Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


San Jose Tech-Security Conference

Date: Thursday, February 7, 2013
Location:

Network Meeting Center
5201 Great America Parkway
Santa Clara CA. 95054
p:408-562-6111

>>Click here for directions

Overview

The San JoseTech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Fortinet, Inc.

Kevin Flynn
Sr Product Marketing Manager

The Power to BYOD

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:45am Session Two

Aerohive Networks, Inc.

James Forbes
Systems Engineer

Preparing Your Network for the Mobility Explosion: How to Turn BYOD into Productivity

The real drain on IT resources when evaluating a networking vendor solution is not simply getting devices onto the network – it’s what to do with them once they’re there. Having a way to securely connect and monitor managed and unmanaged devices, reporting on security compliance, ensuring the devices can use available services and assets and are restricted from those which they should not access, and making sure the devices don’t overwhelm available network resources are the real game changers for a successful BYOD implementation.

This session will discuss the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion, including an overview of necessary access, authentication, and security options as well as focusing on the equally essential features required to ensure your network is prepared to make all devices attached to it productive and compliant.

>>click here for the presentation
10:45am-11:15am Session Three

GTB Technologies Inc.

 

Data Protection in the Cloud

The current, aging Data Loss Prevention model, developed in large part to focus on compliance, is not adequate enough to address Data Protection in the Cloud.

Join GTB Technologies for an educational session that will explain HOW you can protect your most prized asset: your data in the cloud, using the Next Generation of Data Protection.

>>click here for the presentation
11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:30pm Session Four

Blue Coat Systems.

Grant Asplund

Breaking the Vicious Cycle of the Malnet Threat and Botnet Infections

The Vicious Cycle of Malnets
In 2012, Blue Coat expects malware distribution infrastructures will be responsible for more than two- thirds of all malicious cyber-attacks.  Malnets (malware networks) are extensive infrastructures embedded in the Internet and designed to deliver mass market attacks to the largest possible audience on a continuous basis. Hear the details of Blue Coat Systems latest 2012 Security Report and learn why stopping the attacks using traditional zero-day defenses is a losing proposition.  Learn how cyber-criminals have created a vicious cycle of malware attacks and why you need new solutions in order to protect your users and break this vicious cycle.  In this session you learn:

  • What threat vectors are being exploited by cyber-criminals to target their attacks
  • Why the 'whack-a-mole' defense strategy just doesn't work against todays attacks
  • Why 'zero-day' defense is insufficient and why you need negative-day protection
  • Where malnet infrastructures are located and hide and why they are nearly impossible to eradicate

>>click here for the presentation

12:30pm-12:45pm Break/Vendor Booth Time
12:45pm-1:15pm Session Five

Varonis Systems

Amy Tam
Senior Solutions Engineer

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

Amy Tam brings over 13 years of technology industry experience to her role as Senior Regional Consulting Engineer at Varonis Systems, a software company specializing in Data Governance.    Prior to joining Varonis, she held a number of IT management, consulting, security, and project management roles with companies in a variety of industries, including manufacturing, financial services, enterprise software development, military, and technology services. Since joining Varonis in 2011, Amy has helped many companies design, build and maintain flexible, robust and secure information technology systems.

>>click here for the presentation

1:15pm-1:45pm Session Six

Corero

Nirav Shah
Director of Product Management

Key Steps of Protection for a First Line of Defense - Defending Against DDoS Attacks and Unwanted Traffic

With the number of successful attacks on the rise, it is evident that firewalls, intrusion prevention systems, and traditional security infrastructures are not equipped to combat them.  These technologies were not built to stop DDoS attacks, undesirable behaviors, advanced evasion attacks and other unwanted malicious traffic targeting your infrastructure.

Corero Network Security, an organization’s First Line of Defense, is the leading provider of Distributed Denial of Service (DDoS) defense.

1:45pm-2:15pm Session Seven

Gigamon

Greg Orr

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

2:15pm-2:30pm Break/Vendor Booth Time
2:30pm-3:15pm Session Eight

WatchGuard Technologies, Inc.

Coy Thorp

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

3:15pm-3:45pm Session Nine

FusionStorm

Silver Peak Systems, Inc.

Rick Ow

Enterprise WAN Challenges in 2013

Every Wide Area Network (WAN) connection has unique challenges. In some instances, there is simply not enough bandwidth. In other instances, the bandwidth that does exist cannot be utilized effectively because packets are being dropped and/or delivered out-of-order. In still other scenarios, the challenge is WAN latency. And all too often in modern networks, all three instances are posing challenges to traditional apps and newer Enterprise applications.

>>click here for the presentation

3:45pm-4:30pm Session Ten

Axway

Steven Jordan
Director, Industry Marketing

Govern the Flow of Data:
Moving from Chaos to Control

 

 

 

>>click here for the presentation

  Prize Drawings For All In Attendance
4:30pm-5:15pm Session Eleven

Centrify Corporation

Brad Zehring
Senior Product Manager

 

Unifying Identity Services Across Data Center, Cloud and Mobile

Find out how Unified Identity Services can integrate authentication, access control, privilege management, policy enforcement and user-level auditing across servers, applications and mobile devices. Discover how Active Directory can be leveraged to centrally manage on–premise and cloud–based systems and applications; mobile devices and mobile apps. Learn about the importance of consolidating “islands” of identity and enforcing granular privilege management to improve security and compliance and reduce operational costs.

>>click here for the presentation

  Prize Drawings For All In Attendance
5:15pm-6:00pm Session Twelve
Hitachi ID Systems  

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
Aerohive Networks, Inc.
AirTight Networks, Inc.
Axcient
Axway
BeyondTrust Software, Inc.
Bit9
Blue Coat Systems.
BrightPlanIT Inc.
Celestix Networks, Inc.
Centrify Corporation
Cenzic, Inc.
Check Point Software Technologies Ltd.
Corero
cPacket Networks
DATAWAY
EVault, Inc.
Exinda
F5 Networks, Inc.
Fortinet, Inc.
FusionStorm
Gigamon
GTB Technologies Inc.
Hitachi ID Systems
Infoblox Inc.
Invincea, Inc.
Kaspersky Lab
Mako Networks Ltd.
Meru Networks
Net Optics
SecureAuth
Silver Peak Systems, Inc.
Sims Recycling Solutions
Skybox Security Inc.
http://www.solutionary.com/
Sonic.net, Inc.
Trusteer
Varonis Systems
WatchGuard Technologies, Inc.
Virtual Instruments, inc.
Wave Systems Corp.
Wontok Enterprises
   Copyright © 2009-2013. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy