Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2012


Cincinnati Tech-Security Conference

Date: Thursday, December 13, 2012
Location:

Hyatt Regency Cincinnati
151 West Fifth Street,
Cincinnati, OH 45202
p: 513.579.1234

>>click here for directions

Overview

The Cincinnati Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

INTRUST GROUP

Tim Rettig
CEO / CTO

Security in a Cloudy World

The fast adoption of the cloud is creating new security threats and issues almost constantly.  That’s the bad news.  The good news is the cloud is also creating new and unique ways to improve security.  This session will highlight the challenges and the corresponding solutions that all IT Professionals need to be aware of.

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:45am Session Two

Bit9

Kurt Madey
Sr. Solutions Engineer

Accuvant, Inc.

Protection Against Spear Phishing and the Modern Cyber Threats

Advanced threats target users through email, website, instant messenger, USB devices and social engineering. Traditional blacklist antivirus cannot keep pace with today's modern malware. Join . from Bit9 to better understand how hackers are outsmarting traditional security approaches with targeted attacks and spear phishing – the most common technique behind some of today’s most damaging cyber attacks.  Learn how these threats work and the most impactful things you can do to prevent targeted attacks from breaching your organization.

>>click here for the presentation

10:45am-11:30am Session Three

paloalto Networks

Sean Mullins

Practical strategies to safeguard your network

According to Gartner the enterprise network firewall market is undergoing a period of dynamic evolution, as effective next-generation firewalls are now increasingly necessary. There is a new generation of Internet applications that traditional firewalls cannot see. They play host to various malware and find creative ways to penetrate your firewall by disguising themselves, hiding in SSL tunnels, and targeting multiple ports to find entry points. Gone are the days of lone, brute force attackers out to steal credit cards. The new breed of predators on your infrastructures and applications are highly organized, evasive, and patient. Regain control of these apps before they take control of your business! Join Palo Alto Networks in this session where you'll learn practical strategies to safeguard your network.

11:30am-12:00pm Break/Vendor Booth Time/Lunch
12:00pm-12:45pm Session Four

Axway

Steven Jordan
Director, Industry Marketing

Understanding Managed File Transfer:
Moving from Chaos to Control

In this session you will learn about the many aspects of securing file transfers both internally and with partners and customers.

Learn what organizations have done in the past to transfer files

  • What is FTP, and why it is ubiquitous and a problem
  • Understanding Managed File Transfer
  • A look at things we do today to move files for differing reasons

Understand the reasons organizations transfer files through patterns of file transfer

  • Application integration
  • Multi-site integration
  • Business to business communication
  • Portal based file transfers
  • Human to human ad-hoc transfers

Discover best practices for creating solutions that securely satisfy your organizations file transfer needs

  • Creating architectures that provide confidentiality, integrity and availability for transfers
  • Building a flexible platform that satisfies multiple file transfer patterns
  • Providing governance of file transfers through visibility and control of transfers
  • Creating a solution that is operationally efficient

>>click here for the presentation

12:45pm-1:00pm Break/Vendor Booth Time
1:00pm-1:45pm Session Five

Bradford Networks

Tom Murphy
CMO

Onboarding Personal Devices to Corporate Networks

Many IT organizations are being asked to allow personal devices onto corporate networks.  Unlike corporate-issued devices that are well-managed and under IT’s control, this new Bring-Your-Own-Device (BYOD) initiative introduces a unique set of security challenges that require a balance of flexibility, visibility, security.

This presentation will explain the concept of a “BYOD Blueprint” and lessons learned from onboarding personal devices to over 800 networks around the world.

>>click here for the presentation

1:45pm-2:30pm Session Six

Check Point Software Technologies Ltd.

Kellman Meghu
Head of Security Engineering

 

How NOT To Do Security: Lessons Learned From the Galactic Empire

An analysis of the strengths and weaknesses of the Galactic Empire security policy.  This presentation seeks to conduct a post-mortem on the data security policy implemented during the events that led to the destruction of critical technology needed by the Empire for continued operational efficiencies.  A history of the company, as well as a detailed look at the events that followed, provides a great working analysis that can be applied to your policy in hopes of avoiding the same fate.  Learning from past mistakes, let's ensure we are not doomed to repeat them, and potentially, suffer a similar fate.

2:30pm-2:45pm Break/Vendor Booth Time
2:45pm-3:15pm Session Seven

Aruba Networks, Inc.

Jim Bodish

Enabling Secure BYOD over any network

Need to embrace employee-owned tablets and smartphones at work without losing control of your users, your network and your data? Aruba can help you simplify the onboarding and management of mobile devices on your network and reduce the time and resources required to support Bring Your Own Device (BYOD) initiatives. Start now: hear about the industry’s first BYOD solution to securely provision and onboard iOS, Android, Mac OS X and Windows 7 mobile devices on any network.

3:15pm-4:00pm Session Eight

Clearswift

Bob Pritchard
Vice President
Americas

Ken Donze
Senior Sales Engineer

Managing the Uncertain World of Document Sharing Over the Internet

Today’s business depends on a healthy exchange of information via email. Many employees are not aware of the recent trend where intruders use common document formats to deliver active code to an unsuspecting user with the goal of exploiting and controlling your network and data.  In this session, Clearswift will address how email is being used to deliver Advanced Persistent Threats to your users through common document formats such as Adobe and Office and also how to safeguard sensitive information inadvertently delivered by your users to the world.  

This session will kick-off with a discussion of how both Office and Adobe documents are being modified to host active code to deliver targeted attacks. The second part of the presentation will focus on data leakage, more specifically, Microsoft’s File Classification Infrastructure and other ways to define data. Another often overlooked issue, which can be prevented, is how employees, even with the best of intentions, may inadvertently send proprietary information to customers or partners.

We’ll conclude with a discussion of the latest tools that can help to ward off these threats and give you and your employees peace of mind when communicating with entities outside your organization.

>>click for the presentation

  Prize Drawings For All In Attendance
4:00pm-4:45pm Session Nine

Blue Coat Systems.

Grant R. Asplund
Senior Technology Evangelist

Web Security for the Always On User
The average business faces 5,000 threats each month.  Malware infrastructures, social networking, cloud applications and mobile devices are responsible for the exponential growth in malicious sites and attacks.  This evolving threat landscape is changing the game for how we can protect against new types of advanced attacks. 

  • How has social media and a mobile workforce impacted your business?
  • How does Web security adjust according to an employee’s location and his device?
  • How do you create a solid security posture, while allowing for personal and recreational Internet use?
  • What best practices, strategies, and solutions are available to protect today’s always on user?

>>click here for the presentation

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
AirWatch, LLC
Aruba Networks, Inc.
Axway
BeyondTrust Software, Inc.
Bit9
Blue Coat Systems.
Blue Door Networks, LLC
Bradford Networks
CentraComm
 Centurion Technologies
Check Point Software Technologies Ltd.
Clearswift
Quest Software, Inc.
Event Tracker by Prism Microsystem
Exinda
Extreme Networks
FishNet Security, Inc.
FusionStorm
Imperva
INTRUST GROUP
ISACA Cincinnati Chapter
Kaspersky Lab
LogRhythm
MCS IT - Management Communication Services, Inc.
NetClarity, Inc.
NetIQ Corporation
Nexum, Inc.
NIKSUN Incorporated
paloalto Networks
Riverbed Technology
Silver Peak Systems, Inc.
Sophos PLC
Trend Micro Incorporated
Trusteer
Varonis Systems
Voltage Security, Inc.
WhiteHat Security  

 

   Copyright © 2009-2013. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy