Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Des Moines Tech-Security Conference

Date: Thursday, March 7, 2013
Location:

Embassy Suites On the River - Des Moines Hotels
101 E. Locust Street
Des Moines, Iowa 50309
p: 515.244.1700

click here for the directions

Overview

The Des Moines Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Imperva

Bill Clark
Sr. Security Engineer

The Insider Threat

Statistics show that organizations today face an ever-increasing threat from compromised insiders. These trusted end users routinely have their endpoint security tested by malware and viruses, and industry analysts are now questioning the current and future capability of anti-virus and anti-malware solutions to mitigate these threats. There are certainly enough high profile events over the past 2 years to demonstrate the problems of prioritizing security at the end-point.

Bill Clark, Imperva's Sr. Security Engineer, will present the following:

  • Define the Insider Threat
  • Identify targets for infection, tools for infecting end points and exploiting the compromised end-point
  • Provide recommendations for new strategies to mitigate the effects of compromised insiders
  • Demonstration of compromising an insider and performing data extraction from the compromisedend-point
9:15am-10:00am Break/Vendor Booth Time
10:00am-10:30am Session Two

Gigamon

Ray Wildeboer

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

10:30am-11:15am Session Three

Check Point Software Technologies Ltd.

Lon Kaut
Security Engineer

Squashing politics with policy

A presentation to get system admins to think about implementing security from a different angle. I will discuss the “ground up” approach to implementing security controls in your organization by increasing user acceptance.

For the past 8 years Lon has helped to design and implement security solutions to satisfy security, compliance, performance, and availability needs of employers and clients.  Lon has worn many hats; from helping small and medium businesses achieve the best possible security for their budget to architecting and securing carrier grade networks.  As a former employee of Scottrade Inc. Lon was an integral part of maturing the security posture, standardizing regular security practices and evangelizing security.

>>click here for the presentation

11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:15pm Session Four

Corero

Stephen Gates

Key Steps of Protection for a First Line of Defense - Defending Against DDoS Attacks and Unwanted Traffic

With the number of successful attacks on the rise, it is evident that firewalls, intrusion prevention systems, and traditional security infrastructures are not equipped to combat them.  These technologies were not built to stop DDoS attacks, undesirable behaviors, advanced evasion attacks and other unwanted malicious traffic targeting your infrastructure.

Corero Network Security, an organization’s First Line of Defense, is the leading provider of Distributed Denial of Service (DDoS) defense.

12:15pm-12:30pm Break/Vendor Booth Time
12:30pm-1:00pm Session Five

Trend Micro Incorporated

Matt Hubbard
Sr. Regional Product Manager

Securing Your Physical, Virtual, Cloud Infrastructure

Protect confidential data, ensure compliance and prevent costly damage, without hindering productivity. Join Trend Micro and learn how to secure your data at rest or in motion; accessible on servers, desktops, laptops, tablets, smartphones and even removable media. Let Trend empower you to prevent unauthorized access and data breeches throughout your enterprise, regardless of whether your infrastructure is physical, virtual or in the cloud.

>>click here for presentation

1:00pm-1:45pm Session Six

paloalto Networks

Daniel Hefle

Practical strategies to safeguard your network

According to Gartner the enterprise network firewall market is undergoing a period of dynamic evolution, as effective next-generation firewalls are now increasingly necessary. There is a new generation of Internet applications that traditional firewalls cannot see. They play host to various malware and find creative ways to penetrate your firewall by disguising themselves, hiding in SSL tunnels, and targeting multiple ports to find entry points. Gone are the days of lone, brute force attackers out to steal credit cards. The new breed of predators on your infrastructures and applications are highly organized, evasive, and patient. Regain control of these apps before they take control of your business! Join Palo Alto Networks in this session where you'll learn practical strategies to safeguard your network.

>>click here for the presentation

1:45pm-2:00pm Break/Vendor Booth Time
  Prize Drawings For All In Attendance
2:00pm-2:45pm Session Seven

RJS Smart Security

Josh More
Senior Security Consultant
CISSP, GIAC-GSLC Gold, GIAC-GCIH, ACE

Lean Security 101: Lean and Practical Approaches to Security Projects

For years, we've been told the key to security is technology. We purchase and deploy technology to create layers behind layers, making our walls taller and taller to keep the bad guys out. Sadly, it's not working.
What does work is combining lessons learned in other industries to the security world. By examining best practices within Lean Manufacturing, Agile Development and Rugged DevOps, this presentation delivers ways you can be successful in security, not by purchasing technology, but by:

  • Effectively using what you have and what you can get for free
  • Re-allocating security budget from the point of diminishing return
  • Identifying and maximizing learning opportunities
  • Engaging in small, inexpensive test projects
  • Choosing custom and rational metrics to measure what matters
  • Replacing defective systems with ones that grow with you
  • Turning security from a catch-up game into one of strategic and competitive advantage.

Success in security depends on the right mix of people, technology and process. Without all three, you are doomed to failure.

  Prize Drawings For All In Attendance
2:45pm-3:30pm Session Eight

Blue Coat Systems.

Blue Coat was scheduled to speak today in Des Moines but their speaker was unable to attend the conference.

   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Aercor Wireless, Inc.
Aerohive Networks, Inc.
Alert Logic
Alliance Technologies
Alexander Open Systems
Avira Operations GmbH & Co.
BeyondTrust Software, Inc.
Bit9
Blue Coat Systems.
Cenzic, Inc.
Check Point Software Technologies Ltd.
Core Security Technologies
Corero
Event Tracker
F5 Networks, Inc.
FireMon
FishNet Security, Inc.
Fortinet, Inc.
Gigamon
Imperva
Infoblox Inc.
Integrity Technology Systems
ISSA Des Moines
Iowa Oracle User's Group
Kaspersky Lab
LogRhythm
MCS IT - Management Communication Services, Inc.
Meru Networks
Milestone Systems, Inc.
Network Technology Partners, Inc.
paloalto Networks
Radware Ltd.
RJS Smart Security
SafeNet
Silver Peak Systems, Inc.
http://www.solutionary.com/
Sophos PLC
Sourcefire, Inc.
© SunGard
Torus Technologies, Inc.
Trend Micro Incorporated
Tripwire, Inc.
Varonis Systems
   Copyright © 2009-2013. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy