What We Do
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2010

Hartford Tech-Security Conference

Date: Thursday, Jul. 22, 2010

Crowne Plaza Hotel

>>click here for directions


The Hartford Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Sourcefire, Inc.

Ken Pappas, CEO of True North Security Inc.

Knowing More About Threats, Risks and Regulations

How valuable would it be if you had and understanding of the cyber threats, risks to your business and security regulations? Come learn how hackers are gaining entry into your networks and what countermeasures you can take today to prevent it. We will provide an update on the threat landscape and commentary on what is causing the rise in cyber crimes, highlighting examples of clever ploys using social media sites as a means to lure your employees into “accepting” malware, spyware and viruses. What you will find most interesting is our predictions on tomorrow’s threats and what actions you can take today to possibly protect your network and data from a breach.

Key takeaways include:

  • Where Cyber Crime is growing
  • What’s driving the rise in cyber crime
  • Why yesterday’s technology failing
  • The top security change drivers of 2010 and what actions you must take now to stay ahead of the curve
  • How to create an effective defense-in-depth strategy and understand the latest threats and their implications
  • Newer Web 2.0 threats
  • And so much more

Ken Pappas is the CEO of True North Security Inc. and is a recognized expert on network and data security for personal and business threat protection. As a sought-after Security Evangelist and public speaker, Ken has appeared on NBC TV and Radio stations speaking on Cyber terrorism and has been featured in Fortune, the Wall Street Journal, Tech News World, S.C. Magazine, and many others around the world.

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:45am Session Two


Jim Shaeffer, CEO

10 Simple Rules for Implementing an Encryption Strategy

Organizations are becoming more and more proactive about data security, with data encryption viewed as a core element to their defensive measures.

Encryption of data is being adopted at a rapid rate to comply with industry regulations, protect intellectual property, obtain safe harbor from data breachdisclosure laws, and effectively manage risk. As encryption proliferates, IT professionals are making critical decisions that directly contribute to, or detract from, an organization's ability to effectively manage encryption keys and data security.

Data is an organization's most valuable asset and it must be protected.

Designing and implementing an encryption strategy is not complicated if you understand the needs of your organization and establish the right decision-making criteria for encryption solutions. Simplicity, breadth, manageability and efficiency are the primary requirements security-minded organizations must build into their encryption strategy. A solution that has the least complexity will make the jobs of IT professionals easier, be more cost-effective and time-efficient, while at the same time protecting data and meeting compliance standards.

>>click here for the presentation

10:45am-11:30am Session Three


Dave Butcher

Understanding Managed File Transfer - Insights & Best Practices

As IT departments continually adopt new technologies to improve the performance of their systems, productivity of their end users and relationships with trading partners, they are faced with numerous challenges. One such challenge companies face today is securing and automating large file transfers. Traditional file transfer systems and mediums no longer meet the needs of most organizations or their trading partners, especially when data exposure is a concern. Many organizations have developed in-house solutions that are difficult to manage, lack the ability to track and audit file transfers, and expose the organization to security breaches. A Managed File Transfer (MFT) solution should be secure, easy to manage, and have the flexibility to integrate with existing technologies.

In this presentation, you will:

  • Gain a better understanding of the business challenges and drivers of file transfers.
  • Identify the security concerns around traditional file transfer systems and mediums.
  • Learn best practices to develop security architectures for file transfers.
  • Understand how a MFT solution can meet the needs of your stakeholders


11:30am-12:00pm Break/Vendor Booth Time
12:00pm-12:45pm Session Four (includes lunch)

Top Layer Networks

Mike Paquette, CSO

Is your Network Really Protected? How to Proactively Protect Against Network Threats in 2010 and Beyond
12:45pm-1:00pm Break/Vendor Booth Time
1:00pm-1:45pm Session Five


Ray Papszycki

Why Identity Based Security Matters

Digital identities are core to electronic transactions and communications. Their importance for enabling services, goods and applications continues to grow, as has the need to secure identities appropriately. Learn about today’s authentication concerns and how layered security can empower the enterprise and consumer.

>>click here for the presentation

1:45pm-2:30pm Session Six

Integralis Inc.

Yinal Ozkan, Principal Architect

DLP Program Management and the Role of Rights Management

According to the Ponemon Institute, companies spend an average of $202 per lost or compromised record of personal data. They go on to estimate that nearly 245 million records have been breached since January 2005. Changes in law and liability are generating more costly and extensive lawsuits around the loss of personal data. The wide distribution of sensitive and valuable data across organizations-- from databases, laptops, mobile computers, thumb drives, backup media, and more— has produced a formidable financial risk. This presentation will cover the latest trends, processes, and technology in data leakage to enterprise rights management and data classification. You will gain an understanding of what it takes to craft a strategy and solutions that address your business risk and security budget.

2:30pm-2:45pm Break/Vendor Booth Time
2:45pm-3:30pm Session Seven

IPSwitch - File Transfer

Tony Perri, Solutions Architect

The Data Breaches You Don’t See Hurt You the Most

Data loss is a growing risk, especially as prosumers bring more and more of their personal technology into the workplace. IT departments not only need to enable person-to-server and system-to-system file interactions, but also must create and enforce consistent policies and processes regarding how information is moved between people inside and outside a company. This session is meant for businesses and consumers at all levels to understand the current managed file transfer (MFT) market and what comes next. This session will also map business requirements through the presentation of real world use cases.

>>click here for the presentation

3:30pm-4:00pm Prize Drawings For All In Attendance

Event Sponsors/Exhibitors

Nexum, Inc.
Fortinet, Inc.
A10 Networks, Inc.
Shavlik Technologies, LLC
Sourcefire, Inc.
Qualys, Inc.
TippingPoint Technologies, Inc.
Cyber-Ark Software, Ltd.
eIQnetworks, Inc.
Arcot Systems, Inc.
Sunbelt Software, Inc.
Integralis Inc.
Tenable Network Security
Identity Finder, LLC
Core Security Technologies

Top Layer Networks

St. Bernard Software
nuBridges, Inc.
IPSwitch - File Transfer
Infoblox Inc.
Bloxx Inc.
Radware Ltd.
BeyondTrust Software, Inc.
 Network Critical Solutions Limited
Eos Systems, Inc.
 Secure Passage
Kaspersky Lab
Engate Technology Corporation
Steelgate Global, LLC


   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy