
- This event has passed.
Anaheim
June 2 @ 8:15 am - 5:00 pm
Event Navigation
Overview
The Anaheim Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more! You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS. Scroll down to view the full conference agenda.
For information on participating as a vendor: [email protected]

Data Connectors is proud to host the Tech-Security Strategies Conference.

Carmine Clementelli
Marketing Manager
Network Visibility And Security In The Era Of Mobility & Advanced Threats
Hack attacks – and in particular Advanced Persistent Threats (APTs) – are on the rise, eroding reputations and looting organizational assets with disturbing regularity. With mobility the new norm and mobile security in its relative infancy, are BYOD enterprises inviting APT attacks? Mobile devices potentially open the organizational network to a new set of security risks that challenge IT professionals to plan strategically. This session examines effective new approaches to redefine network perimeter, gain real time network visibility into who and what is on it, and control access automatically. Importantly, the session offers strategies for preventing and controlling APTs and other infections.
“Bolstering your Defenses with Sandboxing Technology – What to Consider”
Keeping threats away from your network is a critical first line of defense. A sandbox automatically isolates files to determine if they’re safe, providing an instant additional layer of detection and protection. For many companies, these advanced technologies require additional resources and security expertise to implement and monitor them. New solutions are changing this by providing all businesses access to next-generation sandboxes that are affordable and simple to deploy.
In our Session, Derek Snyder (Sophos Engineer) will explain the latest sandbox technology, share 5 key points to consider and will answer questions including: Why don’t my conventional defenses protect me from APT s, and how do I choose the right sandbox?

Colm Foley
International Channel Sales Directo
Security analytics for Digital Resilience.
RedSeal provides a cybersecurity analytics platform to Global 2000 organizations that helps ensure network and business continuity and accelerates compliance initiatives. RedSeal’s advanced analytics engine creates functioning network models, tests networks to identify security risks, Measure needed actions, and provides critical information to quickly Prioritize issues. The result: reduced cybersecurity risk and lower incident response and maintenance costs.

Brian Damschen
Regional Sales Director, Southwest District
Reclaim Control of Mobile and Distributed Data
In today’s mobile and cloud application world, locating, tracking, and monitoring dispersed data has become increasingly more complicated. Organizations that can get a few steps ahead in identifying and remediating potential data risks before they become critical business issues will more effectively protect their enterprise from exposure and fines, while minimizing impact to workforce productivity.
Because of these data and work habit changes, enterprises struggle to provide effective productivity tools to mobile workers, while at the same time meet corporate governance obligations; tracking sensitive information for HIPAA, PCI and SOX, ensuring employee data privacy, and meeting legal needs.
Join us for this session where we’ll discuss what the increasing data governance burden created by data sprawl means and strategies to address it, the key challenges of tracking, monitoring and responding to compliance/legal requests for dispersed enterprise data and what actions your organization can take today to get ahead.

Darrell Sturdivant Product Line Sales Engineer
Half Protected is Half Not – Platform Approach to Securing Enterprise Identities
The world of Identity Management is dangerously fragmented and needlessly complex. Don’t settle for half a solution when you need full protection for both end users and privileged users.
Centrify secures enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.
In this session, we will discuss Centrify’s platform approach to securing enterprise identities and:
- Discover the new way to protect against the #1 point of attack in data breaches
- Defend both end users & privileged users with a single platform solution
- Centralize authentication, authorization, policy, and auditing for IT resources
- Establish Identity as the new perimeter across cloud, mobile, and data center.

Robert Casto
Regional Mobility Expert
How to Keep Your Mobile Devices One Step Ahead of Hackers
Cyber thieves are banging on your employee’s smartphones and tablets with terrible brute force. They know these devices are treasure troves of valuable, unprotected data. But bolstering your security to protect mobile devices from threats is tricky. Do you know how these devices can affect your business? Come to our sessions to learn how you can stay one step ahead.

Nick Serrecchia
Systems Enginee
Using the Cloud to Secure your Data.
Is you Data Secured? “Modern Ransonware” can encrypt your data, lock it down, and make recovery of that data nearly impossible. Learn best practices around utilizing the latest best practices and technology to protect your data.

Robert Kodweis
Sales Director-West
The Shift to Data-Centric Security: What Works & What Doesn’t
With outsourcing and the use of file-sharing solutions on the rise, sensitive information is flowing outside of organizations at an unprecedented rate. Protecting the perimeter and devices isn’t enough. In this session, we will explore the realities of persistent data-centric protection and how the latest generation of enterprise digital rights management solutions are shifting the way organizations defend themselves.

Mike Schwarz
Solutions Architect, SD/OC/IE/HI
Securing HyperConverged Infrastructure – Design Considerations and Best Practices
Can you reap the benefits of the cloud without accepting the security trade-offs? Do you have workloads you prefer to keep on-premise? Hyperconverged infrastructure provides a cloud-like infrastructure for your on-premise workloads. It dramatically reduces TCO and data center complexity, providing an attractive alternative to the public cloud. This presentation will dive into security best practices and design considerations for HyperConverged Infrastructure.

Tom Wood
Exinda Sales Director
Is your application visibility getting cloudy?
More and more of your critical applications are moving outside of your network and data centers and into the cloud. With the move to cloud, many IT organizations have lost some of the visibility and control they once had when these applications were on prem. Learn about some of the challenges organizations face when moving to the cloud and what you need to do to get the clarity you need for your critical apps.


































