Loading Events

« All Events

  • This event has passed.

Pittsburgh (Cybersecurity)

August 16 @ 8:00 am - 4:00 pm

Event Navigation


August 16
8:00 am - 4:00 pm
Event Category:


About Our Event

The Pittsburgh Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area.


View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

8:45am - 9:15amSession One

Tom Bulthaupt
Senior Systems Engineer

A Synchronized Approach to Security

Discussion of the current cybersecurity threats and how to coordinate an automated response.

Speaker’s Bio:

Tom Bulthaupt has been in the network/security field for most of his professional career. He worked at BBN during the early days of building out the ARPANET, as well as, the private encrypted  networks supporting government and the military data. For the last 20 years, his focus has been on network and endpoint security, helping customers secure their infrastructure against the ever escalating threats.
Tom provides a hands-on knowledge of threats, consequences, and the required remedies facing businesses today.

9:15am - 9:45amSession Two

Francesco Trama

Proactive perimeter deception tactics to push back against the Cyber Kill Chain

Deception is a commonly used strategy in warfare deployed with the intent of causing one’s enemy to make mistakes.  Deception is an active and proactive measure that can make one stronger than is actually the case based on tangible assets.  Many security teams are seeking to go on the offensive and are seeking to be more proactive in their network defense.  As such, deception technologies and techniques are finding their way into the mainstream cybersecurity battle.  Employing unique deception techniques on your network perimeter in unison with a layered security approach can defeat zero hour worms, deplete attackers resources, proxy opportunities, and anonymity through bots and zombies.

Speaker’s Bio:

As Chief Executive Officer and Co-Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader. Frank also is co-inventor of a patent issued for selectively regulating network traffic. Frank is an experienced network engineer and prior to PacketViper, held senior IT network management roles at Liberty USA, Partner and Director of Libcom Internet Services ISP, Sr Network/Systems Engineer and PM for business such as The Future Now, CompuCom, and Xerox Connect. Frank holds a BS in Technical Management from Embry-Riddle University and is a decorated veteran of the US Army.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Michael Herring  

Solved: Your Shared Responsibility for Security In the Cloud

When you moved your data to the cloud, your liability for its security did not go with it. Cloud vendors call it the “Shared Responsibility Model” and it describes where their Service Level Agreement stops and your responsibility starts. To make sure there are no gaps between their technology and yours, you need to deploy many of the same tools you would deploy in your own datacenter. You need to deploy them across all your SaaS and you need to manage them across all your cloud assets.

Avanan, The Cloud Security Platform, protects data in any SaaS or IaaS. Partnering with the industry’s most trusted security vendors, it offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, insider threats and more. The cloud-based platform is completely out-of-band and can be deployed in one click. It is the next generation of cloud security.

10:45am - 11:15amSession Four

Matt Jones
SE Manager

Reducing Cyber Exposure for the Modern Attack Surface

Speaker’s Bio:

Matthew Jones is currently a manager of security engineers at Tenable.  Prior to joining Tenable, Matt worked for Axon, a body cam video solution provider, Veritas, an information management company, Symantec, an information technology security company, Lumeta, an asset discovery company, Redsiren, a managed security service provider, Fore Systems, a networking switch and router provider, and Intel, the technology chip company.  In the past 20+ years Matt has predominantly held positions in System Engineering, but has also been in product management, manufacturing, and procurement.  Matt has been active in the Information Security Markets since 1998 and has held his CISSP since 2002.  Matt’s education includes an engineering degree from Alfred University and an MBA from the University of Pittsburgh.  Matt currently resides in Western Pennsylvania.

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

John Mason
Sr. Systems Engineer

The Top 5 Wi-Fi Security Mistakes and How to Avoid Them

Attend our Wi-Fi security presentation and see how to avoid the top 5 deployment mistakes that leave managers and their networks open to compromise.

As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.

So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:

  • The top 5 Wi-Fi security mistakes
  • Viewing exactly what’s happening on your network
  • Building an authentication and encryption model that doesn’t force user workarounds
    • Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
  • Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Daniel Hertzberg

Security in the 100Gig Data Center

1:00pm - 1:30pmSession Seven

Sean Walker
Account Executive

End-User Cybersecurity Behaviors: The Importance of Training Beyond the Phish

Phishing has long been a headline threat for infosec teams — but email is just one entry point for cybercriminals. Attendees will learn why it’s important to assess and train their end users about cybersecurity threats beyond email-based social engineering, and see how data insights from knowledge assessments and training activities differ from those related to simulated phishing attacks.

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:30pmSession Eight

Romain Basset
Presales Engineer

A new approach to email security

Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.

2:30pm - 2:45pmBreak / Vendor Booth Time
2:45pm - 3:15pmSession Nine

Dave Rummler
Sales Executive

The security-educated workforce: Utopia or a reality?

Data loss is only the symptom. The root of the problem is with the unpredictable nature of humans. Strong security measures can create a forcefield, but it only takes a minute for an imprudent employee to circumvent them. Learn how to leverage behavioral context and AI to condition employees into security-sustainable habits.

Speaker’s Bio:

Prior to joining Jazz Networks, Dave was a Sales Director at Cisco Systems and the Director of U.S. Sales at Acano. Earlier in his career, he held various Regional and Director roles at Cisco and Tandberg.

Prize Drawings for All in Attendance
3:15pm - 3:45pmSession Ten

Teresa Maugeri

Preparing for the Cyber Landscape of 2020

A positive outlook for the global economy shouldn’t engender complacency. The rapidly shifting global risks landscape presents a challenging operating and investment environment for businesses.  The pace of change has been increasing, characterized by rapid technological advances, seismic shifts in the geopolitical landscape and growing sources of social instability. Learn how the broad range of potential shocks can emerge in this context and why it demands a strategy that puts a premium on resilience.

Download the Presentation

Prize Drawings for All in Attendance