November 7, 2017
11:00am - 5:00pm
5151 Guilford Rd
Rockford, IL 61107
Registration is now open!
For more information,
CLICK or call (815) 399-5664.
Stay tuned –
more information added daily.
The threat landscape is evolving
rapidly with attacks such as Petya
and WannaCry dominating the
headlines earlier this year.
Being prepared for what’s next is crucial so your organization
doesn’t find itself as part of the next big ransomware story.
Christina Park has been in the industry for over 6 years, and with Axis for 3 years. She started as an Account Executive supporting the Illinois territory and then moved into the Small Business Account Manager role for the Midwest Business Area. In her spare time, she enjoys outdoor activities with her friends and family.
AXIS Companion Line is a complete end-to-end solution designed to meet the requirements of small businesses. With AXIS Companion, business owners can control their surveillance while away from their business, giving them one less thing to worry about.
Chris has spent the past 3 years with Solarwinds Backup working his way from intern to Backup Specialist. As a specialist, he focuses on SMB’s doing anywhere from file level protection to full business continuity. He works with partners to setup a hybrid approach to backup and recovery allowing flexibility and quick recovery in the fast changing IT world.
As Director of Managed Services with Entré Computer Solutions, Chris is responsible for the management and sales of the Entré NetMonitor product line. Starting at Entré in 2008, and provides support and consultation on a number of fully managed solutions within the company. The Entré NetMonitor division is currently one of the largest Managed Services Providers in the area, serving businesses looking to increase uptime, and better control everyday IT through remote monitoring, backup, antivirus and spam protection solutions.
PowerShell was released just over ten years ago and instantly became an irreplaceable tool for system administration. It can be used to automate just about any task required in a Windows network from deploying software to reporting on hardware inventory. The best part is that it is installed by default into every modern version of the Windows operating system. So what happens when a hacker gets hold of a device on your network and uses PowerShell to further their attack?
Find out how hackers are using Microsoft’s own built in system administration tools against your organization’s network. PowerShell offers enough power and flexibility that hackers may not need to install additional malware to take over your network. This presentation will show demos on using PowerShell for network recon, command & control, and workstation exploitation. It will also discuss defensive measures for protecting your network from this often overlooked attack vector
Stephen Gee is a Senior Product Manager responsible for Barracuda’s email security product line. Prior to this role, he served as a Technical Evangelist, helping to grow Barracuda’s data protection business. He brings over 17 years of experience in the high-tech industry spanning product management, technical evangelist and engineering positions. Gee holds a B.S. degree in Operations Management and Information Systems from Santa Clara University.
Kevin Switzer is a Cisco technology Consultant (TC), and has been with Ingram Micro’s team for over 10 years. As a TC, he is a field-focused partner resource that specializes in helping partners navigate Cisco technologies, road mapping new specializations and architectures, as well as assisting with designing and demonstrating Cisco technologies to help clients use technology to solve various business problems and needs. He is responsible for the Ingram Micro Central territory.
In addition to his formal education, Bachelors of Science in Computer Science Kevin holds various Cisco Certifications in Design as well as implementation and configuration for Cisco Data Center and Security Solutions. He has a passion for the Cisco Security architecture including FirePower, Malware protection, Umbrella and Stealthwatch. Kevin is also an avid threat researcher as well as a member of the FBI InfraGard Partnership for Protection.