Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Chicago Tech-Security Conference

Date: Thursday, April 4, 2013
Location:

Hyatt Regency McCormick Place
2233 South Martin L. King Drive
Chicago, IL 60616-9985
p: 312.567.1234

>>click here for directions

Overview

The Chicago Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Extreme Networks

Terry Guzowski 
Data Centers

A More Intelligent Approach to Edge Security

The growth of mobile devices, BYOD, and project-based workflows are challenging network security leaders as never before.  Administrators tasked with managing access to applications, assets, and resources are challenged to deliver both fail-safe security and access to the right information at the right time from any location for every user.  This session examines how new advances in Identity Management are helping create security frameworks at the network point of entry, and enabling administrators to quickly and easily apply consistent role-based policies throughout their networks, while delivering seamless mobility and on-demand access to applications to all user types.  Mr. Rohit Dhingra is a Senior Systems Engineer with Extreme Networks, an industry leader in providing switch-based network security solutions across wired and wireless networks.

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:45am Session Two

paloalto Networks

Joel Sible

Using Next Generation Firewalls to fight Advanced Malware and Advanced attacks

Malware has become the key enabler for modern sophisticated attacks due to its ability to avoid
traditional antivirus solutions, and provide a persistent internal foothold for long-term information
attack once inside. As attackers and malware evolve, so to must our security responses. Modern
malware presents a unique challenge in that the most sophisticated attacks will continue to require
trained and diligent security professionals to investigate and analyze. On the other hand, the sheer
volume of unknown malware can easily overwhelm even well-staffed security teams. As a result,
security must aggressively seek out methods to automate the blocking of unknown malware
wherever possible, while actively investigating the unknowns that get through.

Join us for this informative session to provide insight into the nature of the unknown malware problem,
and provide some basic steps that security teams can use to protect their networks.

10:45am-11:30am Session Three

Blue Coat Systems.

Grant Asplund
Senior Technology Evangelist

Web Security for the Always On User

The average business faces 5,000 threats each month.  Malware infrastructures, social networking, cloud applications and mobile devices are responsible for the exponential growth in malicious sites and attacks.  This evolving threat landscape is changing the game for how we can protect against new types of advanced attacks. 

  • How has social media and a mobile workforce impacted your business?
  • How does Web security adjust according to an employee’s location and his device?
  • How do you create a solid security posture, while allowing for personal and recreational Internet use?
  • What best practices, strategies, and solutions are available to protect today’s always on user?
11:30am-12:00pm Break/Vendor Booth Time/Lunch
12:00pm-12:45pm Session Four

AirTight Networks, Inc.

Kaustubh Phanse
Principle Wireless Architect and Chief Evangelist

Top 5 Considerations for a Secure Enterprise WLAN

Though not yet seen as a complete replacement for Ethernet, Wi-Fi is fast becoming a preferred medium of enterprise network access. The rate of adoption is only expected to grow in the coming years with continued influx of mobile devices and newer standards like 802.11ac. But, enterprises need to carefully evaluate their wireless LAN (WLAN) requirements from the perspective of Wi-Fi access (e.g., coverage, capacity, applications), management (e.g., role-based administration, policies, network monitoring), security (e.g., BYOD, wireless IDS/IPS), network architecture (e.g., single campus vs. distributed deployment, or controller-based vs. controller-less vs. cloud) and of course, budget (e.g., Capex vs. Opex), before investing into their WLAN project. Because not all enterprise WLAN solutions are created equal, and it's important to do your homework to be able to pick the right solution to meet YOUR needs.

Join AirTight Networks in this informative session to break through the marketing jargon and discuss the five key criteria you should consider to define your WLAN strategy. So as you get ready to invest into your next WLAN rollout -- whether it's a greenfield deployment, an expansion, or a replacement of old gear -- you are well prepared!

12:45pm-1:00pm Break/Vendor Booth Time
1:00pm-1:30pm Session Five

Entrust

Jeff Klein

Turning the Mobile Device Evolution in Your Favor

Mobile devices are everywhere.  While many organizations are focused on mobile device management, a growing number of them are realizing other strategic uses for these mobile devices. Whether corporate owned, or BYOD a growing number of organizations are utilizing mobile devices to replace and enhance legacy authentication technologies. Mobile devices are powerful identity tools that can enhance and replace authenticators such as: OTP tokens, smart cards, and user names/passwords. In this presentation Entrust will discuss the mobile landscape, threats and some new innovative ways users can easily, and strongly authenticate to physical/logical systems.

1:30pm-2:00pm Session Six

Varonis Systems

David Braun

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

2:00pm-2:15pm Break/Vendor Booth Time
2:15pm-2:45pm Session Seven

Corero

Stephen Gates

Key Steps of Protection for a First Line of Defense - Defending Against DDoS Attacks and Unwanted Traffic

With the number of successful attacks on the rise, it is evident that firewalls, intrusion prevention systems, and traditional security infrastructures are not equipped to combat them.  These technologies were not built to stop DDoS attacks, undesirable behaviors, advanced evasion attacks and other unwanted malicious traffic targeting your infrastructure.

Corero Network Security, an organization’s First Line of Defense, is the leading provider of Distributed Denial of Service (DDoS) defense.

2:45pm-3:15pm Session Eight

Gigamon

Ray Wildeboer

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

3:15pm-3:30pm Break/Vendor Booth Time
3:30pm-4:00pm Session Nine

VENAFI

Gavin Hill
Director of Product Marketing

Secure Cloud and BYOD Strategies: Managing Trust and Encryption

Using the cloud and allowing for BYOD means losing some control. Digital certificates, SSH authentication and encryption keys restore control, right? Unfortunately, these security mechanisms—which have become foundational in every enterprise for establishing trust and connectivity—have become ticking time bombs in many cloud and mobility initiatives. Simple errors and malicious attacks have turned these assets into operational, compliance and security liabilities.  Learn how to identify these risks and build best-practice cloud and BYOD architectures to keep your enterprise safe.

>>click here for the presentation

4:00pm-4:30pm Session Ten

FireEye, Inc.

John Bolger
Manager of Channels
US-Central

“Malware pandemic?  Sometimes getting a shot only treats the symptoms and not the cause”...

Global brands continue to make the headlines following security incidents that result in the installation of malware that enables exfiltration of critical data.  A broad survey of global enterprises entities reveal that in fact almost all large companies are compromised by malware to varying degrees, despite near universal use of firewalls, web proxies, and desktop and email antivirus screening.  To some extent who ends up in the headlines may be a matter of bad luck.  Still, there is a very large range in the extent of the compromise (infection rates) and obviously the more malware kept out of the network, the lower the odds of a truly bad incident.

Malware uses a range of tactics to avoid detection, but they can be broken into two over-arching categories - to be broad but highly dynamic, or very targeted and narrow.  Malware in the former category will change it's MD5, domain of origin, etc many times a day.

In the second category falls the custom spear-phishing email attacks which continues to plague organizations.

>>click here for the presentation

  Prize Drawings For All In Attendance
4:30pm-5:15pm Session Eleven

Axway

Andy Moir
Director
Solution Marketing Management (SSM)

Govern the Flow of Data:
Moving from Chaos to Control

>>click here for the presentation

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
AirTight Networks, Inc.
Alert Logic
Axway
Barracuda Networks, Inc.
BeyondTrust Software, Inc.
Bit9
Blue Coat Systems.
Celestix Networks, Inc.
Centrify Corporation
Check Point Software Technologies Ltd.
Cimcor, Inc.
Click Security
Corero
cPacket Networks
Dell
Entrust
ePlus Security
ESET, LLC
EVault, Inc.
Extreme Networks
F5 Networks, Inc.
FireEye, Inc.
Fixmo Inc.
GalaxyTech International
Gigamon
Hurricane Labs, LLC
IEEE
© 2012 iNETWORKS Group, Inc.
Infoblox Inc.
Invincea, Inc.
Kaspersky Lab
LogRhythm
MCS IT - Management Communication Services, Inc.
NetClarity, Inc.
Net Optics
Nexum, Inc.
paloalto Networks
Promisec
Protegrity Corporation
Radware Ltd.
SecureAuth
Sims Recycling Solutions
http://www.solutionary.com/
Sourcefire, Inc.
Society for Technical Communication
Varonis Systems
VENAFI
WatchGuard Technologies, Inc.
WILDPACKETS, INC
Zix Corporation
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy