eventsholic logo Home About Map Contact SignUp Add Event

About Philadelphia Cybersecurity Conference 2018

The Philadelphia Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cybersecurity issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  View the full conference agenda below.

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Cybersecurity Strategies Conference.

8:45am - 9:15amSession One

Tom Bulthaupt
Sr. Systems Engineer – PA

A Synchronized Approach to Security

Discussion of the current cybersecurity threats and how to coordinate an automated response.

 

Speaker’s Bio:

Tom Bulthaupt has been in the network/security field for most of his professional career.
He worked at BBN during the early days of building out the ARPANET, as well as, the private encrypted networks supporting government and the military data. For the last 20 years, his focus has been on network and endpoint security, helping customers secure their infrastructure against the ever escalating threats.
Tom provides a hands-on knowledge of threats, consequences, and the required remedies facing businesses today.

9:15am - 9:45amSession Two

Jonathan Lange
Executive Sales Manager

Innovative Endpoint Management – A Holistic Approach to Vulnerability Management, Patching, OS-Upgrades and Software Distribution

Zero Day Vulnerability, Windows Fall Anniversary Update, Office 365 Migration: Are any of these topics causing your blood pressure to rise? This seminar will show you how you can automate OS-migrations, software deployment projects, and effective security exploit management all from one easy to use Endpoint Management Suite. No university degree or nerd glasses required – buckle up!

Download the Presentation

9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Brian Vecci
Technical Evangelist

Turtles, Trust and The Future of Cybersecurity

Faith in our institutions is collapsing, and GDPR is at the door. What would cybersecurity look like if we started from scratch, right now, in our hybrid, interdependent world?  It would focus relentlessly on data. Learn how a data-centric security approach can reduce risk, increase efficiency and re-engineer trust in a society where faith has been shaken by unstoppable breaches.

Speaker’s Bio:

Brian Vecci is a 19-year veteran of information technology and data security, including holding a CISSP certification, and has served in applications development, system architecture, project management, and business analyst roles in financial services, legal technology, and data security software organizations. Brian currently serves as a Technical Evangelist for Varonis Systems and works passionately to help organizations of all sizes get the most value from their data with the least amount of risk.

 

10:45am - 11:15amSession Four

David Boewer

Solved: Your Shared Responsibility for Security In the Cloud

While you moved your data to the cloud, your liability for its security did not go with it. Cloud vendors call it the “Shared Responsibility Model” and it describes where their Service Level Agreement stops and your responsibility starts. To make sure there are no gaps between their technology and yours, you need to deploy many of the same tools you would deploy in your own datacenter. You need to deploy them across all your SaaS and you need to manage them across all your cloud.

Avanan, The Cloud Security Platform, protects data in any SaaS. Partnering with the industry’s most trusted security vendors, it offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, insider threats and more. The cloud-based platform is completely out-of-band and can be deployed in one click.
It is the next generation of cloud security.

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Bob Erdman
Cybersecurity Product Manager

Create Your Cloud Security Strategy

Public, private, and hybrid cloud architectures are rapidly transforming the landscape of traditional data centers and your security strategies must transform with them.

Agile teams, DevOps, and microservices provide unlimited options and scalability, but cloud systems must be secured against the constant threats launched against them.

The dynamic ability to automatically increase or decrease your computing footprint to meet scalability demands is a wonderful cloud benefit, but how do you secure what you cannot see?

Join this Bob Erdman to learn about cloud security best practices for protecting your systems.

We’ll show you how to:

  • Gain visibility into your cloud security blind spot
  • Maintain a consistent security policy across traditional, hybrid, and cloud deployed systems
  • What are the shared responsibilities of operating in a secure cloud environment
  • Create an automated cloud security assessment model

This session will arm you with the information you need to secure your systems against today’s most pressing threats.

Speaker’s Bio:

Bob has more than two decades of experience securing Linux, Unix, and Windows platforms. He has implemented security solutions for government, healthcare, and other corporate entities covering a wide variety of technologies.

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Bryan Lares
BU Lead, Director of Security Products

AI/ML Endpoint Protection – Deploying a cognitive, data-driven analytics platform for the reliability, efficiency and security of enterprise networks and IoT/OT environments

Speaker’s Bio:

Rick Pither is in charge of Global Security Sales for SparkCognition. In this role, he is responsible for driving sales of the cutting-edge, AI-powered cybersecurity platform that the company deploys.
Pither’s areas of specialty include IT cybersecurity, virtualization, hybrid cloud, protocol analysis and network management.
Prior to SparkCognition, Pither held various executive positions at McAfee, VMware, and Secureworks over his 24-year career in cybersecurity. He has spoken at numerous conferences and summits; most recently at the Association of Anti-Money Laundering Specialists conference.
Pither values strong recruiting efforts and operational excellence to increase selling time of his team and is passionate about coaching and mentoring.
Pither earned his bachelor’s degree in management and marketing from Purdue University.

1:00pm - 1:30pmSession Seven
1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

 

Tom Desilets
President of PhillyCom, Inc.

 

 

 

Olav Jensen
Regional Sales Director, Mid-Atlantic

 

 

Why CASB?

Download the Presentation- PhillyCom

Download the Presentation- Bitglass

 

 

 

 

 

 

Speaker’s Bio:

Tom Desilets is the President of PhillyCom Inc. Tom has worked in the technology field since 1994, starting his career with Bell Atlantic Network Integration. Other companies that Tom has worked for include Wang Global, Nortel and Heavy Water Ltd. He is also a graduate of Villanova University and makes his home in the western suburbs of Philadelphia, PA. His technical experience delves into areas such as Ethernet, VoIP, storage, virtualization, network optimization, network monitoring, cloud computing and more. Throughout his career Tom has always strived to achieve excellence in delivering products and services to his customers. It is this commitment and passion upon which Tom has founded PhillyCom Inc.

Olav has over 25 years of experience in Information Technology as an Engineer and Sales Director in the areas of Cybersecurity, Networking, and Storage. As the Sales Director for the Mid-Atlantic Region, he is responsible for helping organizations secure their data residing in cloud applications, platforms, and mobile/BYOD devices by leveraging Bitglass’ ZeroDay Core technology. He holds a BSEE from Virginia Tech.

2:15pm - 2:45pmSession Nine
2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:30pmSession Ten

Establishing the Role of Prevention in Endpoint Security

The current landscape of the cyber security industry is shifting towards endpoint detection and response while pushing responsibility to the IT Admins. Large security companies are no longer holding themselves responsible for stopping malware and keeping networks and devices secure. In an alternate approach we’ll shift the focus towards prevention and not putting the burden on IT Admins.

In this session you’ll learn:

  • The current landscape of endpoint security.
  • A shift of responsibility in security and data protection.
  • An alternate approach to the mainstream cyber security practices.
  • Growing attack vectors in the malware industry.
3:30pm - 4:00pmSession Eleven

Teresa Wingfield
Director, Product Marketing

State of Endpoint Security

Ponemon Institute estimates an average breach cost of $3.5 million in 2017, with a 27% probability that a U.S. company will experience a breach in the next 24 months. Just in one recent example, shipping company Maersk lost over $300 million when ransomware infected its systems. Malware is winning with a never ending supply of new attack vectors, previously unseen methods and malware variants.  Why, after companies have invested billions of dollars in endpoint security, are they still so vulnerable?

This interactive presentation will discuss the reasons behind the vulnerable state of endpoint security, along with the evolution of traditional Antivirus (AV), and the rise of Next-Generation Antivirus (NGAV) products powered by Machine Learning and Endpoint Detection and Response (EDR) solutions. It will then look into the latest endpoint security trends that promise to increase efficacy, lower TCO and deliver a more robust feature set without requiring organizations to rip and replace their existing security stack.

Speaker’s Bio:

Teresa Wingfield is Director of Product Marketing at Nyotron where she frequently engages with customers to understand their endpoint protection challenges. Teresa has worked in the security industry for over a decade. Most recently, she managed McAfees’s portfolio of cloud workload and data center security solutions. She has also managed product lines in mobile security at VMware, virtual machine protection and website security at Symantec and file integrity monitoring at Active Reasoning (acquired by Oracle).

4:00pm - 4:30pmSession Twelve


Brian C Reed
Chief Mobility Officer, NowSecure

Risks Hiding in Plain Sight: Mobile & Web App Vulnerability Benchmarks

Speaker’s Bio:

As NowSecure’s Chief Mobility Officer, industry veteran Brian Reed brings over a 15 years experience in mobile, apps, security and operations management including Good Technology, BlackBerry, ZeroFOX and BoxTone working with Fortune 2000 global customers and government agencies. With more than 25 years building innovative products and scaling operations, Brian is a dynamic speaker and compelling storyteller who brings unique insights and global experience. Brian is a graduate of Duke University.

4:30pm - 5:00pmSession Thirteen

Dave Rummler