Loading Events

« All Events

Los Angeles

February 2 @ 8:15 am - 5:00 pm

Event Navigation


February 2
8:15 am - 5:00 pm


Los Angeles Airport Marriott Hotel
5855 W Century Blvd.
Los Angeles,CA90045United States
+ Google Map


The Los Angeles Tech-Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current tech-security issues such as cloud security, email and social media security, VoIP, LAN security, wireless security, USB drives security & more. Numerous door prizes such as iPads, Kindles, $25, $50 and $100 gift cards and lots more!  You'll come away with advice and knowledge so you can start proactively protecting your environment from the latest security breaches.  Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. THIS CONFERENCE QUALIFIES FOR CPE CREDITS.  Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am - 8:45amCheck-In and Opening Introductions

Data Connectors is proud to host the Tech-Security Strategies Conference.

8:45am - 9:15amSession One
9:15am - 9:45amSession Two
9:45am - 10:15amBreak / Vendor Booth Time
10:15am - 10:45amSession Three

Chris Westphal
Head of Product Marketing

Stop Cyber Threats With Adaptive Micro-Segmentation

Virtualization, the cloud, and the promise of containers have evolved the data center, bringing better application delivery and cost reduction. With these benefits come new risks that include increased East/West traffic and the potential for new cyber threats. Adaptive micro-segmentation is transforming and improving security inside the data center and clouds while speeding up app delivery.

In this session you’ll learn:

– How adaptive micro-segmentation enables security anywhere (on premises, AWS, Azure, etc.) on anything (bare metal, vSphere/KVM/XEN, containers), while eliminating app delivery delays caused by traditional security approaches.
– How customers are using adaptive micro-segmentation to instantly protect high-value apps, separate dev from prod with one rule, take existing security policies to the cloud, and more.
– How live visibility of application traffic and dependencies is making security dead simple for IT operations and security teams.

10:45am - 11:15amSession Four

Nathan McClean 
Channel Sales Engineer, Sales

Speaker Bio:

Nathan has been in the Network and Information Security industry for 20+ years, specializing in Internet and data security. Nathan joined Sophos in 2016 and is excited to be working with the latest in cutting edge information security.

11:15am - 11:45pmBreak / Vendor Booth Time / Lunch
11:45am - 12:15pmSession Five

Chesed Patt
Account Executive

Zerto’s Seamless Recovery — Even From Cryptolocker 

Ransomware is now one of the biggest threats to your data. Nobody wants to be in a position of being locked out of all of your data and facing the prospect of having to pay a ransom or accept the impact of data loss and downtime by restoring from backups.

In this session you will learn how to configure your environment with Zerto to ensure you can recover the data from seconds before it was encrypted, minimizing the impact to the business by re-winding to a point in time before the ransomware infection existed. Zerto Virtual Replication (ZVR) integrates at the hypervisor level and causes no performance impact to the protected virtual machines. ZVR replicates without snapshots or agents, allowing for better performance and flexibility DR strategy in your vSphere environment. The virtual awareness understands the needs of resilience capabilities such as HA/DRS/VMotion/Storage VMotion/Storage DRS, etc. and continues replicating consistent data across the application virtual machine groupings.

Highlights include:

• Securing & protecting your infrastructure
• Journaling to enable re-wind & recover
• Failover testing to isolated environments
• Recovering from the infection
• Best practices when recovering from ransomware
• Real-world customer story of using Zerto to recover from Cryptolocker

Speaker’s Bio:

Chesed Patt is a veteran technology provider with 18 years of experience in a variety of disciplines including data storage, business process automation, security and virtualization software. He has provided these solutions from both the manufacture and integration perspective. Chesed is a proven expert in helping organizations be successful with their business continuity and disaster recovery initiatives.


12:15pm - 12:30pmBreak / Vendor Booth Time
12:30pm - 1:00pmSession Six

Sam Abadir

1:00pm - 1:30pmSession Seven

Angelo Bustos 
Technical Manager

Visibility for the Enterprise Data Center

Today’s virtualized Enterprise data centers lack the IT tools necessary to correlate application to infrastructure performance in order to determine the Root Cause of application performance issues.

A Data Center’s infrastructure components – CPU, Memory, Network and Storage – may have their own management tools but these tools are incapable of providing visibility to the entire Virtual Environment or correlating that information back to a specific application’s performance. As a result, organizations lack the resources to quickly and efficiently perform Root Cause analysis and spend the majority of their valuable time engaged in reactive troubleshooting or inter-departmental finger pointing, rather than proactively improving application delivery.

Join us as we explore these challenges and present a more efficient approach enabling a 360 degree view of your Data Center Infrastructure.

Speakers Bio:

Angelo is a 20 year veteran in the application, network, and virtualization performance industries.  He’s held several positions ranging from QA, Technical Support, Product Management, Sales, Systems Engineering in companies such as Network General, Network Associates, ClearSight Networks, and Fluke Networks.

1:30pm - 1:45pmBreak / Vendor Booth Time
1:45pm - 2:15pmSession Eight

Aaron Sramek
Regional Sales Manager

We Lost the Battle Against Intrusions — Are We Left to Raise Our Hands in Defeat?

Enterprises are pouring billions of dollars into preventing threat actors from infiltrating the organization. Yet, the rising level of breaches shows that dedicated threat actors will penetrate the organization. Perhaps then the problem is not a technological one, but is rather one of strategy in dealing with cyber-threats?

In this session, we’ll propose a new defense approach. This strategy assumes that the environment is already compromised and focuses on preventing the real risk to the enterprise: the actual exfiltration and hijacking of data. We’ll show how adopting such a strategy enables organizations to streamline security and align with the business operations as they investigate and remediate a threat.

This session will discuss:

  • New and effective strategies to combat today’s advanced threats;
  • Removing the OpEx associated with security solutions;
  • Real-life cases of successful enterprises challenging their security status quo.
2:15pm - 2:45pmSession Nine
2:45pm - 3:00pmBreak / Vendor Booth Time