Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


San Diego Tech-Security Conference

Date: Thursday, April 11, 2013
Location:

Manchester Grand Hyatt San Diego
One Market Place
San Diego, CA, 92101
p: 619.232.1234

>>click here for directions

Overview

The San Diego Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Digital Scepter Corporation

John Bisaillon, CISSP
Security Architect

Fighting Modern Malware

Legacy approaches to malware defense are no longer enough to fight modern malware which are often tailored, one-of-a-kind, 0-day attacks delivered via common protocols like HTTP web browsing or FTP.  In this presentation, learn how to assess your security controls to see how they fare against modern malware and walk away with new strategies to better protect your organization from targeted attacks.

>>click here for the presentation

9:15am-9:45am Break/Vendor Booth Time
9:45am-10:15am Session Two

GTB Technologies Inc.

Uzi Yair

Data Protection from the Inside, Out & Beyond

It is not news that viruses, worms and other malicious applications are currently being utilized to transfer data across a broad variety of protocols. Cloud providers allow individuals (maybe your employees) to create powerful "private cloud" computing environments. 

These environments permit individuals to copy data from their own home or work machine to their virtual "cloud" machine with a simple "Copy & Paste" or "Drag & Drop". Such actions are mostly done utilizing the HTTPS protocol but often we see Cloud providers using Secure RDP. 

The current, aging Data Loss Prevention model, developed in large part to focus on compliance, is not adequate enough to address these issues. There are well known failures which have not only given "DLP" a bad name; these failures have brought a huge cost to organizations in time, money and most importantly, in brand tarnishment.

Join us for an educational session with a live demo, explaining HOW you can protect your most prized asset:  your data, using Next Generation DLP

>>click here for the presentation

10:15am-11:00am Session Three

AirTight Networks, Inc.

Kaustubh Phanse
Principle Wireless Architect and Chief Evangelist

Top 5 Considerations for a Secure Enterprise WLAN

Though not yet seen as a complete replacement for Ethernet, Wi-Fi is fast becoming a preferred medium of enterprise network access. The rate of adoption is only expected to grow in the coming years with continued influx of mobile devices and newer standards like 802.11ac. But, enterprises need to carefully evaluate their wireless LAN (WLAN) requirements from the perspective of Wi-Fi access (e.g., coverage, capacity, applications), management (e.g., role-based administration, policies, network monitoring), security (e.g., BYOD, wireless IDS/IPS), network architecture (e.g., single campus vs. distributed deployment, or controller-based vs. controller-less vs. cloud) and of course, budget (e.g., Capex vs. Opex), before investing into their WLAN project. Because not all enterprise WLAN solutions are created equal, and it's important to do your homework to be able to pick the right solution to meet YOUR needs.

Join AirTight Networks in this informative session to break through the marketing jargon and discuss the five key criteria you should consider to define your WLAN strategy. So as you get ready to invest into your next WLAN rollout -- whether it's a greenfield deployment, an expansion, or a replacement of old gear -- you are well prepared!

11:00am-11:30am Break/Vendor Booth Time/Lunch
11:30am-12:00pm Session Four

Varonis Systems

Kilian Englert

 

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

12:00pm-12:15pm Break/Vendor Booth Time
12:15pm-1:00pm Session Five

Blue Coat Systems.

Grant Asplund
Blue Coat Evangelist

Considerations to Protect and Speed Up Your Network

With the explosion of BYOD and the seemingly ubiquitous use of handheld devices, IT organizations are challenged to maintain security and control and mitigate the impact of the associated explosion of network traffic as a result of these devices.  These devices introduce security, control and performance issues that must be addressed.

This presentation discusses:

  • Growth/size of BYOD market and the network traffic they generate
  • Growth of IP based network traffic and the flood of video
  • BYOD challenges vs traditional laptop/desktop
  • Threat landscape – mobile threat vectors – mobile malware delivery networks
  • The need for Web and mobile Web application and operational controls
  • The need for highly granular network visibility, optimization and control of network traffic

>>click here for the presentation

1:00pm-1:30pm Session Six

Gigamon

Rich Southall

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

1:30pm-1:45pm Break/Vendor Booth Time
1:45pm-2:30pm Session Seven

WatchGuard Technologies, Inc.

Coy Thorp

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

2:30pm-3:15pm Session Eight

Bradford NetworksTom Murphy
CMO

Onboarding Personal Devices to Corporate Networks

Many IT organizations are being asked to allow personal devices onto corporate networks.  Unlike corporate-issued devices that are well-managed and under IT’s control, this new Bring-Your-Own-Device (BYOD) initiative introduces a unique set of security challenges that require a balance of flexibility, visibility, security.

This presentation will explain the concept of a “BYOD Blueprint” and lessons learned from onboarding personal devices to over 800 networks around the world.

>>click here for the presentation

3:15pm-3:30pm Break/Vendor Booth Time
3:30pm-4:15pm Session Nine

EVault, Inc.

Coulter Marshall
Territory Manager

Five Security Questions to Ask When Choosing a Cloud Provider

Increasingly, companies are moving components of their business operations to the cloud, including backup and disaster recovery. The reasons are compelling:

  • Reduced IT expenses
  • Greater efficiency
  • Greater collaboration and mobility

But news headlines are a stark reminder that not all Clouds are created equal. When evaluating a Cloud service provider to manage your critical business data, it’s important to understand how your security goals and those of the Cloud provider are aligned.

Asking five critical questions today could save you considerable headaches tomorrow. Learn what these questions are and how they can help you ensure a secure cloud solution for your organization.

>>click here for the presentation

  Prize Drawings For All In Attendance
4:15pm-4:45pm Session Ten

BeyondTrust Software, Inc.

Alejandro DaCosta
Security Engineer

On the Frontline of the Threat Landscape

Alex DaCosta will be dissecting the latest in the movement of the IT threat landscape. Practical information will be given on the latest threats organizations face and how to prevent such attacks.

With over 8 years of experience in IT security Alex will  be informing attendees about the latest IT security dangers, including zero-day vulnerabilities hype or reality, recent high-profile attacks, and how many of these can be avoided through a combination of technology solutions and pragmatic security practices.               

  Prize Drawings For All In Attendance
4:45pm-5:30pm Session Eleven

Hitachi ID Systems

 

 

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
AirTight Networks, Inc.
AirWatch, LLC
Alert Logic
Apricorn Co.
Beyond Security
BeyondTrust Software, Inc.
Bird Rock Systems
Bit9
Blue Coat Systems.
Bradford Networks
BrightPlanIT Inc.
Cenzic, Inc.
Check Point Software Technologies Ltd.
Digital Scepter Corporation
eSecurityToGo, LLC 
EVault, Inc.
FireMon
Fortinet, Inc.
Gigamon
GTB Technologies Inc.
Hitachi ID Systems
iboss Security, Inc.
IEEE
Infoblox Inc.
Invincea, Inc.
ISD Security, LLC
 Ixia NVS
Kaspersky Lab
MetaFlows Inc
NetClarity, Inc.
NetSPI Inc.
NIKSUN Incorporated
© Norman AS
Novacoast
paloalto Networks
SafeNet
SecureAuth
Security On Demand™
Talariax
Sims Recycling Solutions
Sophos PLC
STC San Diego Chapter
Varonis Systems
WatchGuard Technologies, Inc.
Wave Systems Corp.
WILDPACKETS, INC
Wontok Enterprises
   Copyright © 2009-2013. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy