Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Charlotte Tech-Security Conference

Date: Thursday, February 21, 2013
Location:

Hilton Charlotte University
8629 JM Keynes Dr
Charlotte, NC 28262
p: 704.547.7444

>>click here for directions

Overview

The Charlotte Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

DG Technology Consulting, LLC

Travis Abrams
DG Technology

McAfee, Inc.

The New Normal: The Market Forces Driving the Next Generation of Network Security

Please join DG Technology & McAfee for a discussion on the key market forces that are driving an evolution of network security today.  We will examine the two biggest drivers - Virtualization & Cloud Computing – and how they can, will and should impact your security strategy.  We will review how to:

  • Exploit the cloud without exposing your data
  • Retain the operational benefits of virtualization while ensuring optimized virtual server security and compliance
  • Next Generation Intrusion Prevention Strategy
  • Next Generation Firewalls

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:45am Session Two

Blue Coat Systems.

Grant Asplund

Web Security for the Always On User

The average business faces 5,000 threats each month.  Malware infrastructures, social networking, cloud applications and mobile devices are responsible for the exponential growth in malicious sites and attacks.  This evolving threat landscape is changing the game for how we can protect against new types of advanced attacks. 

  • How has social media and a mobile workforce impacted your business?
  • How does Web security adjust according to an employee’s location and his device?
  • How do you create a solid security posture, while allowing for personal and recreational Internet use?
  • What best practices, strategies, and solutions are available to protect today’s always on user?
10:45am-11:15am Session Three

Bit9

Angela Halliwell

Forsythe Solutions Group, Inc.

Trust-based Security: A Proactive Approach that Puts You in Control

In 2012 we’ve seen an unprecedented rise in targeted cyber attacks and an acceleration of the loss of core IP.  While state sponsored attacks and cyber espionage have been occurring for decades, the level of disclosure and visibility of these attacks is rising to new levels. We are witnessing the greatest theft of intellectual property in history. Industry analysts state traditional Anti-virus security does not work and is “fighting a losing battle”. A trust-based approach is the most effective way to stop advanced threats and malware

In this session, attendees will receive an in-depth review of the importance of a trust-based security solution.

11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:15pm Session Four

Corero

Stephen Gates

Key Steps of Protection for a First Line of Defense - Defending Against DDoS Attacks and Unwanted Traffic

With the number of successful attacks on the rise, it is evident that firewalls, intrusion prevention systems, and traditional security infrastructures are not equipped to combat them.  These technologies were not built to stop DDoS attacks, undesirable behaviors, advanced evasion attacks and other unwanted malicious traffic targeting your infrastructure.

Corero Network Security, an organization’s First Line of Defense, is the leading provider of Distributed Denial of Service (DDoS) defense.

12:15pm-12:30pm Break/Vendor Booth Time
12:30pm-1:00pm Session Five

Gigamon

Peter Cannell

Riverbed Technology

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

1:00pm-1:30pm Session Six

FireEye, Inc.

Mike Falkenrath
Sr. Systems Engineer

HIC Network Security Solutions LLC

Next Generation Threat Protection

The new generation of threats has exposed the need for next-generation protection against advanced threats. Over 95% of companies already have compromised systems within their networks. Why? Advanced malware has eroded the effectiveness of traditional defenses, leaving a hole in the network. Designed to use signatures to block known threats, traditional, and next-generation firewalls, IPS, AV, and gateways do nothing when zero-day, targeted APT malware attacks.

To fill this gap in network defenses, a new generation of security protections has emerged, ready to do battle against advanced malware, zero-day, and targeted APT attacks. These next-generation security systems must plug the hole left by firewalls, IPS, AV, and Web gateways by applying advanced, coordinated techniques to identify, confirm and block the activities of next-generation threats.

>>click here for the presentation

1:30pm-1:45pm Break/Vendor Booth Time
1:45pm-2:30pm Session Seven

WatchGuard Technologies, Inc.

Harrison Midkiff

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

2:30pm-3:00pm Session Eight

Axway

Steve Jordan

Govern the Flow of Data:
Moving from Chaos to Control

 

 

 

>>click here for the presentation

3:00pm-3:15pm Break/Vendor Booth Time
3:15pm-4:00pm Session Nine

Cyber-Ark Software, Ltd.

Aleck Brailsford
System Engineers Manager

Securing Enterprise: Privileged Account & Activity Monitoring

4:00pm-4:45pm Session Ten

Centrify Corporation

John Kimberly
Systems Engineer

Unifying Identity Services Across Data Center, Cloud and Mobile

Find out how Unified Identity Services can integrate authentication, access control, privilege management, policy enforcement and user-level auditing across servers, applications and mobile devices. Discover how Active Directory can be leveraged to centrally manage on–premise and cloud–based systems and applications; mobile devices and mobile apps. Learn about the importance of consolidating “islands” of identity and enforcing granular privilege management to improve security and compliance and reduce operational costs.

>>click here for the presentation

4:45pm-5:15pm Session Eleven

Trend Micro Incorporated

Chris Pratico
Sr. Sales Engineer

Securing Your Physical, Virtual, Cloud Infrastructure

Protect confidential data, ensure compliance and prevent costly damage, without hindering productivity. Join Trend Micro and learn how to secure your data at rest or in motion; accessible on servers, desktops, laptops, tablets, smartphones and even removable media. Let Trend empower you to prevent unauthorized access and data breeches throughout your enterprise, regardless of whether your infrastructure is physical, virtual or in the cloud.

>>click here for the presentation

Event Sponsors/Exhibitors

Aerohive Networks, Inc.
AFL
AirTight Networks, Inc.
ArcMail Technology
Association of Information Technology Professionals - Charlotte
Assurance Data
Aveksa
Axway
BeyondTrust Software, Inc.
Bit9
Blue Coat Systems.
Blue Door Networks, LLC
© Boldon James 2013
BrightPlanIT Inc.
Centrify Corporation
Cenzic, Inc.
Check Point Software Technologies Ltd.
Click Security
Corero
Custom Communications
CNP Technologies, LLC
Cyber-Ark Software, Ltd.
DG Technology Consulting, LLC
Event Tracker
ESET, LLC
Exinda
F5 Networks, Inc.
FireEye, Inc.
FishNet Security, Inc.
ForeScout Technologies
Forsythe Solutions Group, Inc.
Gigamon
HIC Network Security Solutions LLC
Infoblox Inc.
Internet Content Management
Kaspersky Lab
LogRhythm
McAfee, Inc.
NetClarity, Inc.
Net Optics
netSummit, Inc.
paloalto Networks
RedSeal Networks, Inc.
Riverbed Technology
SecureAuth
Skybox Security Inc.
SLAIT Consulting
SmoothWall Ltd.
http://www.solutionary.com/
Trend Micro Incorporated
Unitrends
Varonis Systems
WatchGuard Technologies, Inc.
XIRRUS
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy