Loading Events

« All Events

  • This event has passed.

Tampa (Cybersecurity)

February 1 @ 8:00 am - 4:30 pm

Event Navigation

Details

Date:
February 1
Time:
8:00 am - 4:30 pm
Event Category:

Venue

DoubleTree by Hilton Tampa Airport Westshore
4500 West Cypress Street
Tampa, FL 33607
United States
  + Google Map
Phone:
1-800-514-3956
Website:
http://www.doubletreetampawestshore.com/

Overview

The Tampa Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cyber Security Strategies Conference.

8:45am - 9:15amSession One

Steve Weber
Channel Sales Engineer

Today’s Threats: Ransomware and Intercept X

Security technologies are constantly evolving, but are they working together to respond to threats? Learn how Sophos defends your endpoints, data, and network and how the Synchronized Security platform enables immediate response.

Speaker’s Bio:

Stephen Weber has been in the IT industry for 20+ years. Holding many roles throughout his career, including Network Engineer, Business Owner of an MSP and now Sales Engineer at Sophos.

 

 

9:15am - 9:45amSession Two

Erich Kron
Security Awareness Advocate

Best Practices and Future Direction of Security Awareness Training

Ignoring the human side of cybersecurity will leave your organization vulnerable. Reported numbers may fluctuate from industry study to industry study, but they all agree on one thing: cybercriminals are successfully and consistently exploiting human nature to accomplish their goals. Employees are often the last line of defense between a sophisticated cyber-scam and your systems, data, and customers.

Prudent security leaders know that security awareness and training is key to strengthening their ‘human firewall’ – but they often don’t know where to start. This session will provide practical security awareness and behavior management tips, outline how and where tools are helpful, and discuss emerging industry trends.

Download the Presentation

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Doug Laughlin
Senior Account Executive

Secure Your Cloud Email and Applications in Minutes with Best-of-Breed Vendors

Users have been evolving to the cloud for everything from Office 365 mail/suite and Google mail/suite to more traditional cloud apps like SFDC, ServiceNow, file-sharing services, and even the IaaS guys like AWS and Azure.  With this comes the inherent risk of not being able to use your trusted on-premise security tools to manage your data.  Avanan, unlike the legacy vendors in the email protection and CASB space, does not rely on complicated rerouting of users and traffic to proxy inspection engines in the cloud.  Hear how full presence within the cloud data can be accessed in minutes via API’s and secured with 60+ world-class and trusted vendors ranging from Check Point to Palo Alto, FireEye, Cylance and many more…

Download the Presentation

10:45am - 11:15amSession Four

Richard Hector
Sr. Systems Engineer

The Top 5 Wi-Fi Security Mistakes 

Learn how to avoid the top 5 deployment mistakes that leave managers and their networks open to compromise.

As employees at all levels default to Wi-Fi to access the corporate network, controlling who can join – and what they can do – has become business critical. The rise of low sophistication ‘things’ also rapidly increases the attack surface – with rising popularity of IoT hacks.

How do different security models stand up to this new reality, and how secure is your connection? We’ll cover the following during our session:

  • The top 5 Wi-Fi security mistakes
  • Viewing exactly what’s happening on your network
  • Building an authentication and encryption model that doesn’t force user workarounds
    • Utilizing Private PSK technology that gives you the ability to easily onboard and identify devices, without security or complexity concerns
  • Using identity and context to tighten up gaps around ‘things’, BYOD, and user groups in traditional models

Speaker’s Bio:

Richard Hector, serves as Senior Systems Engineer at Aerohive Networks, the leading independent enterprise Wi-Fi vendor. With over 10 years’ in Wi-Fi industry, Hector likens himself as a real-life Wi-Fi super hero who moonlights as a professional photographer.

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Travis Abrams
Managing Principal Consultant

Security Best Practice: Discovery, Visibility & Control

New devices join your network every hour. These devices significantly expand your attack surface yet remain invisible to many current security products.

Please join us to discuss strategies to reduce security risk and prevent breaches and unwanted access though visibility, control, and orchestration.

We will review strategies to:

  • Discover your infrastructure, physical/virtual systems, managed/unmanaged endpoints, IoT devices, and rogue systems — without requiring software agents or previous device knowledge
  • Deny or limit network access based on device posture and your security policies, applying consistent policy enforcement across your physical, virtual and cloud environments
  • Orchestrate information sharing and policy-based security enforcement operations
12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:15pmSession Six

Alex Coco
Systems Engineer – Identity

Business-Driven Security, Identity and the New Age of Risk

In the constantly changing landscape of cyber risk, security and risk management teams (including executives and board members) are increasingly forced to take ownership of and accountability relating to digital risks. Yet, many lack the critical knowledge to make effective risk management decisions and incorporate them into their overall business strategy. This inevitably leads to security strategies which are ineffective and reactionary. This presentation will outline RSA’s Business-Driven Security strategy, and will focus particularly on the importance of leveraging identity and access management (IAM) as a key tool in the battle against adversaries both within and outside your environment.

1:15pm - 2:00pmSession Seven

Joe Calabria
Channel Account Manager, South

Take the Ransom Out of Ransomware

Joe will talk about

  • how IT departments are getting squeezed for resources and we need to simplify solutions
  • How even according to the FBI, BDR is the most important component to any security architecture
  • What Unitrends provides
  • Who TIG is
2:00pm - 2:15pmBreak / Vendor Booth Time
2:15pm - 3:00pmSession Eight

Wes Belt
Engineering Manager of Florida

Securing Someone Else’s Computer – Why Cloud Security Should be a Priority

Adding Cloud to your infrastructure can be a great way to add resiliency or start up new services without the need to purchase expensive hardware.  But, the migration to cloud can be fraught with security concerns.  Our presentation will highlight some of security considerations when migrating to the cloud, including the default security options, advanced threat protection, and visibility of traffic and threats.

Download the Presentation

 

3:00pm - 3:15pmBreak / Vendor Booth Time
3:15pm - 3:45pm Session Nine

Michael Hernandez
Sales Engineer

Cybercrime Tactics and Techniques: The State of Malware

Prize Drawings for All in Attendance
3:45pm - 4:30pmSession Ten

Adrien Gendre
Chief Solution Architect

A new approach to email security

Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, reputation and sandboxing, and discover how Vade Secure unique predictive email defense can stop ransomwares and phishing attempts before they reach your employees.

Speaker’s Bio:

Chief Solution Architect at Vade Secure, Speaker at the M3AAWG, Adrien is an email security guru. He works with and for the biggest IT and Email Related companies in the world, giving him a global vision on email threat.

Prize Drawings for All in Attendance

Sponsors