Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Kansas City Tech-Security Conference

Date: Thursday, March 14, 2013
Location:

WESTIN KANSAS CITY AT CROWN CENTER
1 East Pershing Road
Kansas City, MO 64108
p: 816.474.4400

>>click here for directions

Overview

The Kansas City Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Blue Coat Systems.

Grant Asplund
Senior Technology Evangelist

Web Security for the Always On User

The average business faces 5,000 threats each month.  Malware infrastructures, social networking, cloud applications and mobile devices are responsible for the exponential growth in malicious sites and attacks.  This evolving threat landscape is changing the game for how we can protect against new types of advanced attacks. 

  • How has social media and a mobile workforce impacted your business?
  • How does Web security adjust according to an employee’s location and his device?
  • How do you create a solid security posture, while allowing for personal and recreational Internet use?
  • What best practices, strategies, and solutions are available to protect today’s always on user?
9:30am-10:00am Break/Vendor Booth Time
10:00am-10:30am Session Two

Varonis Systems

Georgi Georgiev

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

10:30am-11:00am Session Three

Gigamon

John Mattes

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

11:00am-11:30am Break/Vendor Booth Time/Lunch
11:30am-12:00pm Session Four

Corero

Stephen Gates

Key Steps of Protection for a First Line of Defense - Defending Against DDoS Attacks and Unwanted Traffic

With the number of successful attacks on the rise, it is evident that firewalls, intrusion prevention systems, and traditional security infrastructures are not equipped to combat them.  These technologies were not built to stop DDoS attacks, undesirable behaviors, advanced evasion attacks and other unwanted malicious traffic targeting your infrastructure.

Corero Network Security, an organization’s First Line of Defense, is the leading provider of Distributed Denial of Service (DDoS) defense.

12:00pm-12:15pm Break/Vendor Booth Time
12:15pm-1:00pm Session Five

WatchGuard Technologies, Inc.

Terrence Davis

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

1:00pm-1:45pm Session Six

Bradford Networks

Tom Murphy
CMO

 

Onboarding Personal Devices to Corporate Networks

Many IT organizations are being asked to allow personal devices onto corporate networks.  Unlike corporate-issued devices that are well-managed and under IT’s control, this new Bring-Your-Own-Device (BYOD) initiative introduces a unique set of security challenges that require a balance of flexibility, visibility, security.

This presentation will explain the concept of a “BYOD Blueprint” and lessons learned from onboarding personal devices to over 800 networks around the world.

>>click here for the presentation

1:45pm-2:00pm Break/Vendor Booth Time
2:00pm-2:45pm Session Seven

Centrify Corporation

Wade Tongen
Systems Engineer

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?

Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting SaaS and mobile computing using a single, unified approach.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.
  • Learn about approaches for managing privileged user access to servers and apps.

>>click here for the presentation

2:45pm-3:15pm Session Eight

EVault, Inc.

Matt Murphy
Channel Relationship Manager

Five Security Questions to Ask When Choosing a Cloud Provider

Increasingly, companies are moving components of their business operations to the cloud, including backup and disaster recovery. The reasons are compelling:

  • Reduced IT expenses
  • Greater efficiency
  • Greater collaboration and mobility

But news headlines are a stark reminder that not all Clouds are created equal. When evaluating a Cloud service provider to manage your critical business data, it’s important to understand how your security goals and those of the Cloud provider are aligned.

Asking five critical questions today could save you considerable headaches tomorrow. Learn what these questions are and how they can help you ensure a secure cloud solution for your organization.

>>click here for the presentation

3:15pm-3:30pm Break/Vendor Booth Time
3:30pm-4:15pm Session Nine

Check Point Software Technologies Ltd.

John Bloomer
Security Engineering Manager

Denial of Service the Greatest Event That You’re Not Doing Enough About!

4:15pm-4:45pm Session Ten

Fortinet, Inc.

Chris Barnes

Next Generation Firewalls: A Discussion on Consolidated Security, Application Inspection and Blended Threat Mitigation

 

>>click here for presentation

  Prize Drawings For All In Attendance
4:45-5:15pm Session Ten

paloalto Networks

Kameron Klein

Using The Next Generation Firewall for Detection and Control of Modern Malware

Modern malware is at the heart of many of the most sophisticated IT security breaches the industry has ever seen. Malware has evolved to become some of the most highly evasive, adaptable and resilient networked applications in the world, and often act as the platform for attackers to launch and control increasingly sophisticated attacks. Join us as we dive into the world of modern malware to see what is real, what is hype and what things we need to be doing as an industry and as individual security practitioners to protect our users and networks.

>>click here for the presentation

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
BeyondTrust Software, Inc.
Bit9
Blue Coat Systems.
Bradford Networks
Centrify Corporation
Cenzic, Inc.
Check Point Software Technologies Ltd.
Cisco Systems
codefortytwo software
Core Security Technologies
Corero
EVault, Inc.
Event Tracker
Exinda
FishNet Security, Inc.
Fortinet, Inc.
Gigamon
Innovation Network Technologies Corporation
Infoblox Inc.
Integrity Technology Systems
ISSA Kansas City Chapter
Kaspersky Lab
Meru Networks
MCS IT - Management Communication Services, Inc.
NetIQ Corporation
NetStandard, Inc.
Network America
paloalto Networks
 Project Management Institute (PMI)
Protegrity Corporation
Sentinel Intrusion Prevention Services
http://www.solutionary.com/
Sophos PLC
Sourcefire, Inc.
Symplified, Inc
Kansas City Mobile Device Management
Tripwire, Inc.
Varonis Systems
WatchGuard Technologies, Inc.
Wave Systems Corp.
Websense, Inc.
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy