Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2012


Montreal Tech-Security Conference

Date: Thursday, September 13, 2012
Location:

Delta Centre-Ville (Downtown Montreal Hotel)
777 University Street
Montreal
Quebec, H3C 3Z7
p: 514.879.1370

>>click here for directions

Overview

The Montreal Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Bit9

Jessica Couto

Accuvant, Inc.

Protection Against Spear Phishing and the Modern Cyber Threats

Advanced threats target users through email, website, instant messenger, USB devices and social engineering. Traditional blacklist antivirus cannot keep pace with today's modern malware. Join . from Bit9 to better understand how hackers are outsmarting traditional security approaches with targeted attacks and spear phishing – the most common technique behind some of today’s most damaging cyber attacks.  Learn how these threats work and the most impactful things you can do to prevent targeted attacks from breaching your organization.

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:45am Session Two

Cyber-Ark Software, Ltd.

Michael Su

Manage, Control, and Audit the Use of Shared, Privileged, and Administrative Accounts

  • Do you know how many privileged, shared, or generic identities exist within your IT infrastructure?
  • Do you know who has access to these accounts and what they’re doing during administrative sessions?
  • Are auditors requesting reports on entitlement to and usage of these identities?

The average enterprise includes thousands of privileged identities, accounts, and passwords.  Manually managing and updating these is a time-consuming, costly and repetitive process.  Administrative and application accounts (hard-coded, embedded credentials) can be found in network devices, servers, and software within an organization, including virtual environments, yet access to these accounts is unmonitored.  Sharing of access to these accounts occurs frequently, so the system does not track WHO logged in, merely that a login occurred—a significant audit challenge.

Learn how to mitigate the risk of mismanagement of shared, privileged, and administrative accounts and how to address associated audit and compliance findings.

10:45am-11:30am Session Three

WatchGuard Technologies, Inc.

Jean-Pier Talbot

Alain Constantineau

Securing the Virtual World

Virtualization is part of an overall trend within IT to centralize administrative tasks while improving scalability and workloads. Questions have arisen around security within virtualized environments and if they are as safe as physical environments or even perhaps safer. This presentation addresses the challenges that are faced and how to tackle them successfully.

>>click here for the presentation

11:30am-12:00pm Break/Vendor Booth Time/Lunch
12:00pm-12:45pm Session Four

Bradford Networks

Tom Murphy
CMO

Onboarding Personal Devices to Corporate Networks

Many IT organizations are being asked to allow personal devices onto corporate networks.  Unlike corporate-issued devices that are well-managed and under IT’s control, this new Bring-Your-Own-Device (BYOD) initiative introduces a unique set of security challenges that require a balance of flexibility, visibility, security.

This presentation will explain the concept of a “BYOD Blueprint” and lessons learned from onboarding personal devices to over 800 networks around the world.

>>click here for the presentation

12:45pm-1:00pm Break/Vendor Booth Time
1:00pm-1:45pm Session Five

Aruba Networks, Inc.

Faycal Bayoun

Enabling Secure BYOD over any network

Need to embrace employee-owned tablets and smartphones at work without losing control of your users, your network and your data? Aruba can help you simplify the onboarding and management of mobile devices on your network and reduce the time and resources required to support Bring Your Own Device (BYOD) initiatives.  Start now: hear about the industry’s first BYOD solution to securely provision and onboard iOS, Android, Mac OS X and Windows 7 mobile devices on any network.

1:45pm-2:30pm Session Six

Infoblox Inc.

Matt Gowarty

Network Security – It’s More than Just Firewalls

Too often, IT teams rely too much on just firewalls for network security – but often overlook many key aspects and are missing the information needed to maximize security across the organization.  How often do your network and audit teams argue of what is required and what is actually happening?

This presentation will highlight key best practices and provide actionable takeaways to help ensure and maintain a secure network infrastructure.  Topics will include:

  • Key DNS and DHCP data for detecting risks faster
  • Automatic end-point detection and IP address management
  • Real-time and trending views for enhanced monitoring
  • Ensuring your network devices maintain network and security practices, and
  • Eliminating repetitive steps and reducing time for proving compliance

Learn from our industry expert how to get ahead of the curve with network security.

2:30pm-2:45pm Break/Vendor Booth Time
2:45pm-3:30pm Session Seven

Net Cyclops Inc.

Ghyslain Guay

paloalto Networks

Next Generation Firewall and Advanced Persistent Threat Protection

 

 

 


>>click here for the presentation

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Access 2 Networks Inc.
Accuvant, Inc.
Aerohive Networks, Inc.
Aruba Networks, Inc.
Centrify Corporation
BeyondTrust Software, Inc.
Bit9
Bradford Networks
Centrify Corporation
Corero
Cyber-Ark Software, Ltd.
D-Link Corporation/D-Link Systems, Inc.
Endace Limited
EVault, Inc.
Fixmo Inc.
ForeScout Technologies
Gigamon
Imation Corp.
Infoblox Inc.
Kaspersky Lab
LogRhythm
Net Cyclops Inc.
NetClarity, Inc.
paloalto Networks
Quest Software, Inc.
Riverbed Technology
Secure Links
Silver Peak Systems, Inc.
Solantus Inc.
Splunk Inc.
Storageflex Inc
Varonis Systems
WatchGuard Technologies, Inc.
Wave Systems Corp.

 

   Copyright © 2009-2013. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy