Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Boston Tech-Security Conference

Date: Thursday, March 21, 2013
Location:

Boston Marriott Newton
2345 Commonwealth Avenue
Newton, MA 02466
p: 617.969.1000

>>click here for directions

Overview

The Boston Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Cyber-Ark Software, Ltd.

Barak Feldman

Secure, Manage and Control Privileged Accounts

Identity Management Tools, such as Single Sign-On and Directories are examples of important building blocks in any organization's Identity Management infrastructure. However, these tools are only geared towards individual users. An additional solution for privileged users should be deployed to complement the Identity Management Infrastructure.
This presentation will focus on best practices in:

  • Frequent and automatic password changes of shared privileged accounts
  • Automatically detecting and managing Service accounts
  • Privileged Session recording and management
  • Strong auditing of privileged passwords usage to ensure accountability
  • Secured long term storage and automatic failover to eliminate risks of loss and to ensure availability during disaster recovery
Removing clear text passwords embedded in scripts, and automatically changing them according to corporate policy
9:30am-10:00am Break/Vendor Booth Time
10:00am-10:45am Session Two

Aerohive Networks, Inc.

Stephen Kim
Systems Engineer

Preparing Your Network for the Mobility Explosion: How to Turn BYOD into Productivity

The real drain on IT resources when evaluating a networking vendor solution is not simply getting devices onto the network – it’s what to do with them once they’re there. Having a way to securely connect and monitor managed and unmanaged devices, reporting on security compliance, ensuring the devices can use available services and assets and are restricted from those which they should not access, and making sure the devices don’t overwhelm available network resources are the real game changers for a successful BYOD implementation.

This session will discuss the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion, including an overview of necessary access, authentication, and security options as well as focusing on the equally essential features required to ensure your network is prepared to make all devices attached to it productive and compliant.

>>click here for the presentation

10:45am-11:30am Session Three

Blue Coat Systems.

Grant Asplund
Senior Technology Evangelist

Web Security for the Always On User

The average business faces 5,000 threats each month.  Malware infrastructures, social networking, cloud applications and mobile devices are responsible for the exponential growth in malicious sites and attacks.  This evolving threat landscape is changing the game for how we can protect against new types of advanced attacks. 

  • How has social media and a mobile workforce impacted your business?
  • How does Web security adjust according to an employee’s location and his device?
  • How do you create a solid security posture, while allowing for personal and recreational Internet use?
  • What best practices, strategies, and solutions are available to protect today’s always on user?
11:30am-12:00pm Break/Vendor Booth Time/Lunch
12:00pm-12:30pm Session Four

Silver Peak Systems, Inc.

Eric Morin

 

Improve WAN Performance in a Virtualized World

Silver Peak software accelerates data between data centers, branch offices and the cloud.  The company’s software-defined acceleration solves network quality, capacity and distance challenges to provide fast and reliable access to data anywhere in the world.  Leveraging its leadership in data center class wide area network (WAN) optimization, Silver Peak is a key enabler for strategic IT projects like virtualization, big data and disaster recovery.  Download Silver Peak software today at www.silver-peak.com/marketplace

>>click here for the presentation

12:30pm-12:45pm Break/Vendor Booth Time
12:45pm-1:15pm Session Five

Bit9

Eric Schurr
CMO

Trust-based Security: A Proactive Approach that Puts You in Control

In 2012 we’ve seen an unprecedented rise in targeted cyber attacks and an acceleration of the loss of core IP.  While state sponsored attacks and cyber espionage have been occurring for decades, the level of disclosure and visibility of these attacks is rising to new levels. We are witnessing the greatest theft of intellectual property in history. Industry analysts state traditional Anti-virus security does not work and is “fighting a losing battle”. A trust-based approach is the most effective way to stop advanced threats and malware

In this session, attendees will receive an in-depth review of the importance of a trust-based security solution.

1:15pm-1:45pm Session Six

Corero

Stephen Gates

Key Steps of Protection for a First Line of Defense - Defending Against DDoS Attacks and Unwanted Traffic

With the number of successful attacks on the rise, it is evident that firewalls, intrusion prevention systems, and traditional security infrastructures are not equipped to combat them.  These technologies were not built to stop DDoS attacks, undesirable behaviors, advanced evasion attacks and other unwanted malicious traffic targeting your infrastructure.

Corero Network Security, an organization’s First Line of Defense, is the leading provider of Distributed Denial of Service (DDoS) defense.

1:45pm-2:00pm Break/Vendor Booth Time
2:00pm-2:30pm Session Seven

Gigamon

Tim Melvin

Riverbed Technology

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

2:30pm-3:00pm Session Eight

VENAFI

Gavin Hill
Director of Product Marketing

Secure Cloud and BYOD Strategies: Managing Trust and Encryption

Using the cloud and allowing for BYOD means losing some control. Digital certificates, SSH authentication and encryption keys restore control, right? Unfortunately, these security mechanisms—which have become foundational in every enterprise for establishing trust and connectivity—have become ticking time bombs in many cloud and mobility initiatives. Simple errors and malicious attacks have turned these assets into operational, compliance and security liabilities.  Learn how to identify these risks and build best-practice cloud and BYOD architectures to keep your enterprise safe.

3:00pm-3:15pm Break/Vendor Booth Time
3:15pm-3:45pm Session Nine

FireEye, Inc.

Joshua Senzer, CISSP
Sr. Systems Engineer

Next Generation Threat Protection

 

 

>>click here for the presentation

3:45pm-4:30pm Session Ten

WatchGuard Technologies, Inc.

Steve Butera

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

  Prize Drawings For All In Attendance
4:30pm-5:15pm Session Eleven
Hitachi ID Systems  
  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Aerohive Networks, Inc.
AirTight Networks, Inc.
Alert Logic
Alienvault
ArcMail Technology
Axway
BeyondTrust Software, Inc.
Bit9
Blue Coat Systems.
BlueCore Networks
Centrify Corporation
Cenzic, Inc.
Click Security
Corero
Cyber-Ark Software, Ltd.
Dell
Dyntek Services, Inc.
EVault, Inc.
Exinda
Extreme Networks
FireEye, Inc.
FishNet Security, Inc.
Fixmo Inc.
ForeScout Technologies
Fortinet, Inc.
Gigamon
Hitachi ID Systems
Hitachi Solutions America, Ltd.
Interface Masters, Inc.
Invincea, Inc.
 Ixia NVS
Kaspersky Lab
LogRhythm
Meru Networks
NetIQ Corporation
© netsense
Novell, Inc.
owncloud
paloalto Networks
Promisec
Riverbed Technology
SecureAuth
Silver Peak Systems, Inc.
Sims Metal Management Limited
http://www.solutionary.com/
SYNNEX Corporation
The Business Network Group
Tenable Network Security
Varonis Systems
VaultLogix LLC
VENAFI
VERDASYS
WatchGuard Technologies, Inc.
Wave Systems Corp.
Websense, Inc.
Wontok Enterprises
Zix Corporation
   Copyright © 2009-2013. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy