What We Do
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2012

Chicago/Schaumburg Tech-Security Conference

Date: Thursday, December 20, 2012

Hyatt Regency Schaumburg, Chicago
1800 East Golf Road,
Schaumburg, Illinois, USA 60173
p: 847.605.1234

>>click here for directions


The Chicago Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Aruba Networks, Inc.

Mike Leger

Enabling Secure BYOD over any network

Need to embrace employee-owned tablets and smartphones at work without losing control of your users, your network and your data? Aruba can help you simplify the onboarding and management of mobile devices on your network and reduce the time and resources required to support Bring Your Own Device (BYOD) initiatives. Start now: hear about the industry’s first BYOD solution to securely provision and onboard iOS, Android, Mac OS X and Windows 7 mobile devices on any network.

9:15am-9:45am Break/Vendor Booth Time
9:45am-10:30am Session Two

Blue Coat Systems.

Grant Asplund
Senior Technology Evangelist

Web Security for the Always On User

The average business faces 5,000 threats each month.  Malware infrastructures, social networking, cloud applications and mobile devices are responsible for the exponential growth in malicious sites and attacks.  This evolving threat landscape is changing the game for how we can protect against new types of advanced attacks. 

  • How has social media and a mobile workforce impacted your business?
  • How does Web security adjust according to an employee’s location and his device?
  • How do you create a solid security posture, while allowing for personal and recreational Internet use?
  • What best practices, strategies, and solutions are available to protect today’s always on user?
10:30am-11:15am Session Three

RJS Smart Security

Josh More

Lean Security 101: Lean and Practical Approaches to Security Projects

For years, we've been told the key to security is technology. We purchase and deploy technology to create layers behind layers, making our walls taller and taller to keep the bad guys out. Sadly, it's not working.
What does work is combining lessons learned in other industries to the security world. By examining best practices within Lean Manufacturing, Agile Development and Rugged DevOps, this presentation delivers ways you can be successful in security, not by purchasing technology, but by:

  • Effectively using what you have and what you can get for free
  • Re-allocating security budget from the point of diminishing return
  • Identifying and maximizing learning opportunities
  • Engaging in small, inexpensive test projects
  • Choosing custom and rational metrics to measure what matters
  • Replacing defective systems with ones that grow with you
  • Turning security from a catch-up game into one of strategic and competitive advantage.

Success in security depends on the right mix of people, technology and process. Without all three, you are doomed to failure.

11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:30pm Session Four


Steven Jordan
Director, Industry Marketing

Understanding Managed File Transfer:
Moving from Chaos to Control

In this session you will learn about the many aspects of securing file transfers both internally and with partners and customers.

Learn what organizations have done in the past to transfer files

  • What is FTP, and why it is ubiquitous and a problem
  • Understanding Managed File Transfer
  • A look at things we do today to move files for differing reasons

Understand the reasons organizations transfer files through patterns of file transfer

  • Application integration
  • Multi-site integration
  • Business to business communication
  • Portal based file transfers
  • Human to human ad-hoc transfers

Discover best practices for creating solutions that securely satisfy your organizations file transfer needs

  • Creating architectures that provide confidentiality, integrity and availability for transfers
  • Building a flexible platform that satisfies multiple file transfer patterns
  • Providing governance of file transfers through visibility and control of transfers
  • Creating a solution that is operationally efficient

>>click here for the presentation

12:30pm-12:45pm Break/Vendor Booth Time
  Prize Drawings For All In Attendance
12:45pm-1:30pm Session Five

Centrify Corporation

Louise Popyk
Systems Engineer


Centralizing Identity, Policy and Privilege to Simplify Data Center Security and Compliance

Find out how to prevent insider attacks, simplify internal and external audits in mixed data centers comprised of Windows, UNIX, Linux systems, and control access and policy on Macs, iOS and Android devices. Learn how to protect systems and applications, manage user access and privileges, and audit and report on rights and privileges using an IT asset you already own - Active Directory.

>>click here for the presentation

  Prize Drawings For All In Attendance



Event Sponsors/Exhibitors

Accuvant, Inc.
Aerohive Networks, Inc.
AirWatch, LLC
Alert Logic
Aruba Networks, Inc.
Avira Operations GmbH & Co.
Blue Coat Systems.
burwood group, inc.
Centrify Corporation
Endace Limited
EVault, Inc.
F5 Networks, Inc.
ForeScout Technologies
Integrated Document Technologies, Inc.
Infoblox Inc.
JDS Uniphase Corporation
Kaspersky Lab
MCS IT - Management Communication Services, Inc.
NetClarity, Inc.
NetIQ Corporation
RJS Smart Security
RKON Technologies
Sophos PLC
Sourcefire, Inc.
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy