Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Los Angeles Tech-Security Conference

Date: Thursday, January 17, 2013
Location:

Los Angeles Airport Marriott
5855 West Century Boulevard
Los Angeles, CA 90045
p: 310.641.5700

>>click here for directions

Overview

The Los Angeles Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Blue Coat Systems.

Grant Asplund

Breaking the Vicious Cycle of the Malnet Threat and Botnet Infections

The Vicious Cycle of Malnets
In 2012, Blue Coat expects malware distribution infrastructures will be responsible for more than two- thirds of all malicious cyber-attacks.  Malnets (malware networks) are extensive infrastructures embedded in the Internet and designed to deliver mass market attacks to the largest possible audience on a continuous basis. Hear the details of Blue Coat Systems latest 2012 Security Report and learn why stopping the attacks using traditional zero-day defenses is a losing proposition.  Learn how cyber-criminals have created a vicious cycle of malware attacks and why you need new solutions in order to protect your users and break this vicious cycle.  In this session you learn:

  • What threat vectors are being exploited by cyber-criminals to target their attacks
  • Why the 'whack-a-mole' defense strategy just doesn't work against todays attacks
  • Why 'zero-day' defense is insufficient and why you need negative-day protection
  • Where malnet infrastructures are located and hide and why they are nearly impossible to eradicate

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:45am Session Two

BeyondTrust Software, Inc.

Marc Maiffret
CTO

What is old is new again: Mobile Security, a computer in every pocket

In this presentation Marc Maiffret will work to show examples of the overall mobile threat landscape. This includes both attacks unique to the mobile space and also attacks that while seemingly new have existed for a very long time in the traditional desktop computing space. Turn off your ringers or else…

10:45am-11:15am Session Three

GTB Technologies Inc.

Uzi Yair
Co-Founder

Data Protection in the Cloud

The current, aging Data Loss Prevention model, developed in large part to focus on compliance, is not adequate enough to address  Data Protection in the Cloud.

Join GTB Technologies for an educational session that will explain HOW you can protect your most prized asset: your data in the cloud, using the Next Generation of Data Protection.

>>click here for the presentation

11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:15pm Session Four

Entrust

Jose Fernandez

Turning the Mobile Device Evolution in Your Favor

Mobile devices are everywhere.  While many organizations are focused on mobile device management, a growing number of them are realizing other strategic uses for these mobile devices. Whether corporate owned, or BYOD a growing number of organizations are utilizing mobile devices to replace and enhance legacy authentication technologies. Mobile devices are powerful identity tools that can enhance and replace authenticators such as: OTP tokens, smart cards, and user names/passwords. In this presentation Entrust will discuss the mobile landscape, threats and some new innovative ways users can easily, and strongly authenticate to physical/logical systems.

>>click here for the presentation

12:15pm-12:30pm Break/Vendor Booth Time
12:30pm-1:00pm Session Five

Varonis Systems

Scott Truchot

Bring Your Own Service, The effects of cloud services on compliance and data protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.

This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

1:00pm-1:30pm Session Six

Gigamon

Rich Southall

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction?with the volume of traffic and the speed at which that traffic?is flowing. As organizations migrate form 1Gb to 10Gb and beyond, network security tools struggle to keep up with?these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it isvital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

1:30pm-1:45pm Break/Vendor Booth Time
1:45pm-2:30pm Session Seven

WatchGuard Technologies, Inc.

Coy Thorp

The Fallacy of ‘Finished’: Why do I need to pay attention to information security, and how do I keep up?

Join Coy Thorp, the Sr. Sales Engineer for WatchGuard Technologies, as he explores today’s threat landscape and what security professionals can do to respond. We live in a world with growing and innovative ways to access and handle information, and because of that, we feel we can never catch a break.  Greater than 96% of network breaches happen because of firewall misconfiguration. Watch, via live demo, how to create technical policy that flows directly from corporate policy decisions, and how to easily manage many of the challenges we face today.

2:30pm-3:15pm Session Eight

Fortinet, Inc.

Kostas Sfakiotakis

Next Generation Firewalls: A Discussion on Consolidated Security, Application Inspection and Blended Threat Mitigation

>>click here for the presentation

3:15pm-3:30pm Break/Vendor Booth Time
3:30pm-4:15pm Session Nine

Invincea, Inc.

Stephen Ward
Vice President

Protect Your Organization from Breach: Put the User in a Bubble

The adversary knows that you have to grant your users access to the outside world - and that no amount of training will ever change human tendencies of curiosity. They know that every time your users go out to the Internet or open their email clients, they have a high likelihood of being tricked into opening the drawbridge to your financial data, your client and patient PII and the crown jewels of your organization...your intellectual property.

What can be done to protect the network from the user and the user from themself?

  • Put the user in a protective bubble EVERY time they go out to the Internet or open the email client.
  • Place the user in a contained environment when running highly targeted applications such as the web browser, PDF reader and Office suite.
  • Arm the environment with behavioral as opposed to signature based detection and kill attacks immediately upon identification.

You can attend hundreds of sessions and still face a massive problem related to user targeting...or you can attend this session and finally start fighting back.

>>click here for the presentation

4:15pm-4:45pm Session Ten

EVault, Inc.

Arleen Urquhart
Product Marketing Manager

Five Security Questions To Ask When Choosing a Cloud Provider

Increasingly, companies are moving components of their business operations to the cloud for a variety of reasons that include reducing IT expenses, to gain greater efficiency, to enable collaboration and mobility. But news headlines are a stark reminder that not all Clouds are created equal. When evaluating a Cloud service provider to manage your critical business data it’s important to understand how your security goals, those of your clients and the Cloud provider are aligned. Asking these 5 Questions today, could save you considerable headaches tomorrow. EVault has been delivering ironclad, cloud-connected data protection solutions for over 15 years, please join us for this informative best practices discussion.

Arleen Urquhart is a Product Marketing Manager focused on Cloud-as-a-Service solutions at EVault. She has over 15 years in the IT industry helping such companies as Oracle, Siemens-Nixdorf, Stratus Technologies, and Symantec bring business critical solutions to market.

  Prize Drawings For All In Attendance
4:45-5:30pm Session Eleven
SYNNEX Corporation

Freddie Jimenez
Solutions Architect
ESP Channels

Protect Your Business

 

 

 


>>click here for the presentation

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
AirTight Networks, Inc.
Alchemy Communications
Alienvault
 Association of Information Technology Professionals
BeyondTrust Software, Inc.
Blue Coat Systems.
BrightPlanIT Inc.
Check Point Software Technologies Ltd.
Click Security
Digital Scepter Corporation
Entrust
eSecurityToGo, LLC 
EVault, Inc.
F5 Networks, Inc.
FireMon
Fortinet, Inc.
 Fortnet Security
GFI Software
Gigamon
GTB Technologies Inc.
Infoblox Inc.
Invincea, Inc.
ISD Security, LLC
ISSA Los Angeles Chapter
Kaspersky Lab
KEMP Technologies, Inc.
NetClarity, Inc.
Net Optics
NetSpec, Inc.
Proofpoint, Inc.
Quest
Riverbed Technology
Security On Demand™
Sims Recycling Solutions
SmoothWall Ltd.
Somansa
Sonic.net, Inc.
Sophos PLC
SYNNEX Corporation
Talariax
Varonis Systems
Voltage Security, Inc.
WatchGuard Technologies, Inc.
Wells Fargo Capital Finance
WILDPACKETS, INC
Wontok Enterprises
Zix Corporation
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy