- This event has passed.
November 16, 2017 @ 8:15 am - 4:00 pm
The Phoenix Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Tech-Security Strategies Conference.
Regional Sales Director, Southwest District
Leverage the Cloud to Minimize the Impact of Ransomware
With 20 years of sales experience working with IT Professionals across all market segments, Brian has a firm grasp on what it takes to help companies apply unique and differentiated technologies to solve business challenges. He began his career in telecommunications and mobile solutions with Bell South and then Verizon Communications. Data networks and hosted infrastructure managed services were the focus during his time at Qwest and AT&T. He moved on to enterprise storage with Silicon Valley start up BlueArc, a company that specialized in high performance network attached storage which was acquired by Hitachi Data Systems. At Commvault he became well versed in data management and information governance and for the last 3 years he has been responsible for developing the Southwest Region at Druva.
Sales Engineering Manager, Director
Threat Lifecycle Management: A New Approach to Cybersecurity
Brian Albrecht, CISSP, is a Director of Sales Engineering at LogRhythm. He is an experienced information security consultant with over 15 years of experience in the field of information technology and network security. Prior to LogRhythm Brian worked with several Fortune 500 companies.
Senior Channel Sales Engineer
Keep Ransomware Out. How you can stop ransomware and exploits before they strike
When it comes to endpoint protection, this is no longer a game of cops and robbers. The age of the virus signature is proving ineffective against advanced threats. Today, we’re seeing an overwhelming number of attacks being hidden inside or exploiting legitimate software in order to evade defenses. We’re seeing skyrocketing costs when it comes to dealing with ransomware. And we’re seeing phishing as the preferred delivery method. See how Sophos is revolutionizing the detection and remediation of these nefarious threats, allowing firms to maintain their security bearing and protect their sensitive data.
Keeping the Enterprise Always On with IT Resilience
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Security Awareness Advocate
Surviving Social Engineering and Ransomware Attacks
Throwing money at a problem doesn’t make it go away. Social engineering methods and the ‘evil genius” cyber criminals behind the attacks are furiously innovating, keeping IT off-guard.
Attackers are moving their focus from attacking the hardened network perimeter to attacking your users. This has made Ransomware and CEO Fraud incidents skyrocket, costing billions of dollars in losses.
How do you keep up and what are the most effective methods for securing your organization to combat cybercrime? This presentation will cover the ransomware and CEO Fraud epidemics and proven methods of protecting your organization against these phishing-based attacks, like creating a “human firewall”.
Threat Intelligence and Layered Security in the WannaCry Era
The term ‘Threat Intelligence’ is getting a lot of buzz these days, but what does it mean? And, more importantly, how can it help protect your network? In this presentation, we answer these questions within the context of a layered security approach that integrates Threat Intelligence with existing security methodologies. We also use real-world examples to examine how Threat Intelligence improves a network’s defenses at the perimeter and allows administrators to gain more visibility on the inside.
Sales Engineer Manager -West
The Foundation for Digital Resilience – A contextual understanding of risk – AT ALL TIMES
Providing a network modeling and risk scoring platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives. RedSeals advanced analytics engine creates a functioning model of your entire as built network so you can understand and continuously monitor your whole network, accelerate response to security incidents and network vulnerabilities. Measure resilience with your RedSeal Digital Resilience Score, benchmark, and set targets to actively manage the digital resilience of your network and security posture.
VP of Products
Enhanced Security Through Availability
Leveraging Next Generation Veeam Cloud Services
Learn how you can leverage next generation cloud services with phoenixNAP and Veeam. In this session you will learn how to build out your disaster recovery plan, ensure you backup and recovery objectives uphold your company’s compliance standards, and discover solutions that solve your most important backup and DR challenges.
Next Generation Endpoint Protection – What you need to know
In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume of cyber threats. The key to effective endpoint protection lies in the ability to dynamically detect malicious behavior across all attack vectors and respond intelligently at machine speed, all through a single, easy-to-manage platform. Join this session as we discuss the strategies that enterprises are now employing in their quest to reduce the risk of a data breach.
Hunting Methodology: A key to the labyrinth of network forensics
Proactive hunting is the newest cybersecurity strategy and promises great potential. But where is one to start in the world of network forensics? This presentation proffers a methodology for exactly that. It walks through the maze of network protocols with a spool of thread; discussing the protocols of interest, what to look for in each protocol, and how to find the cheese.
Percy Tucker is an RSA Senior Manager supporting the RSA NetWitness Suite for the South-West region of the United States. Percy first started with RSA in 2000 and has had responsibilities across product lines. Percy leads the RSA NOC/SOC teams worldwide. RSA has partnered with Black Hat through Percy’s leadership to integrate the RSA NetWitness Suite, RSA Systems Engineers and Incident Response team members into the Black Hat NOC at their conferences worldwide. RSA NetWitness provides Black Hat the pervasive visibility necessary to protect critical assets within the conference as well as ensure availability of the network for the duration of the conference. This partnership has led to additional NOC/SOC opportunities at RSA Conference USA and APJ to raise the awareness and educate conference attendees of what lurks behind the scene of a public wireless network. Percy has both a B.S. and M.S. in Management Information Systems from the University of Arizona.
Partner Sales Engineer
Safer Technology Through Threat Awareness and Response
It seems like every day the news is riddled with high profile data breaches. We all sit back and wonder, how could this have happened? During this presentation, we will take a deep look into what the most common elements of a cyberattack. Discover, why hackers want your data in the first place, how easily they are able to penetrate most systems and what they do with your information after they get it. Finally, learn how using a layered security approach can help keep your data out of hands of cyber-criminals, and your business off the front page news.