Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Minneapolis Tech-Security Conference

Date: Thursday,March 28, 2013
Location:

Minneapolis Marriott City Center
30 South 7th Street
Minneapolis, MN 55402
p: 612.349.4000

>>click here for directions

Overview

The Minneapolis Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Varonis Systems

David Braun

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

9:15am-9:45am Break/Vendor Booth Time
9:45am-10:15am Session Two

Trend Micro Incorporated

Matt Hubbard
Sr. Regional Product Manager

Securing Your Physical, Virtual, Cloud Infrastructure

Protect confidential data, ensure compliance and prevent costly damage, without hindering productivity. Join Trend Micro and learn how to secure your data at rest or in motion; accessible on servers, desktops, laptops, tablets, smartphones and even removable media. Let Trend empower you to prevent unauthorized access and data breeches throughout your enterprise, regardless of whether your infrastructure is physical, virtual or in the cloud.

>>click here for presentation

10:15am-11:00am Session Three

Blue Coat Systems.

Grant Asplund
Senior Technology Evangelist

 

Web Security for the Always On User

The average business faces 5,000 threats each month.  Malware infrastructures, social networking, cloud applications and mobile devices are responsible for the exponential growth in malicious sites and attacks.  This evolving threat landscape is changing the game for how we can protect against new types of advanced attacks. 

  • How has social media and a mobile workforce impacted your business?
  • How does Web security adjust according to an employee’s location and his device?
  • How do you create a solid security posture, while allowing for personal and recreational Internet use?
  • What best practices, strategies, and solutions are available to protect today’s always on user?
11:00am-11:30am Break/Vendor Booth Time/Lunch
11:30am-12:00pm Session Four

Gigamon

J Scott Haugdahl
Principal engineer
Blue Cross Blue Shield
Former Asst. VP & Architect, US Bank.

Shared Data Access network for Monitoring, Security, and Performance

 

 

 

 

>>click here for the presentation

12:00pm-12:15pm Break/Vendor Booth Time
12:15pm-1:00pm Session Five

WatchGuard Technologies, Inc.

Bill Larsen

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

1:00pm-1:45pm Session Six

Centrify Corporation

Louise Popyk
Systems Engineer

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?

Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting SaaS and mobile computing using a single, unified approach.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.
  • Learn about approaches for managing privileged user access to servers and apps.

>>click here for the presentation

1:45pm-2:00pm Break/Vendor Booth Time
2:00pm-2:45pm Session Seven

Check Point Software Technologies Ltd.

John Michealson
Minnesota & Dakotas
Security Engineer

A successful Advanced Persistent Threat (APT), explained.

A successful (APT), explained” will delve into how malware has become a for profit business. We’ll show that advanced programming not required and almost anyone can buy the tools needed to launch a successful attack and demonstrate tools that mitigate these attacks.  We’ll walk though some examples of recent attacks, including Eurograbber, a very successful recent targeted attack aimed at – you guessed it – grabbing euros from banking clients that netted $47M USD. We’ll also go through a new report produced by gathering data from customer sites worldwide. This report is available for preview here. http://www.checkpoint.com/campaigns/security-report/index.html

2:45pm-3:15pm Session Eight

Ruckus Wireless, Inc

David Kramer

 

Noisy Times in Wireless

We're surrounded by more wireless devices than ever before - who doesn't have a smart phone, tablet or laptop? But as more offices, meeting areas, and public venues provide Wi-Fi access, signal interference grows as well, causing your wireless connection's quality and reliability to suffer. And 5GHz signals and new wireless standards won't help.

Join Ruckus Wireless and Clear North Technologies to learn how Ruckus' Smart Wi-Fi and advanced antennae design will give you the best wireless experience!

>>click here for the presentation

3:15pm-3:30pm Break/Vendor Booth Time
  Prize Drawings For All In Attendance
3:30pm-4:15pm Session Nine

paloalto Networks

Ajay Aggarwal

Practical strategies to safeguard your network

According to Gartner the enterprise network firewall market is undergoing a period of dynamic evolution, as effective next-generation firewalls are now increasingly necessary. There is a new generation of Internet applications that traditional firewalls cannot see. They play host to various malware and find creative ways to penetrate your firewall by disguising themselves, hiding in SSL tunnels, and targeting multiple ports to find entry points. Gone are the days of lone, brute force attackers out to steal credit cards. The new breed of predators on your infrastructures and applications are highly organized, evasive, and patient. Regain control of these apps before they take control of your business! Join Palo Alto Networks in this session where you'll learn practical strategies to safeguard your network.

>>click here for the presentation

  Prize Drawings For All In Attendance
4:15pm-5:00pm Session Ten

Milestone Systems, Inc.

Cindy Burns

How to Defend Against DDoS Attacks

Why they happen and how you can prepare to defend your network against their deleterious effects.

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
Aercor Wireless, Inc.
AirTight Networks, Inc.
The Barrier Group
BeyondTrust Software, Inc.
Bit9
Blue Coat Systems.
Centrify Corporation
Check Point Software Technologies Ltd.
Cimcor, Inc.
© Cortado AG
Event Tracker
Exinda
F5 Networks, Inc.
Gigamon
Infoblox Inc.
Kaspersky Lab
LANDesk Software
LogRhythm
LuciData Inc.
MCS IT - Management Communication Services, Inc.
Meru Networks
Milestone Systems, Inc.
NetClarity, Inc.
NetIQ Corporation
NetSPI Inc.
Nexum, Inc.
paloalto Networks
The Minnesota Chapter of the Project Management Institute
Qualys, Inc.
RJS Smart Security
Ruckus Wireless, Inc
Secunia ApS
http://www.solutionary.com/
Tenable Network Security
Trend Micro Incorporated
Varonis Systems
WatchGuard Technologies, Inc.
Wave Systems Corp.
Websense, Inc.
   Copyright © 2009-2013. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy