- This event has passed.
February 1 @ 8:00 am - 4:30 pm
The Tampa Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. View the full conference agenda below.
For information on participating as a vendor: firstname.lastname@example.org
Data Connectors is proud to host the Cyber Security Strategies Conference.
Channel Sales Engineer
Today’s Threats: Ransomware and Intercept X
Security technologies are constantly evolving, but are they working together to respond to threats? Learn how Sophos defends your endpoints, data, and network and how the Synchronized Security platform enables immediate response.
Stephen Weber has been in the IT industry for 20+ years. Holding many roles throughout his career, including Network Engineer, Business Owner of an MSP and now Sales Engineer at Sophos.
Security Awareness Advocate
Best Practices and Future Direction of Security Awareness Training
Ignoring the human side of cybersecurity will leave your organization vulnerable. Reported numbers may fluctuate from industry study to industry study, but they all agree on one thing: cybercriminals are successfully and consistently exploiting human nature to accomplish their goals. Employees are often the last line of defense between a sophisticated cyber-scam and your systems, data, and customers.
Prudent security leaders know that security awareness and training is key to strengthening their ‘human firewall’ – but they often don’t know where to start. This session will provide practical security awareness and behavior management tips, outline how and where tools are helpful, and discuss emerging industry trends.
Secure Your Cloud Email and Applications in Minutes with Best-of-Breed Vendors
Users have been evolving to the cloud for everything from Office 365 mail/suite and Google mail/suite to more traditional cloud apps like SFDC, ServiceNow, file-sharing services, and even the IaaS guys like AWS and Azure. With this comes the inherent risk of not being able to use your trusted on-premise security tools to manage your data. Avanan, unlike the legacy vendors in the email protection and CASB space, does not rely on complicated rerouting of users and traffic to proxy inspection engines in the cloud. Hear how full presence within the cloud data can be accessed in minutes via API’s and secured with 60+ world-class and trusted vendors ranging from Check Point to Palo Alto, FireEye, Cylance and many more…
Sr. Systems Engineer
The Top 5 Wi-Fi Security Mistakes
Learn how to avoid the top 5 deployment mistakes that leave managers and their networks open to compromise.
As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.
How do different security models stand up to this new reality, and how secure is your connection? We’ll cover the following during our session:
- The top 5 Wi-Fi security mistakes
- Viewing exactly what’s happening on your network
- Building an authentication and encryption model that doesn’t force user workarounds
- Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
- Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models
Richard Hector, serves as Senior Systems Engineer at Aerohive Networks, the leading independent enterprise Wi-Fi vendor. With over 10 years’ in Wi-Fi industry, Hector likens himself as a real-life Wi-Fi super hero who moonlights as a professional photographer.
Managing Principal Consultant
Security Best Practice: Discovery, Visibility & Control
New devices join your network every hour. These devices significantly expand your attack surface yet remain invisible to many current security products.
Please join us to discuss strategies to reduce security risk and prevent breaches and unwanted access though visibility, control, and orchestration.
We will review strategies to:
- Discover your infrastructure, physical/virtual systems, managed/unmanaged endpoints, IoT devices, and rogue systems — without requiring software agents or previous device knowledge
- Deny or limit network access based on device posture and your security policies, applying consistent policy enforcement across your physical, virtual and cloud environments
- Orchestrate information sharing and policy-based security enforcement operations
Systems Engineer – Identity
Business-Driven Security, Identity and the New Age of Risk
In the constantly changing landscape of cyber risk, security and risk management teams (including executives and board members) are increasingly forced to take ownership of and accountability relating to digital risks. Yet, many lack the critical knowledge to make effective risk management decisions and incorporate them into their overall business strategy. This inevitably leads to security strategies which are ineffective and reactionary. This presentation will outline RSA’s Business-Driven Security strategy, and will focus particularly on the importance of leveraging identity and access management (IAM) as a key tool in the battle against adversaries both within and outside your environment.
Take the Ransom Out of Ransomware
Joe will talk about
- how IT departments are getting squeezed for resources and we need to simplify solutions
- How even according to the FBI, BDR is the most important component to any security architecture
- What Unitrends provides
- Who TIG is
Engineering Manager of Florida
Securing Someone Else’s Computer – Why Cloud Security Should be a Priority
Adding Cloud to your infrastructure can be a great way to add resiliency or start up new services without the need to purchase expensive hardware. But, the migration to cloud can be fraught with security concerns. Our presentation will highlight some of security considerations when migrating to the cloud, including the default security options, advanced threat protection, and visibility of traffic and threats.
Cybercrime Tactics and Techniques: The State of Malware
Chief Solution Architect
A new approach to email security
Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.
Chief Solution Architect at Vade Secure, Speaker at the M3AAWG, Adrien is an email security guru. He works with and for the biggest IT and Email Related companies in the world, giving him a global vision on email threat.