What We Do
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2012

New York Tech-Security Conference

Date: Thursday, September 27, 2012

11 Fulton Street
Atop the Fulton Market Building
At the South Street Seaport, New York City
p: 212.608.7400

>> click here for directions


The New York Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One


Jessica Couto
Director of Business Development

Accuvant, Inc.

Protection Against Spear Phishing and the Modern Cyber Threats

Advanced threats target users through email, website, instant messenger, USB devices and social engineering. Traditional blacklist antivirus cannot keep pace with today's modern malware. Join . from Bit9 to better understand how hackers are outsmarting traditional security approaches with targeted attacks and spear phishing – the most common technique behind some of today’s most damaging cyber attacks.  Learn how these threats work and the most impactful things you can do to prevent targeted attacks from breaching your organization.

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:45am Session Two

Dyntek Services, Inc.

McAfee, Inc.

Mehlam Shakir
Product Manager
NitroSecurity, Inc.

Security Information and Event Management – What’s on Your Dashboard?

Effective security starts with real-time visibility into all activity on all systems, networks, databases, and applications. Revolutionizing your security involves connecting a real-time understanding of the world outside—threat data, reputation data, and vulnerability news—with a real-time understanding of the systems, data, and activities inside your enterprise.
Join our session to learn more about:

  • Detailed analytics on IT infrastructure.
  • Granular reporting on enterprise risk profile.
  • Event escalation process based on enterprise risk tolerance.

Secure log repository / long-term event integrity.

>>click here for the presentation

10:45am-11:30am Session Three

Cyber-Ark Software, Ltd.

Scott Whitehouse

Evan Litwak


Manage, Control, and Audit the Use of Shared, Privileged, and Administrative Accounts

  • Do you know how many privileged, shared, or generic identities exist within your IT infrastructure?
  • Do you know who has access to these accounts and what they’re doing during administrative sessions?
  • Are auditors requesting reports on entitlement to and usage of these identities?

The average enterprise includes thousands of privileged identities, accounts, and passwords.  Manually managing and updating these is a time-consuming, costly and repetitive process.  Administrative and application accounts (hard-coded, embedded credentials) can be found in network devices, servers, and software within an organization, including virtual environments, yet access to these accounts is unmonitored.  Sharing of access to these accounts occurs frequently, so the system does not track WHO logged in, merely that a login occurred—a significant audit challenge.

Learn how to mitigate the risk of mismanagement of shared, privileged, and administrative accounts and how to address associated audit and compliance findings.

11:30am-12:00pm Break/Vendor Booth Time/Lunch
12:00pm-12:45pm Session Four

Varonis Systems

Brian Vecci


Unstructured and semi-structured data presents unique challenges to IT organizations when it comes to identifying who has access, who is accessing and most importantly, who should have access to shared Windows, NAS and UNIX folders, SharePoint sites and Exchange mailboxes and public folders. Information Security organizations have traditionally struggled with the overwhelming manual process of enforcing authentication, authorization and accountability controls on these resources as well as identifying data owners who should be making these decisions. Varonis Systems, a global leader in data governance presents new solutions for helping meet these challenges both today and into the future.

Bob Krzysik is a 20+year technology industry veteran. Prior to joining Varonis, he held senior engineer and security consultants roles in a variety of industries, including pharmaceutical, communications, and manufacturing.  His experience spans management roles with start-ups to multi-national companies like AT&T and IBM.  Throughout his career, Bob has helped companies of all sizes design, build and maintain flexible, robust and secure information technology systems and services.

Bob joined Varonis in 2006 and now manages the East Region Systems Engineer Team.

>>click here for the presentation

12:45pm-1:00pm Break/Vendor Booth Time
1:00pm-1:45pm Session Five

WatchGuard Technologies, Inc.

Steve Butera

Securing the Virtual World

Virtualization is part of an overall trend within IT to centralize administrative tasks while improving scalability and workloads. Questions have arisen around security within virtualized environments and if they are as safe as physical environments or even perhaps safer. This presentation addresses the challenges that are faced and how to tackle them successfully.

>>click here for the presentation

1:45pm-2:30pm Session Six


Dave Butcher

Secure Collaboration – Securely Enabling the Human Element

In this session we will discuss ways to secure collaboration within and across organizations, while embracing and managing the rapid adoption of BYOD, employee file sharing, and unsecured, unauthorized collaboration services.
Review the latest risks and attacks being seen against email and cloud based file sharing

  • Lack of regulatory compliance
  • Risk of corporate reputation
  • Malware, spyware and other attacks

Learn what employees are doing today to bypass IT in order to collaborate with co-workers and partners

  • From cloud-based email to cloud based file sharing
  • Securing the increasing number of mobile devices in the workplace
  • Explore the different reasons employees need to share files
  • Understanding why employees bypass corporate/IT infrastructure

Discover best practices for creating solutions that securely satisfy your organizations collaboration needs

  • Creating an environment the encourages adoption
  • Deploying a flexible set of tools that enables multiple options for file sharing
  • Providing governance and ensuring compliance of collaboration tools
  • Creating a solution that is operationally efficient

>>click here for the presentation

2:30pm-2:45pm Break/Vendor Booth Time
2:45pm-3:30pm Session Seven

eSentire, Inc.

Eldon Sprickerhoff
CTO of eSentire

The Kill Chain: Improving the Efficacy of Intrusion Defense Mechanisms

Intrusion defense mechanisms have been around for approximately two decades.  However, slippery assailants continue to evade even state-of-the-art mechanisms.  We have more technology than ever but few approaches that work reliably, especially given with the explosion of attack vectors.  The problem of accurate and consistent attack detection and defense amid a sea of noise appears no less difficult than during the early years.  This talk will attempt to detail the shortcomings of current detection and defense approaches and describe the "Kill Chain" and how it can help improve the efficacy of modern intrusion defense mechanisms.

3:30pm-4:15pm Session Eight

Wave Systems Corp.

Steven Sprague

Trusted Computing:  The Industry’s Answer to Rapidly Changing Cyber Security Threats

The upswing in publicized data breaches and hacks clearly shows that today’s security hasn’t kept pace with the rapidly evolving threat landscape. Moreover, the consequences of data breaches have never been higher, with Federal, state, and industry regulations mandating stiff fines and public disclosure in the event of a breach.

As traditional software defenses prove vulnerable to the plethora of viruses, malware, and Advanced Persistent Threats (APTs), those with sensitive data and networks to protect should consider hardware-based security solutions. Developed in accordance with open-industry standards set by the Trusted Computing Group, these technologies are vendor-neutral and designed to take advantage of hardware security already embedded in many enterprise PCs. Trusted Computing technologies such as the self-encrypting drive (SED) and Trusted Platform Module (TPM) security chip are the result of a decade of industry collaboration. These technologies allow for best-in-class encryption without impacting performance (SED), perform digital signature operations and securely measure, store, and report on integrity metrics (TPM). With proper management tools, these technologies also can be leveraged to include remote management, password recovery, and secure audit logs to prove compliance.

This session will address how Trusted Computing can give enterprises the ability to make security whole again by knowing their devices, data, and networks. Attendees will gain relevant proof points and practical solutions for current security threats.
  Prize Drawing For All in Attendance
4:15pm-5:00pm Session Nine

Blue Coat Systems.

Grant Asplund

Web Security for the Always On User

The average business faces 5,000 threats each month.  Malware infrastructures, social networking, cloud applications and mobile devices are responsible for the exponential growth in malicious sites and attacks.  This evolving threat landscape is changing the game for how we can protect against new types of advanced attacks. 

  • How has social media and a mobile workforce impacted your business?
  • How does Web security adjust according to an employee’s location and his device?
  • How do you create a solid security posture, while allowing for personal and recreational Internet use?
  • What best practices, strategies, and solutions are available to protect today’s always on user?
  Prize Drawing For All in Attendance

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
AirWatch, LLC
ArcMail Technology
Aruba Networks, Inc.
Barracuda Networks, Inc.
Beyond Security
BeyondTrust Software, Inc.
Blue Coat Systems.
Bradford Networks
Carousel Industries of North America, Inc.
Castle Ventures LLC
Celestix Networks, Inc.
Cyber-Ark Software, Ltd.
DataMotion Inc.
 SonicWALL, Inc.
Dimension Data
Dyntek Services, Inc.
Endace Limited
eSentire, Inc.
Extreme Networks
ForeScout Technologies
Hitachi Solutions America, Ltd.
Hitachi ID Systems
Infoblox Inc.
Interwork Technologies Inc.
Invincea, Inc.
Kaspersky Lab
LANDesk Software
Lumension Security, Inc.
McAfee, Inc.
Meru Networks
NetIQ Corporation
NIKSUN Incorporated
pka technologies, inc.
Quest Software, Inc.
Radware Ltd.
Riverbed Technology
Silver Peak Systems, Inc.
SmoothWall Ltd.
Sophos PLC
Sourcefire, Inc.
Trend Micro Incorporated
Ultra Electronics, AEP Networks
Varonis Systems
VASCO Data Security International, Inc.
Viewfinity, Inc.
WatchGuard Technologies, Inc.
Wave Systems Corp.
WinMagic Inc.
Wontok Enterprises


   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy