Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2012


Phoenix Tech-Security Conference

Date: Thursday, November 8, 2012
Location:

Renaissance Glendale Hotel & Spa
9495 W. Coyotes Boulevard
Glendale, AZ 85305
p: 623.937.3700

>>click here for directions

Overview

The Phoenix Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

WatchGuard Technologies, Inc.

Coy Thorp

Securing the Virtual World

Virtualization is part of an overall trend within IT to centralize administrative tasks while improving scalability and workloads. Questions have arisen around security within virtualized environments and if they are as safe as physical environments or even perhaps safer. This presentation addresses the challenges that are faced and how to tackle them successfully.

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:45am Session Two

paloalto Networks

Steve Brown
Systems Engineer
Palo Alto Networks

Breaking the Lifecycle of the Modern Threat

Network attacks are becoming both more sophisticated and more common, with all types of enterprises and all types of information being targeted by attackers. In this presentation we will shine light on the lifecycle of a modern network attack to understand how the threat landscape has changed and what is required from us as security professionals to protect our networks and users today.

10:45am-11:30am Session Three

Enterprise Networks Solutions

 Citrix Systems, Inc

John Gormally

Enterprise Networks Solutions

Network Instruments
Using a Network Analyzer as a Security Tool

Analyzers Provide Strong Advantages in Fighting Virus and Hack Attacks Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features make the analyzer an excellent tool to locate network security breaches, and to help identify and isolate virus-infected systems.

Citrix transforms how businesses and IT work and people collaborate in the cloud era. With market-leading cloud, collaboration, networking and virtualization technologies, Citrix powers mobile workstyles and cloud services, making complex enterprise IT simpler and more accessible for 260,000 organizations. Citrix products touch 75 percent of Internet users each day and it partners with more than 10,000 companies in 100 countries.

>>click here for the presentation

11:30am-12:00pm Break/Vendor Booth Time/Lunch
12:00pm-12:45pm Session Four

Bradford Networks

Mike Killoran  

Onboarding Personal Devices to Corporate Networks

Many IT organizations are being asked to allow personal devices onto corporate networks.  Unlike corporate-issued devices that are well-managed and under IT’s control, this new Bring-Your-Own-Device (BYOD) initiative introduces a unique set of security challenges that require a balance of flexibility, visibility, security.

This presentation will explain the concept of a “BYOD Blueprint” and lessons learned from onboarding personal devices to over 800 networks around the world.

>>click here for the presentation

12:45pm-1:00pm Break/Vendor Booth Time
1:00pm-1:45pm Session Five

Blue Coat Systems.

Grant Asplund
Senior Technology Evangelist

Breaking the Vicious Cycle of the Malnet Threat and Botnet Infections

The Vicious Cycle of Malnets
In 2012, Blue Coat expects malware distribution infrastructures will be responsible for more than two- thirds of all malicious cyber-attacks.  Malnets (malware networks) are extensive infrastructures embedded in the Internet and designed to deliver mass market attacks to the largest possible audience on a continuous basis. Hear the details of Blue Coat Systems latest 2012 Security Report and learn why stopping the attacks using traditional zero-day defenses is a losing proposition.  Learn how cyber-criminals have created a vicious cycle of malware attacks and why you need new solutions in order to protect your users and break this vicious cycle.  In this session you learn:

  • What threat vectors are being exploited by cyber-criminals to target their attacks
  • Why the 'whack-a-mole' defense strategy just doesn't work against todays attacks
  • Why 'zero-day' defense is insufficient and why you need negative-day protection
  • Where malnet infrastructures are located and hide and why they are nearly impossible to eradicate
1:45pm-2:30pm Session Six

EMC Corporation

 

RSA, The Security Division of EMC Corporation

Chris Corde
Director of Corporate Strategy

People are the new perimeter
The challenges of enabling your mobile workforce in the post PC era

The mobile workforce represents a huge shift in IT infrastructure, and as a result creates a number of ripple effect changes in how security and authentication needs to be delivered. Users expect devices to handle personal use cases as seamlessly as enterprise use cases; they are being trained not to expect strong authentication challenges when accessing enterprise resources, and more and more will start to perform most major productivity tasks on tablets and Smartphones.
During this presentation, Chris Corde, Director of Corporate Strategy at RSA, the Security division of EMC, will talk about today's IT choices and strong authentication options presented against the backdrop of the mobility landscape.  This presentation will address:

  • Technology market trends and changes
  • The various ways in which mobile security is being handled today
  • A view into how mobile authentication needs to be delivered differently than traditional IT approaches

Chris Corde is the Director of Corporate Strategy for RSA, the Security Division of EMC. Chris focuses on long term disruptive opportunities for RSA, including cloud, mobile, and advanced threats. He has been with RSA since 2008 when he joined to lead product marketing for RSA’s Application Security portfolio, specifically its encryption, tokenization, and key management business.
Prior to RSA, Chris worked as a Practice Manager in EMC Consulting where he was responsible for offer development in EMC’s Data Center Networking practice, a critical piece of EMC’s overall strategy around virtualization and networking which now forms the VCE coalition. He holds his MBA from Boston College’s Carroll School of Business, as well as an MS in Computer Science from New York University’s Courant Institute and a BA in Computer Science from Fairleigh Dickinson University.

2:30pm-2:45pm Break/Vendor Booth Time
  Prize Drawings For All In Attendance
2:45pm-3:15pm Session Seven

Zscaler, Inc.

Mike Sutton
VP
Security Research

Pradeep Kulkarni
Security Researcher

Opening the Kimono: Automating Behavioural Analysis for Mobile Apps

 

 

 

>>click here for the presentation

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

Accuvant, Inc.
Aerohive Networks, Inc.
AirTight Networks, Inc.
AirWatch, LLC
ArcMail Technology
Array Networks, Inc.
BEW Global
Beyond Security
BeyondTrust Software, Inc.
Blue Coat Systems.
Bradford Networks
 Citrix Systems, Inc
Cloud Access
EMC Corporation
Endace Limited
Enterprise Networks Solutions
ePlus Security
ESET, LLC
ForeScout Technologies
Fortinet, Inc.
Gigamon
Infoblox Inc.
iT1 Source
JDS Uniphase Corporation
Kaspersky Lab
LANDesk Software
Meru Networks
NetClarity, Inc.
Enterprise Networks Solutions
NwTech, Inc.
paloalto Networks
Quest Software, Inc.
Quest
Riverbed Technology
RSA, The Security Division of EMC Corporation
SafeNet
Sims Recycling Solutions
Security On Demand™
Sophos PLC
Sourcefire, Inc.
Talariax
Tripwire, Inc.
Varonis Systems
Voltage Security, Inc.
WatchGuard Technologies, Inc.
Websense, Inc.
WinMagic Inc.
Zscaler, Inc.

 

   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy