What We Do
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013

Salt Lake City Tech-Security Conference

Date: Thursday, February 14, 2013

Hilton Salt Lake City Center
255 South West Temple
Salt Lake City, UT 84101
p: 801-328-2000

>>click here for directions


The Salt Lake City Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Aerohive Networks, Inc.

Troy Roberts
Director of Sales

Preparing Your Network for the Mobility Explosion: How to Turn BYOD into Productivity

The real drain on IT resources when evaluating a networking vendor solution is not simply getting devices onto the network – it’s what to do with them once they’re there. Having a way to securely connect and monitor managed and unmanaged devices, reporting on security compliance, ensuring the devices can use available services and assets and are restricted from those which they should not access, and making sure the devices don’t overwhelm available network resources are the real game changers for a successful BYOD implementation.

This session will discuss the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion, including an overview of necessary access, authentication, and security options as well as focusing on the equally essential features required to ensure your network is prepared to make all devices attached to it productive and compliant.

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:45am Session Two

Blue Coat Systems.

Grant Asplund

Breaking the Vicious Cycle of the Malnet Threat and Botnet Infections

The Vicious Cycle of Malnets
In 2012, Blue Coat expects malware distribution infrastructures will be responsible for more than two- thirds of all malicious cyber-attacks.  Malnets (malware networks) are extensive infrastructures embedded in the Internet and designed to deliver mass market attacks to the largest possible audience on a continuous basis. Hear the details of Blue Coat Systems latest 2012 Security Report and learn why stopping the attacks using traditional zero-day defenses is a losing proposition.  Learn how cyber-criminals have created a vicious cycle of malware attacks and why you need new solutions in order to protect your users and break this vicious cycle.  In this session you learn:

  • What threat vectors are being exploited by cyber-criminals to target their attacks
  • Why the 'whack-a-mole' defense strategy just doesn't work against todays attacks
  • Why 'zero-day' defense is insufficient and why you need negative-day protection
  • Where malnet infrastructures are located and hide and why they are nearly impossible to eradicate

>>click here for the presentation

10:45am-11:15am Session Three


Xuefeng Bai


The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:30pm Session Four

WatchGuard Technologies, Inc.

Coy Thorp

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

12:30pm-12:45pm Break/Vendor Booth Time
12:45pm-1:30pm Session Five

Cyber-Ark Software, Ltd.

Bret Newman



Manage, Control, and Audit the Use of Shared, Privileged, and Administrative Accounts

  • Do you know how many privileged, shared, or generic identities exist within your IT infrastructure?
  • Do you know who has access to these accounts and what they’re doing during administrative sessions?
  • Are auditors requesting reports on entitlement to and usage of these identities?

The average enterprise includes thousands of privileged identities, accounts, and passwords.  Manually managing and updating these is a time-consuming, costly and repetitive process.  Administrative and application accounts (hard-coded, embedded credentials) can be found in network devices, servers, and software within an organization, including virtual environments, yet access to these accounts is unmonitored.  Sharing of access to these accounts occurs frequently, so the system does not track WHO logged in, merely that a login occurred—a significant audit challenge.

Learn how to mitigate the risk of mismanagement of shared, privileged, and administrative accounts and how to address associated audit and compliance findings.

1:30pm-2:00pm Session Six

EVault, Inc.

David Chapa
Sr. Director
Technology Evangelist

Five Security Questions to Ask When Choosing a Cloud Provider

Increasingly, companies are moving components of their business operations to the cloud, including backup and disaster recovery. The reasons are compelling:

  • Reduced IT expenses
  • Greater efficiency
  • Greater collaboration and mobility

But news headlines are a stark reminder that not all Clouds are created equal. When evaluating a Cloud service provider to manage your critical business data, it’s important to understand how your security goals and those of the Cloud provider are aligned.

Asking five critical questions today could save you considerable headaches tomorrow. Learn what these questions are and how they can help you ensure a secure cloud solution for your organization.

>>click here for the presentation

2:00pm-2:15pm Break/Vendor Booth Time
2:15pm-3:00pm Session Seven

paloalto Networks

Jared Valentine
Sales Engineer

Breaking the Lifecycle of the Modern Threat

Network attacks are becoming both more sophisticated and more common, with all types of enterprises and all types of information being targeted by attackers. In this presentation we will shine light on the lifecycle of a modern network attack to understand how the threat landscape has changed and what is required from us as security professionals to protect our networks and users today.

3:00pm-3:30pm Session Eight

Zscaler, Inc.

Roger Cobb
Director of Sales
Rocky Mountains and Pacific Northwest

Enabling Business Beyond The Corporate Network And Tackling BYOD

How to secure your users from advanced threats on any device, in any location, without the need to purchase software or deploy hardware appliances.

>>click here for the presentation

  Prize Drawings For All In Attendance
3:30pm-4:00pm Session Nine

F5 Networks, Inc.


  Prize Drawings For All In Attendance

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
Aerohive Networks, Inc.
BeyondTrust Software, Inc.
Blue Coat Systems.
BrightPlanIT Inc.
Cenzic, Inc.
Cyber-Ark Software, Ltd.
DigiCert® Inc
EVault, Inc.
Event Tracker
F5 Networks, Inc.
Fortinet, Inc.
InfraGard Salt Lake City Chapter
Infoblox Inc.
Intellisys Communications
ISSA Utah Chapter
Kaspersky Lab
LANDesk Software
Meru Networks
paloalto Networks
PMI, Northern Utah Chapter
Radware Ltd.
SAINT Corporation
Sourcefire, Inc.
Tenable Network Security
Tripwire, Inc.
Varonis Systems
WatchGuard Technologies, Inc.
Wave Systems Corp.
Zscaler, Inc.
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy