Loading Events

« All Events

  • This event has passed.

Hartford

May 25 @ 8:15 am - 5:00 pm

Event Navigation

Details

Date:
May 25
Time:
8:15 am - 5:00 pm

Download PDF Directory

Overview

The Hartford Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One

Luis Rico

More than just a SIEM, full Threat Lifecycle Management for your organization

The Threat Lifecycle Platform is more than just a SIEM, it is the best way to gain full Threat visibility into what is going on in your organization, decrease time to detect and increase mitigation. Come join us for a crash course on what is a SIEM and why we’re better than a SIEM – full Threat Lifecycle Management.

9:15am - 9:45amSession Two

Jay Veteto
Security Account Manager

Utilizing the Normality of Network Traffic as a Security Sensor

IT Security personnel are always fascinated with the latest known bad guys trying to find new ways to breach their Enterprise.  However, what lies beneath the Network Infrastructure will give more insights to the unknown threats existing in today’s world.  Find out how Security professionals are starting to utilize the traffic from their existing, invested Network Infrastructure, and turning it into a large virtual security sensor.

9:45am - 10:00amBreak / Vendor Booth Time
10:00am - 10:45amSession Three

Jonathan Lange
Executive Manager

Automating Endpoint Management:  Patching, Deployment and System Building made easy 

With increasing demands on IT Managers, new ways for handling security and user requirements are needed. This seminar will show you, how you can automate your patch management, drastically simplify system building, and find out about ways to enroll software while avoiding complex repackaging procedures – inside and outside of your network. 

This seminar will show you how you can innovatively automate and structure standard endpoint management tasks and improve security and compliance.

Download the Presentation

Speaker’s Bio:

Jonathan Lange is responsible for Sales in the US market. Having advised customers in various countries from small businesses to global enterprises, he is well aware of the challenges IT departments face today in order to keep their infrastructure up-to-date, safe and efficient. Specialized on efficient methods for endpoint management, he has an in-depth knowledge of the baramundi Management Suite and how it can benefit IT departments.

About baramundi software USA

baramundi software USA, Inc. provides companies and organizations with efficient, secure, and cross-platform management of workstation environments. Around the world, over 2,000 customers of all sizes and from every sector benefit from the independent German manufacturer’s many years of experience and outstanding products. These are compiled into an integrated, future-orientated unified endpoint management approach in the baramundi Management Suite: endpoint management, mobile device management, and endpoint security are provided via a shared interface, using a single database, and according to global standards.

10:45am - 11:15amSession Four

Rob Karnbach
Channel Systems Engineer

Prioritizing Vulnerability Management

Prioritizing vulnerabilities is something that every organization struggles with. This presentation will cover where many vulnerability management programs struggle, as well as effective ways to prioritize vulnerabilities.

Download the Presentation

Speaker’s Bio:

Rob Karnbach has been a Channel Systems Engineer in the industry for over 20 years. Rob has been key to developing Channel partners by teaching and presenting key solutions to Technical Channel Resources. He has presented at CRN’s top 100 partner summit. Rob was also an Air Force Fire Fighter for 14 years, including serving in Desert Shield/Storm.

11:15am - 11:45amBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Ryan Fitzgibbon

Keeping the Enterprise Always On with IT Resilience

Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one.  Backup solutions don’t solve these problems as they are not true disaster recovery for the business.  What types of disasters will impact the business?  Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience.  Learn about which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.

Download the Presentation

12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Nuno Sousa
SE Manager, Strategic Accounts New England, Check Point

Operationalizing your cloud Security

Speaker’s Bio:

Nuno is the Check Point Strategic Engineering Manager in New England.  10+ years of experience in the cybersecurity industry.  He has held various positions in the vendor, system integrator and private sector including Security Engineer, Security Architect, Security Consultant and now managing Check Point SE’s responsible for Check Point’s largest customers in New England.

1:00pm - 1:30pmSession Seven

Paul Drapeau
Principal Threat Researcher, Carbon Black

Current Attack Trends And How To Think About Them

Attackers are humans that have goals and react to the changing defensive landscape to accomplish these goals. Adaptations in the malicious tools and techniques seen in the wild tend to follow definite trends and patterns. In this session we will discuss recent evolutions in malware and live attacker behavior seen in real world incidents. This information tells us a lot about how others are being attacked and what we can do as defenders to prevent and respond to these activities.

Download the Presentation

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

Todd LaPorte
Channel Account Manager

Common sense approaches to securing Identities and Access Rights across Data Center, Cloud and Mobile environments

Download the Presentation

2:15pm - 2:45pmSession Nine

Jeff Schmitz
Regional Systems Engineer

Stop Cyber Threats With Adaptive Micro-Segmentation 

Virtualization, the cloud, and the promise of containers have evolved the data center, bringing better application delivery and cost reduction. With these benefits come new risks that include increased East/West traffic and the potential for new cyber threats. Adaptive micro-segmentation is transforming and improving security inside the data center and clouds while speeding up app delivery.

In this session you’ll learn:

– How adaptive micro-segmentation enables security anywhere (on premises, AWS, Azure, etc.) on anything (bare metal, vSphere/KVM/XEN, containers), while eliminating app delivery delays caused by traditional security approaches.

– How customers are using adaptive micro-segmentation to instantly protect high-value apps, separate dev from prod with one rule, take existing security policies to the cloud, and more.

– How live visibility of application traffic and dependencies is making security dead simple for IT operations and security teams.

Speaker’s Bio:

Jeffrey Schmitz, Regional System Engineer, Illumio

As Illumio’s Northeast/East System Engineer, Jeff Schmitz provides technical evangelism for the Northeast and East regions. He has spent over 20 years of his career designing and selling infrastructure and communications solutions for some of the largest Fortune 500 companies. Prior to Illumio, Jeff spent over 18 years with Cisco systems in many different roles across the sales organization.

2:45pm - 3:00pmBreak / Vendor Booth Time
3:00pm - 3:30pmSession Ten

Lenny Zeltser
VP of Products

 

Hacking Malware: How to Turn Strengths of Evasive Malware  into Weaknesses

Developing sophisticated attacks takes time and requires heavy investment. Attackers safeguard their methods by designing malicious software to remain unnoticed by security tools for as long as possible. This educational session will discuss some of the common evasive techniques that malware authors incorporate into their creations. Moreover, it will also propose several approaches for turning such capabilities against malware to defend endpoints, turning adversaries’ strengths into weaknesses.

3:30pm - 4:00pmSession Eleven

Dave Thompson
Solutions Engineer

Does Your Time to First Byte Bite?

Join David Thompson, Solution Engineer at Oracle+Dyn as he provides a high level overview of DNS, the various multi-DNS configurations and how this layer of your infrastructure has everything to do with security. From DDoS to DNS amplification and reflection attacks, it’s all covered including strategies to mitigate, opportunities to architect infrastructure resiliency and tips to improve digital performance.

4:00pm - 4:30pmSession Twelve

J. Daniel Culpepper
Director of Sales Engineering

A Blueprint for a Modern Enterprise Security Program

One of the biggest challenges in cyber security today is how to manage the volume, velocity, and complexity of data generated by the myriad of IT security tools. The feeds from these disconnected, siloed tools must be analyzed, normalized, and remediation efforts prioritized. The more tools, the more difficult the challenge. This security model requires legions of staff to comb through huge amounts of data to connect the dots and find the needle in the haystack. These efforts can take months, during which time attackers can exploit vulnerabilities and extract data. Rather than adding more tools, organizations need to implement a new, more efficient enterprise security model.

According to analyst firm Gartner, cyber risk management that uses intelligence-driven analytics can help organizations operationalize cyber security practices, break down silos, and enhance security operations tasks through automation. This presentation explores the emerging discipline of intelligence-driven cyber risk management as a response to the mounting cyber-attacks, advanced persistent threats, and insider leaks. It outlines not only today’s cyber security challenges, but provides practical advice of how to operationalize an organization’s cyber security practices across a growing attack surface.

Download the Presentation

Speaker’s Bio:

J. Daniel Culpepper is Director of Sales Engineering at pro-active cyber risk management software vendor RiskSense. Daniel has more than 10 years of information security experience, both in a practitioner role as well as evangelist and trusted advisor to many CISOs in the nation. He is a frequent speaker on cyber security and risk management strategies, information security best practices, and threat-centric vulnerability remediation prioritization. Daniel has held evangelist or practitioner positions with RiskVision (formerly Agiliance), Freddie Mac, and Deloitte.

Prize Drawings for All in Attendance
4:30pm - 5:00pmSession Thirteen

Arthur Fontaine
Sr. Consultant, Product Marketing

Evolved Requirements: A business-driven security strategy for threat detection & response.

Security teams need to evolve to stay in front of attackers and the latest threats, but in recent years this has become much more difficult. Attackers continue to advance and use sophisticated techniques to target and infiltrate organizations while spending significant resources performing reconnaissance to develop techniques specifically designed to bypass the security tools being used. Complicating this, most organizations no longer have well defined perimeters as they shift to more modern IT infrastructures that include a variety of environments some on premise, some in the cloud.  Finally, to add even more challenges, security teams suffer from a skills gap that make it difficult to fully staff a team and even more difficult when they add more and more security tools and devices that only add to the noise for the staff trying to find the truly significant attacks.

Given these challenges, we see a mindshift occurring within the organizations running sophisticated security operations. Specifically a shift in focus on preventative controls that promise to keep the bad guys out to an increased focus on rapid detection and response, to shorten the dwell time and reduce or even prevent business damage when breaches occur. In simple terms, these organizations recognize it’s no longer feasible to think you can prevent all attacks from getting in.

In order reduce the impact of attacks, security operations needs to be able to tie critical asset and identity information into both the detection and response capabilities, so they can focus their efforts on the threats that matter most.

Download the Presentation

Prize Drawings for All in Attendance

Sponsors