What We Do
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013

Detroit Tech-Security Conference

Date: Thursday, April 18, 2013

Embassy Suites Detroit - Livonia/Novi
19525 Victor Parkway
Livonia, MI 48152
p: 734.462.6000

>>click here for directions


The Detroit Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Aerohive Networks, Inc.

Matt Hanna
Systems Engineer

Transforming Your Network into a Platform for Mobility

The modern “mobile-first” enterprise network requires a mobility-optimized approach that is not simply dependent on network access for policy enforcement and control. Contextual elements, such as user identity, device type, application, location, and time of day are the primary building blocks used to create granular policies that dictate how, when, and what the user can access. In this session, we’ll assess the mobility-optimized approach which tightly integrates systems and adds contextual intelligence to create sophisticated “user centric” policies that reduce the complexities of a highly mobile user base. This will provide a vision for how optimizing for mobility can transform your network into a platform for mobility; a platform able to add business value, reduce operational cost and regain control of your network.

>>click here for presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:30am Session Two


Jason Permatteo
Regional Sales Manag

Accuvant, Inc.

Trust-based Security: A Proactive Approach that Puts You in Control

In 2012 we’ve seen an unprecedented rise in targeted cyber attacks and an acceleration of the loss of core IP.  While state sponsored attacks and cyber espionage have been occurring for decades, the level of disclosure and visibility of these attacks is rising to new levels. We are witnessing the greatest theft of intellectual property in history. Industry analysts state traditional Anti-virus security does not work and is “fighting a losing battle”. A trust-based approach is the most effective way to stop advanced threats and malware

In this session, attendees will receive an in-depth review of the importance of a trust-based security solution.

>>click here for the presentation

10:30am-11:00am Session Three

paloalto Networks

Jason Wessel
Solutions Architect
Palo Alto Networks


Use of a Next Generation Firewall: Controlling Modern Malware and Threats






>>click here for the presentation

11:00am-11:30am Break/Vendor Booth Time/Lunch
11:30pm-12:00pm Session Four


Ruben Garcia
Entrust Territory Manager

Mobile For Strong Authentication -Turning the Mobile Device Evolution in Your Favor

Mobile devices are everywhere.  While many organizations are focused on mobile device management, a growing number of them are realizing other strategic uses for these mobile devices. Whether corporate owned, or BYOD a growing number of organizations are utilizing mobile devices to replace and enhance legacy authentication technologies. Mobile devices are powerful identity tools that can enhance and replace authenticators such as: OTP tokens, smart cards, and user names/passwords. In this presentation Entrust will discuss the mobile landscape, threats and some new innovative ways users can easily, and strongly authenticate to physical/logical systems.

>>click here for the presentation

12:00pm-12:15pm Break/Vendor Booth Time
12:15pm-12:45pm Session Five


John Pollack


The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

12:45pm-1:15pm Session Six

FireEye, Inc.

Nathan Labadie
Sales Engineer

Malware pandemic?  Sometimes getting a shot only treats the symptoms and not the cause

Global brands continue to make the headlines following security incidents that result in the installation of malware that enables exfiltration of critical data.  A broad survey of global enterprises entities reveal that in fact almost all large companies are compromised by malware to varying degrees, despite near universal use of firewalls, web proxies, and desktop and email antivirus screening.  To some extent who ends up in the headlines may be a matter of bad luck.  Still, there is a very large range in the extent of the compromise (infection rates) and obviously the more malware kept out of the network, the lower the odds of a truly bad incident.

Malware uses a range of tactics to avoid detection, but they can be broken into two over-arching categories - to be broad but highly dynamic, or very targeted and narrow.  Malware in the former category will change it's MD5, domain of origin, etc many times a day.  
In the second category falls the custom spear-phishing email attacks which continues to plague organizations.

Nathan Labadie is a System Engineer for FireEye, where he helps educate and enables the partner community protect against zero-day, targeted malware attacks. Nathan has 14 years industry experience in information technology and has focused on Information Security since 2002. Before joining FireEye, he spent his last 5 years selling and educating customers and partners on SIEM, Log Management, and NBAD at Q1 Labs, which was acquired by IBM in 2012. Nathan holds a B.S. in Psychology from Wayne State University.

>>click here for the presentation

1:15pm-1:30pm Break/Vendor Booth Time
1:30pm-2:15pm Session Seven

WatchGuard Technologies, Inc.

Bill Larsen

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

2:15pm-2:45pm Session Eight


Andy Moir

Govern the Flow of Data:
Moving from Chaos to Control

>>click here for the presentation

2:45pm-3:00pm Break/Vendor Booth Time
3:00pm-3:45pm Session Nine

Centrify Corporation

Louise Popyk
Systems Engineer

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?

Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting SaaS and mobile computing using a single, unified approach.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.
  • Learn about approaches for managing privileged user access to servers and apps.

>>click here for the presentation

  Prize Drawings For All In Attendance
3:45pm-4:30pm Session Ten

Check Point Software Technologies Ltd.

Kierk Sanderlin

Modern Day Attacks and a Silent Security Audit

In this talk we look back at 2012 and analyze some major hacks followed by a detailed  security audit report of 900 businesses.  We will discuss the similarities found and the cold hard reality that requires us to think more diligently about the tools we use today and the visibility they provide us.

Kierk Sanderlin is a Senior Security Engineering Manager at Check Point Software Technologies and has over 15 years of experience in the network and endpoint security field.  Kierk spends much of his time listening to the security challenges of today’s largest and smallest organizations across many different business verticals and has dedicated his career to security, research and innovation to meet those challenges.

>>click here for the presentation

  Prize Drawings For All In Attendance

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
Aerohive Networks, Inc.
AirWatch, LLC
Association of Information Technology Professionals
Aruba Networks, Inc.
Beyond Security
BeyondTrust Software, Inc.
Centrify Corporation
Check Point Software Technologies Ltd.
Cimcor, Inc.
F5 Networks, Inc.
FireEye, Inc.
FishNet Security, Inc.
Fortinet, Inc.
Infoblox Inc.
ISSA MotorCity Chapter
Kaspersky Lab
LANDesk Software
MCS IT - Management Communication Services, Inc.
NetClarity, Inc.
Nexum, Inc.
paloalto Networks
Project Management Institute (PMI) - Great Lakes Chapter
Protegrity Corporation
Riverbed Technology
Sequris Group, LLC
Sourcefire, Inc.
SunTel Services
Tripwire, Inc.
Varonis Systems
WatchGuard Technologies, Inc.
Websense, Inc.
Zix Corporation
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy