Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2012


Austin Tech-Security Conference

Date: Thursday, November 29, 2012
Location:

HILTON AUSTIN AIRPORT
9515 Hotel Drive, Austin TX 78719
p: 512.385.6767

>>click here for directions

Overview

The Austin Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Centrify Corporation

Wade Tongen
Systems Engineer

Centralizing Identity, Policy and Privilege to Simplify Data Center Security and Compliance

Find out how to prevent insider attacks, simplify internal and external audits in mixed data centers comprised of Windows, UNIX, Linux systems, and control access and policy on Macs, iOS and Android devices. Learn how to protect systems and applications, manage user access and privileges, and audit and report on rights and privileges using an IT asset you already own - Active Directory.

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:45am Session Two

Cyber-Ark Software, Ltd.

Mark Rodriguez

Manage, Control, and Audit the Use of Shared, Privileged, and Administrative Accounts

  • Do you know how many privileged, shared, or generic identities exist within your IT infrastructure?
  • Do you know who has access to these accounts and what they’re doing during administrative sessions?
  • Are auditors requesting reports on entitlement to and usage of these identities?

The average enterprise includes thousands of privileged identities, accounts, and passwords.  Manually managing and updating these is a time-consuming, costly and repetitive process.  Administrative and application accounts (hard-coded, embedded credentials) can be found in network devices, servers, and software within an organization, including virtual environments, yet access to these accounts is unmonitored.  Sharing of access to these accounts occurs frequently, so the system does not track WHO logged in, merely that a login occurred—a significant audit challenge.

Learn how to mitigate the risk of mismanagement of shared, privileged, and administrative accounts and how to address associated audit and compliance findings.

10:45am-11:30am Session Three

WatchGuard Technologies, Inc.

Terrence Davis

Securing the Virtual World

Virtualization is part of an overall trend within IT to centralize administrative tasks while improving scalability and workloads. Questions have arisen around security within virtualized environments and if they are as safe as physical environments or even perhaps safer. This presentation addresses the challenges that are faced and how to tackle them successfully.

>>click here for the presentation

11:30am-12:00pm Break/Vendor Booth Time/Lunch
12:00pm-12:45pm Session Four

Bradford Networks

Mike Spess

Onboarding Personal Devices to Corporate Networks

Many IT organizations are being asked to allow personal devices onto corporate networks.  Unlike corporate-issued devices that are well-managed and under IT’s control, this new Bring-Your-Own-Device (BYOD) initiative introduces a unique set of security challenges that require a balance of flexibility, visibility, security.

This presentation will explain the concept of a “BYOD Blueprint” and lessons learned from onboarding personal devices to over 800 networks around the world.

>>click here for the presentation

12:45pm-1:00pm Break/Vendor Booth Time
1:00pm-1:45pm Session Five

Future Com, LTD

Chris Boykin
VP of Professional Services

Implementing BYOD without breaking your network or security posture

As mobile devices, like smartphones and tablets, continue to proliferate the enterprise, the demand for securing these devices is top of mind.  The trend of BYOD (Bring Your Own Device) introduces new security threats as well as the need for more network resources.  If mobile device security is all you have addressed for BYOD, you are missing the boat and will have a rude awaking during implementation.

Hear from a network and security expert that has spent the last two years researching, demonstrating, proof-of-concept testing, and implementing mobility solutions as he shares some lessons learned that can help you avoid the "gotchas" of BYOD.  

This presentation will inform you of the new threats to corporate environments caused by mobile devices, educate you on available solutions for protecting and preventing security breaches, enlighten you on the "missing link" in today's mobility point product solutions, and reveal the seldom planned for bumps in the road, to ensure a smooth pathway to BYOD without all the headaches.

If you are implementing, planning, or currently struggling with BYOD, this is one presentation you can't afford to miss!

>>click here for the presentation

1:45pm-2:30pm Session Six

Trend Micro Incorporated

Matt Hubbard
Regional Product Marketing Manager

Securing Your Physical, Virtual, Cloud Infrastructure

Protect confidential data, ensure compliance and prevent costly damage, without hindering productivity.  Join Trend Micro and learn how to secure your data at rest or in motion; accessible on servers, desktops, laptops, tablets, smartphones and even removable media.  Let Trend empower you to prevent unauthorized access and data breeches throughout your enterprise, regardless of whether your infrastructure is physical, virtual or in the cloud.

Matt Hubbard has dedicated the majority of his 15 year career to help design and bring to market solutions that enable companies to secure their technology environment. He has worked in product management and R&D at companies such as Symantec, Dell and Compaq. As a passionate evangelist, Matt knows and promotes the value of enterprise security solutions.  He currently serves as a Senior Manager at Trend Micro and helps C-Level Executives and their staff to understand the issues and solutions available to them to achieve measurable results. Matt holds a Bachelors degree from the University of Texas at Austin.

>>click here for the presentation

2:30pm-2:45pm Break/Vendor Booth Time
2:45pm-3:30pm Session Seven

Blue Coat Systems.

Grant Dishman
Senior Sales Engineer

Breaking the Vicious Cycle of the Malnet Threat and Botnet Infections

The Vicious Cycle of Malnets
In 2012, Blue Coat expects malware distribution infrastructures will be responsible for more than two- thirds of all malicious cyber-attacks.  Malnets (malware networks) are extensive infrastructures embedded in the Internet and designed to deliver mass market attacks to the largest possible audience on a continuous basis. Hear the details of Blue Coat Systems latest 2012 Security Report and learn why stopping the attacks using traditional zero-day defenses is a losing proposition.  Learn how cyber-criminals have created a vicious cycle of malware attacks and why you need new solutions in order to protect your users and break this vicious cycle.  In this session you learn:

  • What threat vectors are being exploited by cyber-criminals to target their attacks
  • Why the 'whack-a-mole' defense strategy just doesn't work against todays attacks
  • Why 'zero-day' defense is insufficient and why you need negative-day protection
  • Where malnet infrastructures are located and hide and why they are nearly impossible to eradicate

>>click here for the presentation

3:30pm-4:00pm Session Eight

Aruba Networks, Inc.

Colin Joseph

Enabling Secure BYOD over any network

Need to embrace employee-owned tablets and smartphones at work without losing control of your users, your network and your data? Aruba can help you simplify the onboarding and management of mobile devices on your network and reduce the time and resources required to support Bring Your Own Device (BYOD) initiatives. Start now: hear about the industry’s first BYOD solution to securely provision and onboard iOS, Android, Mac OS X and Windows 7 mobile devices on any network.

  Prize Drawings For All In Attendance
4:00pm-4:45pm Session Nine

Corero

Stephen Gates

Stopping DDoS Attacks: What your Service Provider is NOT telling you!

Corero Network Security, an organization’s First Line of Defense, is the leading provider of Distributed Denial of Service (DDoS) defense. As the First Line of Defense, Corero’s products and services stop DDoS and malicious server targeted attacks, protecting IT infrastructure and eliminating costly downtime. The First Line of Defense eradicates DDoS activity by filtering and removing attack traffic before it hits the network, as a result existing network security infrastructure such as firewalls and Intrusion Prevention Systems (IPS), which do not effectively stop these attacks, can carry out the tasks for which they were built. Customers include enterprises, service providers and government organizations worldwide.

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

Aerohive Networks, Inc.
AirWatch, LLC
Alert Logic
Alienvault
ArcMail Technology
Array Networks, Inc.
Aruba Networks, Inc.
BeyondTrust Software, Inc.
Bit9
Blue Coat Systems.
Bradford Networks
Centrify Corporation
Corero
Credant Technologies
Cyber-Ark Software, Ltd.
Quest Software, Inc.
Eccentex Corporation
Endace Limited
EVault, Inc.
Event Tracker by Prism Microsystem
Exinda
FishNet Security, Inc.
ForeScout Technologies
Future Com, LTD
Gigamon
Infoblox Inc.
Innovation Network Technologies Corporation
Ixia
Kaspersky Lab
LANDesk Software
LogRhythm
M&S Technologies, Inc.
NetClarity, Inc.
Nexum, Inc.
Prime Factors, Inc.
Quest
Riverbed Technology
Secure Data Solutions, Inc. 
Sentinel Intrusion Prevention Services
Skybox Security Inc.
Sophos PLC
Sourcefire, Inc.
Talari Networks
The Broadleaf Group,
Trend Micro Incorporated
Tripwire, Inc.
Unique Digital Inc.
Varonis Systems
Virtual Bridges, Inc.
WatchGuard Technologies, Inc.

 

   Copyright © 2009-2013. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy