This presentation will cover the ransomware and CEO Fraud epidemics and proven methods of protecting your organization against these phishing-based attacks, like creating a “human firewall”.

Download the Presentation

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Ted Gruenloh
COO

Threat Intelligence and Layered Security in the WannaCry Era

The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.

1:00pm - 1:30pmSession Seven

Mario Engelking
Sales Engineer Manager -West

 

The Foundation for Digital Resilience – A contextual understanding of risk – AT ALL TIMES

Providing a network modeling and risk scoring platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives. RedSeals advanced analytics engine creates a functioning model of your entire as built network so you can understand and continuously monitor your whole network, accelerate response to security incidents and network vulnerabilities. Measure resilience with your RedSeal Digital Resilience Score, benchmark, and set targets to actively manage the digital resilience of your network and security posture.

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

William Bell
VP of Products

Enhanced Security Through Availability

Leveraging Next Generation Veeam Cloud Services

Learn how you can leverage next generation cloud services with phoenixNAP and Veeam.  In this session you will learn how to build out your disaster recovery plan, ensure you backup and recovery objectives uphold your company’s compliance standards, and discover solutions that solve your most important backup and DR challenges.

2:15pm - 2:45pmSession Nine

Mike Chauvel
Account Executive

Next Generation Endpoint Protection – What you need to know

In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.

2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:30pmSession Ten

Percy Tucker
Senior Manager

Hunting Methodology: A key to the labyrinth of network forensics

Proactive hunting is the newest cybersecurity strategy and promises great potential. But where is one to start in the world of network forensics? This presentation proffers a methodology for exactly that. It walks through the maze of network protocols with a spool of thread; discussing the protocols of interest, what to look for in each protocol, and how to find the cheese.

Speaker’s Bio:

Percy Tucker is an RSA Senior Manager supporting the RSA NetWitness Suite for the South-West region of the United States.  Percy first started with RSA in 2000 and has had responsibilities across product lines.  Percy leads the RSA NOC/SOC teams worldwide.  RSA has partnered with Black Hat through Percy’s leadership to integrate the RSA NetWitness Suite, RSA Systems Engineers and Incident Response team members into the Black Hat NOC at their conferences worldwide.   RSA NetWitness provides Black Hat the pervasive visibility necessary to protect critical assets within the conference as well as ensure availability of the network for the duration of the conference.  This partnership has led to additional NOC/SOC opportunities at RSA Conference USA and APJ to raise the awareness and educate conference attendees of what lurks behind the scene of a public wireless network.   Percy has both a B.S. and M.S. in Management Information Systems from the University of Arizona.

Prize Drawings for All in Attendance
3:30pm - 4:00pmSession Eleven

Drew Dodson
Partner Sales Engineer

Safer Technology Through Threat Awareness and Response

It seems like every day the news is riddled with high profile data breaches. We all sit back and wonder, how could this have happened? During this presentation, we will take a deep look into what the most common elements of a cyberattack. Discover, why hackers want your data in the first place, how easily they are able to penetrate most systems and what they do with your information after they get it. Finally, learn how using a layered security approach can help keep your data out of hands of cyber-criminals, and your business off the front page news.

Prize Drawings for All in Attendance

Sponsors