Loading Events

« All Events

  • This event has passed.

St. Louis (Cybersecurity)

December 6, 2017 @ 8:15 am - 5:00 pm

Event Navigation


December 6, 2017
8:15 am - 5:00 pm
Event Category:


Sheraton Westport Chalet Hotel St. Louis
191 Westport Plaza Drive
St. Louis, 63146
United States
  + Google Map


The St. Louis Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Joey Kilaita
Regional Sales Director, Midwest

Leverage the Cloud to Minimize the Impact of Ransomware

Download the Presentation

Speaker Bio: 

Joey Kilaita, Regional Sales Director, Chicago, grew up in the Druva HQ since it’s beginning stages.  When Druva opened up a position in his hometown of Chicago he couldn’t resist. His expertise is around the mobile Enterprise, specifically around governance, data collection, and restore and led him to the top of the sales team within Druva. He and Bob Pawloski (Sales Engineer) cover IL, IN, WI, MI, MO, MN, and IA. He is a huge San Jose Sharks and Golden State Warriors fan, so bonus points if you can relate!

9:15am - 9:45amSession Two

Lawrence Hatcher

A New Way to Look at IT Security with Endpoint Modeling

Endpoint compromise has been a consistent theme in nearly every modern security breach. This discussion makes the case for a new approach to IT security yielding compelling results and visibility into all network Endpoint behavior. With great accuracy, extremely low noise, and supporting evidence, endpoint modeling discovers and tracks the regular behavior of each device in a way that makes possible the automatic recognition of potentially harmful activities. Join us as we introduce endpoint modeling, discuss why this is feasible and necessary for enterprises today, and how this solution is being used successfully in organizations large and small, in traditional networks and cloud environments including AWS VPCs, Azure and others.

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Eric Pierron

10:45am - 11:15amSession Four

Travis Worden
Channel Account Manager

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disasters will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Todd O’Boyle
Co-Founder & Chief Technology Officer

Attacker Tactics: How to Get Ahead

In this story-based talk, we’ll share examples of how we’ve all been attacked and then, based upon these stories, talk through ways we all can better protect ourselves. You’ll walk out of the talk with a plan you can use to facilitate cybersecurity awareness across your organization, including talking to your executive team about more resources. If you’d like to get ahead of the game, you can download our incident response plan for small and midsize businesses at http://info.strongarm.io/incident-response-plan/.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Rob Pollock
Channel Sales

The Impact of DDoS Attacks – The Stakes Have Changed – Are You Prepared??

Distributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today’s cloud-based world to making sure people can access important information and mission-critical applications. Arbor will discuss the misconceptions & facts about Modern day DDoS attacks and the Advance Threat landscape and how they can help customers mitigate their risk.  From the Mirai Botnet to the recent Wannacry ransomware attack, see how DDoS attacks are being used as a “smokescreen” for other nefarious activities.

Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders.

1:00pm - 1:30pmSession Seven
1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

Ginny Turley
Senior Vice President

9 Pitfalls To Avoid When Implementing an IAM Solution 

IAM implementations are fraught with both technical and career challenges and dangers. In this 30-minute briefing, we’ll review some of the most common pitfalls encountered by teams implementing IAM solutions and review the best practices in order to avoid them – and be a hero.

2:15pm - 2:45pmSession Nine

Anthony Ricci
Technical Product Manager

Keeping 500 Million Devices Happy and Secure for 50 Years 

  • Identity is the foundation of IoT security: Why every device requires a unique identity.
  • What lifecycle management looks like for an IoT device- Don’t risk being sent back to START.
  • Today’s design will limit tomorrow’s growth: Scenarios to prepare for and strategies to achieve scalability.
  • Case Study: A look at securely managing 500-million connected vehicles.

Speaker’s Bio:

Anthony Ricci is a business-savvy technology operations leader with 25 years of IT expertise. Drawing on a career history of results bridging business and technology to develop world-class IT solutions, Anthony has extensive expertise leading enterprise IT initiatives for mid-size to Fortune 50 organizations/client companies. As an established IT security subject matter expert, Anthony has gained industry visibility and a solid reputation. Sought after to share his knowledge and perspective, he is regularly invited to speak at key events by leading industry organizations, including Symantec annual partner round table, IRCE (Internet Retailer Conference and Exhibition), HostingCon (conference and trade show for web hosting and cloud service providers) and IREM (Institute of Real Estate Management).

Anthony holds an MBA from Georgia State University and a Bachelor of Science in Computer Information Systems from the University of Dayton.

2:45pm - 3:00pmBreak/ Vendor Booth Time
3:00pm - 3:30pmSession Ten

Sean Griesheimer

Business-Driven Security: A New Plan for Chaos 

We will discuss how and why key-business drivers shape your security operations. We go beyond the guidance provided by NIST, and take a look at Risk Management, Threat Intelligence, Incident Workflow & Classification, Staffing Models, Use Cases & Prioritization, Escalation Plans, Security Controls, and Key Performance Indicators.

Speaker’s Bio:

Sean comes from a vast background in financial planning, analysis, GRC, and Security.  Sean’s hands on experience as both a practitioner and a security engineer have proven to be tremendous assets for his colleagues and customers.  His abilities to connect across industry and organizations give him a leg up when engaged in those difficult cyber conversations.  Sean is currently completing his CISSP, CSA and numerous other Security certifications.  In addition, Sean is deeply embedded in the Kansas City technology community where you are likely to find him at ISC2 and ISSA events in his free time.

Prize Drawings for All in Attendance
3:30pm - 4:00pmSession Eleven

Quang Nguyen
Partner Sales Engineer

Safer Technology Through Threat Awareness and Response

It seems like every day the news is riddled with high profile data breaches. We all sit back and wonder, how could this have happened? During this presentation, we will take a deep look into what the most common elements of a cyberattack. Discover, why hackers want your data in the first place, how easily they are able to penetrate most systems and what they do with your information after they get it. Finally, learn how using a layered security approach can help keep your data out of hands of cyber-criminals, and your business off the front page news.

Prize Drawings for All in Attendance
4:00pm - 4:45pmSession Twelve

Dave Losen

Security Metrics & Their Importance

Security Metrics and Metric driven security programs are great buzz words. However, it is important that professionals understand the benefits of tracking and trending security metrics, how to collect them, and to determine what actionable items they indicate. This talk will provide an overview of several industry standard security metrics, talk about their history, and show how a few may be used for the benefit of a proactive, modern, security team.

Download the Presentation

Speaker’s Bio:

As co-founder of Sergeant Laboratories and its Director of Customer Success, Dave Losen has spent over 20 years investigating, hacking, and developing advanced security tools, like the product AristotleInsight. He has the unique ability to bridge the gap between kiddy scripting hacker tools to advanced big data machine learning systems, while being able to explain it all in plain English. Dave holds a patent on system monitoring that is a method for detecting and recording user interactions on an enterprise network, then presenting the results in an organized report. He has also earned recognition, a Prosecution Team Award, from the Wisconsin Association of Computer Crime Investigators (WACCI) for his forensic analysis.

Prize Drawings for All in Attendance