Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2010


Milwaukee Tech-Security Conference

Date: Thursday, Nov. 11, 2010
Location:

Hilton Garden Inn Milwaukee Park Place
11600 West Park Place
Milwaukee, Wisconsin, 53224
p: 414.359.9823

>> click here for directions

Overview

The Milwaukee Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:  
8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

NetWitness

Mike Linehan, Regional Sales Manager Central US

Advanced Threat Intelligence and Session Analysis

 

 

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:45am Session Two

JCS

Jim Shaeffer, CEO

 

10 Simple Rules for Implementing an Encryption Strategy

Organizations are becoming more and more proactive about data security, with data encryption viewed as a core element to their defensive measures.

Encryption of data is being adopted at a rapid rate to comply with industry regulations, protect intellectual property, obtain safe harbor from data breachdisclosure laws, and effectively manage risk. As encryption proliferates, IT professionals are making critical decisions that directly contribute to, or detract from, an organization's ability to effectively manage encryption keys and data security.

Data is an organization's most valuable asset and it must be protected.

Designing and implementing an encryption strategy is not complicated if you understand the needs of your organization and establish the right decision-making criteria for encryption solutions. Simplicity, breadth, manageability and efficiency are the primary requirements security-minded organizations must build into their encryption strategy. A solution that has the least complexity will make the jobs of IT professionals easier, be more cost-effective and time-efficient, while at the same time protecting data and meeting compliance standards.

>>click here for the presentation

10:45am-11:30am Session Three

IPSwitch - File Transfer

Jonathan Lampe, VP Product Management

The Data Breaches You Don’t See Hurt You the Most

Data loss is a growing risk, especially as prosumers bring more and more of their personal technology into the workplace. IT departments not only need to enable person-to-server and system-to-system file interactions, but also must create and enforce consistent policies and processes regarding how information is moved between people inside and outside a company. This session is meant for businesses and consumers at all levels to understand the current managed file transfer (MFT) market and what comes next. This session will also map business requirements through the presentation of real world use cases.

>>click here for the presentation

11:30am-12:00pm Break/Vendor Booth Time
12:00pm-12:45pm Session Four (includes lunch)

Top Layer Networks

Stephen Gates

Is your Network Really Protected? How to Proactively Protect Against Network Threats in 2010 and Beyond

Learn How to Protect Your Enterprise Network and Meet Compliancy Requirements

  • This presentation will discuss real-world network threats facing organizations in 2010 and beyond.
  • You'll learn critical steps to protect against the new generation of threats and help meet compliancy requirements.

Discover How Intrusion Prevention System Technology Can Fill the Gaps

  • Discover how traditional "Perimeter Defense" strategies can leave your network vulnerable to the next generation of threats.
  • Understand how Intrusion Prevention System (IPS) technology has evolved to protect against the newest threats.

See "Cyber Attack and Defense Demo" Showing the Power of IPS

  • Visual demonstration of how a system can be completely compromised while being "protected" by a Firewall.
  • How Top Layer's IPS 5500 can block the attack and subsequent compromise.
12:45pm-1:15pm Break/Vendor Booth Time
1:15pm-2:00pm Session Five

Axway

Dave Butcher

 

Understanding Managed File Transfer - Insights & Best Practices

As IT departments continually adopt new technologies to improve the performance of their systems, productivity of their end users and relationships with trading partners, they are faced with numerous challenges. One such challenge companies face today is securing and automating large file transfers. Traditional file transfer systems and mediums no longer meet the needs of most organizations or their trading partners, especially when data exposure is a concern. Many organizations have developed in-house solutions that are difficult to manage, lack the ability to track and audit file transfers, and expose the organization to security breaches. A Managed File Transfer (MFT) solution should be secure, easy to manage, and have the flexibility to integrate with existing technologies.

In this presentation, you will:

  • Gain a better understanding of the business challenges and drivers of file transfers.
  • Identify the security concerns around traditional file transfer systems and mediums.
  • Learn best practices to develop security architectures for file transfers.
  • Understand how a MFT solution can meet the needs of your stakeholders
2:00pm-2:15pm Break/Vendor Booth Time
2:15pm-3:00pm Session Six

Guidance Software Inc.

Anthony DiBello,Product Marketing Manager, Compliance & Cybersecurity Solutions

Don’t Risk Compromising Your Data – The Case for Cyberforensics

 



>>click here for the presentation

3:00pm-3:15pm Prize Drawings for All In Attendance
3:15pm-4:00pm Session Eight

Cyber-Ark Software, Ltd.

Berenice Jacobs, CISSP

Securing Administrative Passwords

Identity Management Tools, such as Single Sign-On and Directories are examples of important building blocks in any organization's Identity Management infrastructure. However, these tools are only geared towards individual users. An additional solution for privileged users should be deployed to complement the Identity Management Infrastructure.

Cyber-Ark’s Suite of products can manage Identity Management for Privileged Accounts by providing:

  • Frequent and automatic password changes of shared privileged accounts
  • Strong auditing of privileged passwords usage to ensure accountability
  • Secured long term storage and automatic failover to eliminate risks of loss and to ensure availability during disaster recovery
  • Removing clear text passwords embedded in scripts, and automatically changing them according to corporate policy
4:00pm-4:15pm Prize Drawings for All In Attendance
   

Event Sponsors/Exhibitors

JCS
Nexum, Inc.
D-Link Corporation/D-Link Systems, Inc.
Fortinet, Inc.
LogRhythm
TippingPoint Technologies, Inc.
Shavlik Technologies, LLC
Imperva
NetWitness
Aruba Networks, Inc.
Top Layer Networks
nuBridges, Inc.
IPSwitch - File Transfer
Laurus Technologies
JSO Technology, LLC
 Network Critical Solutions Limited
Management Communication Services, Inc.
St. Bernard Software
Gigafin Networks, Inc.
Arcot Systems, Inc.
Guidance Software Inc.
Radware Ltd.
Kaspersky Lab
Ping Identity Corporation
Axway
Zix Corporation
Wave Systems Corp.
Cyberoam
IBM
Cyber-Ark Software, Ltd.
Unitrends
FishNet Security, Inc.
SafeNet
Vanguard Computers, Inc.
Sophos PLC
Centrify
Sourcefire, Inc.
Endace Limited
LogLogic, Inc.

 

   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy