Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Houston Tech-Security Conference

Date: Thursday, February 28, 2013
Location:

The Westin Galleria & Westin Oaks Houston at the Galleria
5060 West Alabama
Houston, TX 77056
p: 713.960.8100

>>click here for directions

Overview

The Houston Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Cyber-Ark Software, Ltd.

Mark Rodriguez

Analyzing the DNA and Risks associated with Privileged Accounts

Privileged accounts and passwords are extremely powerful, and have complete control of the target system with full access to all of the information on that system. This vulnerability could potentially cause tremendous financial losses and reputational damage for businesses.

For enterprises, privileged accounts are especially difficult to manage:

  • The average enterprise has thousands of privileged identities, accounts, and passwords. Manually managing and updating these are a time-consuming, costly and repetitive process.
  • Administrative and application accounts (hard-coded, embedded credentials) are found on virtually every piece of hardware, software, and application within an organization, including virtual environments.
  • Administrative or application accounts are shared, which means that the system does not track WHO logged in as an Administrator, merely that a login occurred—a significant audit challenge.
  • Unlike a personal identity, such as JDoe, administrative or application accounts are nearly impossible to disable due to high potential for disruption to business.
  • Administrative and application accounts are subject to regulations such as Sarbanes Oxley, PCI, and Basel II, requiring that companies prove exactly who logs in to sensitive systems and, increasingly, what they are doing.

Do you know how many privileged identities are in your environment? 

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:45am Session Two

Blue Coat Systems.

Grant Asplund

Breaking the Vicious Cycle of the Malnet Threat and Botnet Infections

The Vicious Cycle of Malnets
In 2012, Blue Coat expects malware distribution infrastructures will be responsible for more than two- thirds of all malicious cyber-attacks.  Malnets (malware networks) are extensive infrastructures embedded in the Internet and designed to deliver mass market attacks to the largest possible audience on a continuous basis. Hear the details of Blue Coat Systems latest 2012 Security Report and learn why stopping the attacks using traditional zero-day defenses is a losing proposition.  Learn how cyber-criminals have created a vicious cycle of malware attacks and why you need new solutions in order to protect your users and break this vicious cycle.  In this session you learn:

  • What threat vectors are being exploited by cyber-criminals to target their attacks
  • Why the 'whack-a-mole' defense strategy just doesn't work against todays attacks
  • Why 'zero-day' defense is insufficient and why you need negative-day protection
  • Where malnet infrastructures are located and hide and why they are nearly impossible to eradicate

>>click here for the presentation

10:45am-11:15am Session Three

Check Point Software Technologies Ltd.

Trey Anders

Best Practices to Secure the Mobile Enterprise

Doing business today requires secure, seamless access to corporate networks and resources when traveling or working remotely. Privacy and integrity of sensitive information is very important.  Simple, safe and secure connectivity to your email, calendar, contacts and corporate applications is a requirement.

Check Point will discuss requirements for unifying endpoint security capabilities for PC, Mac, tablets, and SmartPhones from a centralized management server.   Monitor, manage, educate and enforce a security policy for all remote devices.

>>click here for the presentation

11:15am-11:45pm Break/Vendor Booth Time/Lunch
11:45pm-12:15pm Session Four

Entrust

Ruben Garcia

Turning the Mobile Device Evolution in Your Favor

Mobile devices are everywhere.  While many organizations are focused on mobile device management, a growing number of them are realizing other strategic uses for these mobile devices. Whether corporate owned, or BYOD a growing number of organizations are utilizing mobile devices to replace and enhance legacy authentication technologies. Mobile devices are powerful identity tools that can enhance and replace authenticators such as: OTP tokens, smart cards, and user names/passwords. In this presentation Entrust will discuss the mobile landscape, threats and some new innovative ways users can easily, and strongly authenticate to physical/logical systems.

12:15pm-12:30pm Break/Vendor Booth Time
12:30pm-1:00pm Session Five

Varonis Systems

Jeremy Gaige
Systems Engineer

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

1:00pm-1:30pm Session Six

Corero

Stephen Gates

Key Steps of Protection for a First Line of Defense - Defending Against DDoS Attacks and Unwanted Traffic

With the number of successful attacks on the rise, it is evident that firewalls, intrusion prevention systems, and traditional security infrastructures are not equipped to combat them.  These technologies were not built to stop DDoS attacks, undesirable behaviors, advanced evasion attacks and other unwanted malicious traffic targeting your infrastructure.

Corero Network Security, an organization’s First Line of Defense, is the leading provider of Distributed Denial of Service (DDoS) defense.

1:30pm-1:45pm Break/Vendor Booth Time
1:45pm-2:15pm Session Seven

Gigamon

Greg Gee

The Dynamic World of Threat Detection, Containment & Response

Cyber attacks represent the single greatest threat to the civilized world other than weapons of mass destruction.   That is a quote from Shawn Henry, the former head of the FBI's cyber crime division.  Compound that with the fact the amount of online content doubles every seventy two hours and the fact with “consumerization” of IT the number of devices will go from a ratio one user to one device, to one to three, to one to six.

>>click here for presentation

2:15pm-2:45pm Session Eight

VENAFI

Trevor Evenson
Senior Sales Engineer

Secure Cloud and BYOD Strategies: Managing Trust and Encryption

Using the cloud and allowing for BYOD means losing some control. Digital certificates, SSH authentication and encryption keys restore control, right? Unfortunately, these security mechanisms—which have become foundational in every enterprise for establishing trust and connectivity—have become ticking time bombs in many cloud and mobility initiatives. Simple errors and malicious attacks have turned these assets into operational, compliance and security liabilities.  Learn how to identify these risks and build best-practice cloud and BYOD architectures to keep your enterprise safe.

>>click here for the presentation

2:45pm-3:00pm Break/Vendor Booth Time
3:00pm-3:30pm Session Nine

FireEye, Inc.

Dan Walters
Sr. Systems Engineer Mgr.

Advanced threats require advanced technology

Global brands continue to make the headlines following security incidents that result in the installation of malware that enables exfiltration of critical data. A broad survey of global enterprises entities reveal that in fact almost all large companies are compromised by malware to varying degrees, despite near universal use of firewalls, web proxies, and desktop and email antivirus screening. To some extent who ends up in the headlines may be a matter of bad luck. Still, there is a very large range in the extent of the compromise (infection rates) and obviously the more malware kept out of the network, the lower the odds of a truly bad incident.

Malware uses a range of tactics to avoid detection, but they can be broken into two over-arching categories - to be broad but highly dynamic, or very targeted and narrow. Malware in the former category will change it's MD5, domain of origin, etc many times a day.
In the second category falls the custom spear-phishing email attacks which continues to plague organizations.

In this session, we'll go over these major malware strategies and present detailed statistics demonstrating how the threat has evolved, and how you might compare your enterprise to global peers. We'll also discuss what factors seem to make the most difference in lowering the infection rate.

>>click here for the presentation

3:30pm-4:15pm Session Ten

WatchGuard Technologies, Inc.

Terrence Davis

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

4:15pm-5:00pm Session Eleven

Bradford Networks

Mike Spess
Regional Manger

Onboarding Personal Devices to Corporate Networks

Many IT organizations are being asked to allow personal devices onto corporate networks.  Unlike corporate-issued devices that are well-managed and under IT’s control, this new Bring-Your-Own-Device (BYOD) initiative introduces a unique set of security challenges that require a balance of flexibility, visibility, security.

This presentation will explain the concept of a “BYOD Blueprint” and lessons learned from onboarding personal devices to over 800 networks around the world.

>>click here for the presentation

  Prize Drawings For All In Attendance
5:15pm-6:00pm Session Twelve
Hitachi ID Systems  
  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
Association of Information Technology Professionals - Houston
Alert Logic
ArcMail Technology
BeyondTrust Software, Inc.
Bit9
Blue Coat Systems.
Bradford Networks
Check Point Software Technologies Ltd.
Corero
Critical Start, LLC
Cyber-Ark Software, Ltd.
Dell
Entrust
ESET, LLC
Event Tracker
Exinda
F5 Networks, Inc.
FireEye, Inc.
GalaxyTech International
Gigamon
Hitachi ID Systems
Infoblox Inc.
Innovation Network Technologies Corporation
Interwork Technologies Inc.
Invincea, Inc.
Information Systems Audit and Control Association (ISACA®) Houston Chapter
ITWatchDogs
Kaspersky Lab
LogRhythm
Meru Networks
Net Optics
NetScout Systems, Inc.
paloalto Networks
Patriot Technologies, Inc.
Promisec
SafeNet
SecureAuth
Secure Data Solutions, Inc. 
Sims Recycling Solutions
Skybox Security Inc.
http://www.solutionary.com/
Sourcefire, Inc.
Talari Networks
Tenable Network Security
Tripwire, Inc.
Unique Digital Inc.
Varonis Systems
VASCO Data Security International, Inc.
VENAFI
WatchGuard Technologies, Inc.
Wave Systems Corp.
Websense, Inc.
   Copyright © 2009-2013. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy