- This event has passed.
August 16 @ 8:00 am - 4:00 pm
About Our Event
The Pittsburgh Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area.
THIS CONFERENCE QUALIFIES FOR CPE CREDITS.
View the full conference agenda below.
For information on participating as a vendor: email@example.com
Data Connectors is proud to host the Cybersecurity Strategies Conference.
Senior Systems Engineer
A Synchronized Approach to Security
Discussion of the current cybersecurity threats and how to coordinate an automated response.
Tom Bulthaupt has been in the network/security field for most of his professional career. He worked at BBN during the early days of building out the ARPANET, as well as, the private encrypted networks supporting government and the military data. For the last 20 years, his focus has been on network and endpoint security, helping customers secure their infrastructure against the ever escalating threats.
Tom provides a hands-on knowledge of threats, consequences, and the required remedies facing businesses today.
Proactive perimeter deception tactics to push back against the Cyber Kill Chain
Deception is a commonly used strategy in warfare deployed with the intent of causing one’s enemy to make mistakes. Deception is an active and proactive measure that can make one stronger than is actually the case based on tangible assets. Many security teams are seeking to go on the offensive and are seeking to be more proactive in their network defense. As such, deception technologies and techniques are finding their way into the mainstream cybersecurity battle. Employing unique deception techniques on your network perimeter in unison with a layered security approach can defeat zero hour worms, deplete attackers resources, proxy opportunities, and anonymity through bots and zombies.
As Chief Executive Officer and Co-Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader. Frank also is co-inventor of a patent issued for selectively regulating network traffic. Frank is an experienced network engineer and prior to PacketViper, held senior IT network management roles at Liberty USA, Partner and Director of Libcom Internet Services ISP, Sr Network/Systems Engineer and PM for business such as The Future Now, CompuCom, and Xerox Connect. Frank holds a BS in Technical Management from Embry-Riddle University and is a decorated veteran of the US Army.
Solved: Your Shared Responsibility for Security In the Cloud
When you moved your data to the cloud, your liability for its security did not go with it. Cloud vendors call it the “Shared Responsibility Model” and it describes where their Service Level Agreement stops and your responsibility starts. To make sure there are no gaps between their technology and yours, you need to deploy many of the same tools you would deploy in your own datacenter. You need to deploy them across all your SaaS and you need to manage them across all your cloud assets.
Avanan, The Cloud Security Platform, protects data in any SaaS or IaaS. Partnering with the industry’s most trusted security vendors, it offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, insider threats and more. The cloud-based platform is completely out-of-band and can be deployed in one click. It is the next generation of cloud security.
Reducing Cyber Exposure for the Modern Attack Surface
Matthew Jones is currently a manager of security engineers at Tenable. Prior to joining Tenable, Matt worked for Axon, a body cam video solution provider, Veritas, an information management company, Symantec, an information technology security company, Lumeta, an asset discovery company, Redsiren, a managed security service provider, Fore Systems, a networking switch and router provider, and Intel, the technology chip company. In the past 20+ years Matt has predominantly held positions in System Engineering, but has also been in product management, manufacturing, and procurement. Matt has been active in the Information Security Markets since 1998 and has held his CISSP since 2002. Matt’s education includes an engineering degree from Alfred University and an MBA from the University of Pittsburgh. Matt currently resides in Western Pennsylvania.
Sr. Systems Engineer
The Top 5 Wi-Fi Security Mistakes and How to Avoid Them
Attend our Wi-Fi security presentation and see how to avoid the top 5 deployment mistakes that leave managers and their networks open to compromise.
As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.
So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:
- The top 5 Wi-Fi security mistakes
- Viewing exactly what’s happening on your network
- Building an authentication and encryption model that doesn’t force user workarounds
- Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
- Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
Security in the 100Gig Data Center
End-User Cybersecurity Behaviors: The Importance of Training Beyond the Phish
Phishing has long been a headline threat for infosec teams — but email is just one entry point for cybercriminals. Attendees will learn why it’s important to assess and train their end users about cybersecurity threats beyond email-based social engineering, and see how data insights from knowledge assessments and training activities differ from those related to simulated phishing attacks.
A new approach to email security
Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.
The security-educated workforce: Utopia or a reality?
Data loss is only the symptom. The root of the problem is with the unpredictable nature of humans. Strong security measures can create a forcefield, but it only takes a minute for an imprudent employee to circumvent them. Learn how to leverage behavioral context and AI to condition employees into security-sustainable habits.
Prior to joining Jazz Networks, Dave was a Sales Director at Cisco Systems and the Director of U.S. Sales at Acano. Earlier in his career, he held various Regional and Director roles at Cisco and Tandberg.
Preparing for the Cyber Landscape of 2020
A positive outlook for the global economy shouldn’t engender complacency. The rapidly shifting global risks landscape presents a challenging operating and investment environment for businesses. The pace of change has been increasing, characterized by rapid technological advances, seismic shifts in the geopolitical landscape and growing sources of social instability. Learn how the broad range of potential shocks can emerge in this context and why it demands a strategy that puts a premium on resilience.