Loading Events

« All Events

  • This event has passed.

Anaheim

June 2 @ 8:15 am - 5:00 pm

Event Navigation

Details

Date:
June 2
Time:
8:15 am - 5:00 pm

Venue

Doubletree Anaheim Orange County
100 The City Drive
Orange,CA92868United States
+ Google Map
Phone:
1-714-634-4500

Overview

The Anaheim Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: [email protected]

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Carmine Clementelli
Marketing Manager

Network Visibility And Security In The Era Of Mobility & Advanced Threats

Hack attacks – and in particular Advanced Persistent Threats (APTs) – are on the rise, eroding reputations and looting organizational assets with disturbing regularity.  With mobility the new norm and mobile security in its relative infancy, are BYOD enterprises inviting APT attacks?  Mobile devices potentially open the organizational network to a new set of security risks that challenge IT professionals to plan strategically.  This session examines effective new approaches to redefine network perimeter, gain real time network visibility into who and what is on it, and control access automatically.  Importantly, the session offers strategies for preventing and controlling APTs and other infections.

9:15am - 9:45amSession Two

Derek Snyder

Sophos12

“Bolstering your Defenses with Sandboxing Technology – What to Consider”

Keeping threats away from your network is a critical first line of defense. A sandbox automatically isolates files to determine if they’re safe, providing an instant additional layer of detection and protection. For many companies, these advanced technologies require additional resources and security expertise to implement and monitor them. New solutions are changing this by providing all businesses access to next-generation sandboxes that are affordable and simple to deploy.

In our Session, Derek Snyder (Sophos Engineer) will explain the latest sandbox technology, share 5 key points to consider and will answer questions including: Why don’t my conventional defenses protect me from APT s, and how do I choose the right sandbox?

9:45am - 10:15amBreak/Vendor Booth Time
10:15am - 10:45amSession Three

Colm Foley
International Channel Sales Directo

Security analytics for Digital Resilience.

RedSeal provides a cybersecurity analytics platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives. RedSeal’s advanced analytics engine creates functioning network modelstests networks to identify security risks, Measure needed actions, and provides critical information to quickly Prioritize issues. The result: reduced cybersecurity risk and lower incident response and maintenance costs.

10:45am - 11:15amSession Four

Brian Damschen
Regional Sales Director, Southwest District

Reclaim Control of Mobile and Distributed Data

In today’s mobile and cloud application world, locating, tracking, and monitoring dispersed data has become increasingly more complicated. Organizations that can get a few steps ahead in identifying and remediating potential data risks before they become critical business issues will more effectively protect their enterprise from exposure and fines, while minimizing impact to workforce productivity.

Because of these data and work habit changes, enterprises struggle to provide effective productivity tools to mobile workers, while at the same time meet corporate governance obligations; tracking sensitive information for HIPAA, PCI and SOX, ensuring employee data privacy, and meeting legal needs.

Join us for this session where we’ll discuss what the increasing data governance burden created by data sprawl means and strategies to address it,  the key challenges of tracking, monitoring and responding to compliance/legal requests for dispersed enterprise data and what actions your organization can take today to get ahead.

Download the Presentation

11:15am - 11:45amBreak/Vendor Booth Time/Lunch
11:45am - 12:30pmSession Five

Darrell Sturdivant Product Line Sales Engineer

 

Half Protected is Half Not – Platform Approach to Securing Enterprise Identities

The world of Identity Management is dangerously fragmented and needlessly complex. Don’t settle for half a solution when you need full protection for both end users and privileged users.  

Centrify secures enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises.  The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.  

 

In this session, we will discuss Centrify’s platform approach to securing enterprise identities and:

  • Discover the new way to protect against the #1 point of attack in data breaches
  • Defend both end users & privileged users with a single platform solution
  • Centralize authentication, authorization, policy, and auditing for IT resources
  • Establish Identity as the new perimeter across cloud, mobile, and data center.

Download the Presentation

12:30pm - 12:45pmBreak/Vendor Booth Time
12:45pm - 1:30pmSession Six

Robert Casto
Regional Mobility Expert

 

How to Keep Your Mobile Devices One Step Ahead of Hackers

Cyber thieves are banging on your employee’s smartphones and tablets with terrible brute force. They know these devices are treasure troves of valuable, unprotected data. But bolstering your security to protect mobile devices from threats is tricky. Do you know how these devices can affect your business? Come to our sessions to learn how you can stay one step ahead.

1:30pm - 2:00pmSession Seven

Nick Serrecchia
Systems Enginee

Using the Cloud to Secure your Data.

Is you Data Secured?  “Modern Ransonware” can encrypt your data, lock it down, and make recovery of that data nearly impossible.   Learn best practices around utilizing the latest best practices and technology to protect your data.

Download the Presentation

2:00pm - 2:15pm Break/Vendor Booth Time
2:15pm - 2:45pmSession Eight

Robert Kodweis 
Sales Director-West

The Shift to Data-Centric Security:  What Works & What Doesn’t

With outsourcing and the use of file-sharing solutions on the rise, sensitive information is flowing outside of organizations at an unprecedented rate.  Protecting the perimeter and devices isn’t enough.  In this session, we will explore the realities of persistent data-centric protection and how the latest generation of enterprise digital rights management solutions are shifting the way organizations defend themselves.

Download the Presentation

2:45pm - 3:00pm Break/Vendor Booth Time
3:00pm - 3:30pmSession Nine

Mike Schwarz
Solutions Architect, SD/OC/IE/HI

Securing HyperConverged Infrastructure – Design Considerations and Best Practices

Can you reap the benefits of the cloud without accepting the security trade-offs? Do you have workloads you prefer to keep on-premise?  Hyperconverged infrastructure provides a cloud-like infrastructure for your on-premise workloads.  It dramatically reduces TCO and data center complexity, providing an attractive alternative to the public cloud. This presentation will dive into security best practices and design considerations for HyperConverged Infrastructure.

3:30pm - 4:00pmSession Ten

Tom Wood
Exinda Sales Director

Is your application visibility getting cloudy?


More and more of your critical applications are moving outside of your network and data centers and into the cloud. With the move to cloud, many IT organizations have lost some of the visibility and control they once had when these applications were on prem.  Learn about some of the challenges organizations face when moving to the cloud and what you need to do to get the clarity you need for your critical apps.

Sponsors