Dataconnectors 2018 Jan. 18, 2018 to Jan. 18, 2018, columbus,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Know Before You Go: Your Journey to the Cloud Doesn’t Have to be Filled with Potholes and Dead-ends Peter Scudamore The presentation will provide a baseline of the advantages of an IT strategy which includes ...
9 Pitfalls To Avoid When Implementing an IAM Solution Ginny Turley IAM implementations are fraught with both technical and career challenges and dangers. In this 30-minute ...
The Power of Your People: How to Rally Your Troops Against Phishing Todd O’boyle This presentation will walk you through how to build a phishing protection program for your ...
The Dangers of Mobile Malware Matt Pannebaker In elementary school, Matt Pannebaker once drew a picture of a rabbit that got him ...
Balancing Negative and Positive Security Models to Strengthen Endpoint Protection Josh Etsten Organizations have almost universally deployed endpoint security, yet with less than stellar efficacy against advanced ...
Defeating Ransomware Rob Cheng In today’s threat landscape, new forms of malware are taking their toll on business and ...
Next Generation Endpoint Protection – What you need to know Preston Perich In today’s hyper-connected world, user endpoints and servers alike are exposed to an expansive volume ...
The Connected Worker and the Enterprise of Things David Wiseman The smartphone is the primary communication and computing device for many of today’s consumers. This ...
The Top 5 Wi-Fi Security Mistakes Mike Fortenberry As employees at all levels default to Wi-Fi to access the corporate network, controlling who ...
Infrastructure Based Security Christian Barnes As the enterprise continues to be bombarded with advanced and increasingly more sophisticated attacks, the ...
Keeping the Enterprise Always On with IT Resilience Andrew Gray Your organization is always running and can’t afford downtime during a disaster or the traditional ...
A new approach to email security Romain Basset Through real-life examples, learn how malwares can easily circumvent classical detection methods such as fingerprint, ...