What We Do
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2012

San Francisco Tech-Security Conference

Date: Thursday, December 6, 2012

Grand Hyatt San Francisco
345 Stockton Street
San Francisco, California, USA 94108
p: 415.398.1234

>>click here for directions


The San Francisco Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One


Robert Zamani
Sr. Systems Engineer & SME

Accuvant, Inc.

Protection Against Spear Phishing and the Modern Cyber Threats

Advanced threats target users through email, website, instant messenger, USB devices and social engineering. Traditional blacklist antivirus cannot keep pace with today's modern malware. Join . from Bit9 to better understand how hackers are outsmarting traditional security approaches with targeted attacks and spear phishing – the most common technique behind some of today’s most damaging cyber attacks.  Learn how these threats work and the most impactful things you can do to prevent targeted attacks from breaching your organization.

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:45am Session Two


Gary Schick
Sales Director

Keeping Your Business Secure in 2013




>>click here for the presentation

10:45am-11:30am Session Three

Cyber-Ark Software, Ltd.

Berenice Jacobs

Manage, Control, and Audit the Use of Shared, Privileged, and Administrative Accounts

  • Do you know how many privileged, shared, or generic identities exist within your IT infrastructure?
  • Do you know who has access to these accounts and what they’re doing during administrative sessions?
  • Are auditors requesting reports on entitlement to and usage of these identities?

The average enterprise includes thousands of privileged identities, accounts, and passwords.  Manually managing and updating these is a time-consuming, costly and repetitive process.  Administrative and application accounts (hard-coded, embedded credentials) can be found in network devices, servers, and software within an organization, including virtual environments, yet access to these accounts is unmonitored.  Sharing of access to these accounts occurs frequently, so the system does not track WHO logged in, merely that a login occurred—a significant audit challenge.

Learn how to mitigate the risk of mismanagement of shared, privileged, and administrative accounts and how to address associated audit and compliance findings.

11:30am-12:00pm Break/Vendor Booth Time/Lunch
12:00pm-12:45pm Session Four

WatchGuard Technologies, Inc.

Coy Thorp

Securing the Virtual World

Virtualization is part of an overall trend within IT to centralize administrative tasks while improving scalability and workloads. Questions have arisen around security within virtualized environments and if they are as safe as physical environments or even perhaps safer. This presentation addresses the challenges that are faced and how to tackle them successfully.

>>click here for the presentation

12:45pm-1:00pm Break/Vendor Booth Time
1:00pm-1:45pm Session Five

paloalto Networks

Elton Fontaine
SE Manager

Breaking the Lifecycle of the Modern Threat

Network attacks are becoming both more sophisticated and more common, with all types of enterprises and all types of information being targeted by attackers. In this presentation we will shine light on the lifecycle of a modern network attack to understand how the threat landscape has changed and what is required from us as security professionals to protect our networks and users today.  

1:45pm-2:30pm Session Six

eSentire, Inc.

Travis Barlow
Marketing Director

Swimming with Crocs - How the Security Industry has failed

During this talk Mr. Barlow will confront the issues that impact the security industry head-on in an effort to expose past and current failures and provide his personnel insight as to what needs to be done to improve the situation.  

2:30pm-2:45pm Break/Vendor Booth Time
2:45pm-3:30pm Session Seven

Bradford Networks

Michael Killoran

Onboarding Personal Devices to Corporate Networks

Many IT organizations are being asked to allow personal devices onto corporate networks.  Unlike corporate-issued devices that are well-managed and under IT’s control, this new Bring-Your-Own-Device (BYOD) initiative introduces a unique set of security challenges that require a balance of flexibility, visibility, security.

This presentation will explain the concept of a “BYOD Blueprint” and lessons learned from onboarding personal devices to over 800 networks around the world.

>>click here for the presentation

  Prize Drawings For All In Attendance
3:30pm-4:15pm Session Eight

FireEye, Inc.

Jason Gael
Senior Security Systems Engineer

Advanced malware, zero-day and targeted APT attacks. This is the new status quo.

IMF, Citibank, RSA, Sony, Epsilon, Lockheed and many others have been attacked. In fact, over 95% of enterprises are easily compromised as advanced attacks simply bypass traditional signature-based defenses such as NGFW, IPS, AV and Web gateways. The security hole is real and it is pervasive
Don’t be the next headline. Learn how to protect yourself .
The presentation will cover:

  • The new threat landscape – advanced, zero-day and targeted APT attacks
  • How advanced attacks easily bypass your current security
  • The hole left open by traditional signature-based technologies
  • Plugging the security hole
  • Next generation security for next generation threats

Jason Gael, Senior Security Systems Engineer, is focused on educating customers to better protect themselves from modern malware, such as advanced persistent threats, spear–phishing attacks, and drive–by downloads. Jason has worked in security and software related industries for 20 years. He is currently Systems Engineering Manager – US West with FireEye Inc, a security company based in Milpitas, CA. Previous to FireEye, Jason held Senior roles at Websense, Catbird, Surfcontrol, Lightsurf, Magnifi, Santa Cruz Operation (SCO), and Borland. Jason lives in Santa Cruz, California where he enjoys sailing, skateboarding with his son, and world–class disc–golfing.

  Prize Drawings For All In Attendance
4:15pm-5:00pm Session Nine

Blue Coat Systems.

Sasi Murthy
Director of Product Marketing

Breaking the Vicious Cycle of the Malnet Threat and Botnet Infections

The Vicious Cycle of Malnets
In 2012, Blue Coat expects malware distribution infrastructures will be responsible for more than two- thirds of all malicious cyber-attacks.  Malnets (malware networks) are extensive infrastructures embedded in the Internet and designed to deliver mass market attacks to the largest possible audience on a continuous basis. Hear the details of Blue Coat Systems latest 2012 Security Report and learn why stopping the attacks using traditional zero-day defenses is a losing proposition.  Learn how cyber-criminals have created a vicious cycle of malware attacks and why you need new solutions in order to protect your users and break this vicious cycle.  In this session you learn:

  • What threat vectors are being exploited by cyber-criminals to target their attacks
  • Why the 'whack-a-mole' defense strategy just doesn't work against todays attacks
  • Why 'zero-day' defense is insufficient and why you need negative-day protection
  • Where malnet infrastructures are located and hide and why they are nearly impossible to eradicate

>>click here for the presentation

  Prize Drawings For All In Attendance

Event Sponsors/Exhibitors

Accuvant, Inc.
AirWatch, LLC
Alert Logic
ArcMail Technology
Array Networks, Inc.
Beyond Security
BeyondTrust Software, Inc.
Blue Coat Systems.
Bradford Networks
Celestix Networks, Inc.
 Centurion Technologies
Check Point Software Technologies Ltd.
Cyber-Ark Software, Ltd.
Quest Software, Inc.
DriveSavers Data Recovery
Eccentex Corporation
eSentire, Inc.
EVault, Inc.
Evolve Technology Group
FireEye, Inc.
Fortinet, Inc.
Hitachi ID Systems
Infoblox Inc.
Interface Masters, Inc.
Invincea, Inc.
JDS Uniphase Corporation
Kaspersky Lab
LANDesk Software
Meru Networks
NetClarity, Inc.
paloalto Networks
Riverbed Technology
Security On Demand™
Silver Peak Systems, Inc.
Sims Recycling Solutions
Sonic.net, Inc.
Sophos PLC
Talari Networks
Tripwire, Inc.
Varonis Systems
WatchGuard Technologies, Inc.
Wontok Enterprises
Zix Corporation


   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy