APCUG 2015 Security Beta Virtual Technology Conference (VTC17)

Saturday, October 17, 2015

Presentation Schedule
Click on the Presentation titles below to display full details as well as links to the handouts and Presentation Recordings when they are uploaded to the website and YouTube Channel.

1:00 pm – 1:50 pm ET | 12 noon – 12:50 pm CT
11:00am – 11:50 am MT | 10:00 am – 10:50 am PT

Hewie is a victim of identity theft; his presentation covers typically boring facts & figures with up-to-date and interesting information along with examples of actual instances of events leading to ID theft. Then Hewie will give us many great suggestions on how to prevent us from experiencing ID Theft and what to do if we do become a victim.

ID_Theft_How_to_Avoid_It_HewiePoplock_SecurityVTC (PDF)

Presenter Bio

2:00 pm – 2:50 pm Eastern | 1:00 pm – 1:50 pm Central
12:00 noon – 12:50 pm Mountain | 11:00 am – 11:50 am Pacific

We all care about our privacy and want to make sure our computer is secure. There has been a lot of talk about Microsoft knowing everything about us. Bill’s hands-on demo will show how to customize both our privacy and security selections in Win 10 and Edge.

Presenter Bio

3:00 pm – 3:50 pm Eastern | 2:00 pm – 2:50 pm Central
1:00 pm – 1:50 pm Mountain | 12 noon – 12:50 pm Pacific

We need to make informed decisions when using any electronic device. Tips for keeping your mobile devices secure and malware free.

How_Secure_Is_My_Device_JereMinich_SecurityVTC (PDF)

Presenter Bio

4:00 pm – 4:50pm Eastern | 3:00 pm – 3:50 pm Central
2:00 pm – 2:50 pm Mountain | 1:00 pm – 1:50 pm Pacific

For successful scammers and thieves, every day is April Fools’ Day. How prepared are you to avoid becoming a victim of ID theft? Do you know what to do if you become a victim? Florida is the #1 state for ID theft and California is in the top 10 for the highest rate of per capita complaints since 2005. This presentation will cover:
• Many of the ways your ID can be stolen
• What you can do to prevent that happening
• What to do, who to contact, etc. if you or someone you know becomes the victim of ID theft
• The role of a Digital Asset Executor

Protecting_Yourself_Yourself_SecurityVTC_Taylour (PDF)

Presenter Bio