- This event has passed.
July 26 @ 8:00 am - 4:00 pm
The Raleigh Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Cyber Security Strategies Conference.
Director of Enterprise Sales Engineers
Intercepting Advanced Threats
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Learn how you can get innovative endpoint protection without impacting performance.
- Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
- Detect: quickly and easily detect and isolate attacks
- Respond: laser in on critical alerts and address them with simple to understand security intelligence
Mark Holobach has been in the IT/Security world for almost 20 years. In his current role, Mark is a Senior Sales Engineer at Sophos preaching the gospel of endpoint protection to his customers across the Southeast.
Why attackers love email and what you can do about it
Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking?
In this session, you’ll learn:
- How your email can be used as an entry point for multiple types of attack
- The damaging impact attacks have on organizations
- Why your employees could be the weakest link in your email security
- How to enhance your email security and thus your overall cyber resilience
The Top 5 Wi-Fi Security Mistakes and How to Avoid Them
Attend our Wi-Fi security presentation and see how to avoid the top 5 deployment mistakes that leave managers and their networks open to compromise.
As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.
So how do different security models stand up to this new reality, and how secure is your connection? Bring your questions and join our speaker to cover:
- The top 5 Wi-Fi security mistakes
- Viewing exactly what’s happening on your network
- Building an authentication and encryption model that doesn’t force user workarounds
- Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
- Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
Mr. Jonathan Hurtt, Distinguished Systems Engineer and CWNE #176, has been with Aerohive Networks for close to 6 years and is responsible for both pre and post – sales engineering support. His previous experience includes 4 years as a Systems Engineer at Nortel, and also an internship with MCNC. He is a Charlotte native and NC State graduate. He also happens to hold the highest designation within Aerohive Networks for Engineering.
AV, EDR, NGAV…What’s Next in Endpoint Protection?
Antivirus has been around since the 1980s. How did it evolve in the past decade? What about hot machine learning-powered Next Generation Antivirus products promoted by well-funded startups? Or should we assume compromise and focus on the Endpoint Detection and Response (EDR) instead? What are the pros and cons of these approaches and where is endpoint security going next?
This interactive presentation will discuss the reasons behind the vulnerable state of endpoint security and include a demo of the infamous Rubber Ducky that remains practically unstoppable by today’s endpoint protection products.
You will leave the presentation with the following knowledge:
- Understand the current state of endpoint security and latest attacks
- Explore available endpoint protection tools, including Endpoint Detection and Response (EDR)
- Learn about benefits and shortcomings of modern endpoint protection tools and approaches
- See an advanced file-less attack in action
- Learn the latest best practices and solutions that promise to reduce threat surface and minimize breaches
Rene Kolga, CISSP, has over 20 years of industry experience, including expertise in endpoint protection, insider threat, encryption and vulnerability management. Rene runs Product teams at multiple Silicon Valley startups as well as Fortune 500 companies, including Symantec, Citrix, Altiris, ThinAir and Nyotron. Earlier in his career, Rene managed Customer Success and QA teams. Rene earned his Computer Science degree from Tallinn University of Technology. He also received an MBA from University of Utah. Rene frequently speaks on security topics at industry conferences like BlackHat, Gartner and (ISC)2 as well as provides commentary for publications like Forbes, CNN, US News and others.
A new approach to email security
Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.
Win Big with IT Resilience
In this presentation we shall discuss a key component of business transformation — the evolution of BC/DR to IT Resilience and how to leverage Zerto to protect, transform and innovate your business. IT Resilience allows you manage both unplanned disruptions, including outages, ransomware attacks, natural disasters as well as the planned disruptions, such as moving to cloud or data center consolidations. With Zerto you can be resilient and ready to accelerate transformation by seamlessly adapting to new technology, while protecting the business and customers from disruptions.
Cybersecurity KPIs to Secure Your IT Environment
Organizations spend an exceptional amount of time and money to keep their data secure, but the outcomes are less than exceptional. In the presentation, AHEAD security expert Steven Aiello will focus on simple KPIs that organizations can use to secure their environments. This will not be a theoretical approach to security; it will be an analysis of the most common attack vectors and patterns that are used to compromise IT assets. In order to understand these KPIs, Aiello will focus on the following:
- Common ways cyber attackers gain access to systems
- Patterns of cyber attackers after access is gained
Steven Aiello is a Chief Security and Compliance Architect with AHEAD; a technology firm based out of Chicago Illinois. At AHEAD, Steven works closely with client’s infrastructure and security teams. Steven works with company’s critical infrastructure teams across security, storage, and virtualization silos.
Steven previously was an Enterprise Architect at Online Tech in Ann Arbor, MI, a local managed service provider. At Online Tech, Steven was responsible for designing the company’s critical infrastructure including virtualization, storage, and security initiatives across 5 data centers. Designs were in line with client needs which included primarily banking and healthcare verticals.
Mr. Aiello holds a BA in Technology Management and a Master’s of Science with a concentration in Information Assurance from Eastern Michigan University.
His certifications include CISSP (Certified Information System Security Professional), ISACA CISA, SANS GSEC, SANS GCIH, VMware VCP (VMware Certified Professional), VMware VCAP-DCD (VMware Certified Advanced Professional – Data Center Design), and Cisco CCNA (Cisco certified Network Associate)
10 Tips for Effective Endpoint & Mobile Security
With the growing number, sophistication, and impact of cyber attacks such as WannaCry and Petya; defending traditional endpoints, modern devices, mobile and IT assets from emerging threats is critically important for enterprises.
Join this session to learn 10 Tips for Effective Endpoint & Mobile Security.
- Tips to block cyber-attacks with advanced technologies
- How to achieve enhanced visibility into suspicious activity
- Understand the realities of mobile threat defense and why it is different from traditional security
Improve security, productivity and user experience through the Okta Identity Cloud
So, there are somewhere between a million and a half and two million apps out there. Right now, the average corporate IT department lets users access maybe 35—because of all the security and admin stuff involved in setting them up.
So how do you make it easier for your company to adopt more great technology—without creating insane security risks. One example of this is using a single sign-on, where you can use one username and password to get into any app. Another example is something called multi-factor authentication, where your computer prompts you for a fingerprint or a special code, to prove it’s you who’s trying to log in.
Join this informative session and hear about different options now available to your company to secure one of your company’s most important asset, the network and give access to the applications that your users require to do their jobs. And you will see first-hand demonstrations of not only how these work, but also how easy it is to configure and manage. This is a don’t miss session.
Justin has worked in the Enterprise Identity and Access Management space since 2002. He began as a java developer on the IBM IAM suite and started an IAM implementation business in 2006. Justin joined Dell SecureWorks in 2011 as an IAM Security Sales Manager and transitioned to the the Quest IAM pre-sales team as a Principal SE in 2013 when Dell acquired Quest. Justin joined Okta in 2017.
Backup and Disaster Recovery
We will be speaking on backup and disaster and walking through defeating ransomware and phishing attacks as well as natural and other disasters with our solution. We will also talk about the importance of replication and testing along with the difference in a manufacturer cloud vs. public cloud for offsite replication including sandboxing.