Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Vancouver Tech-Security Conference

Date: Thursday, April 25, 2013
Location:

Renaissance Vancouver Harbourside Hotel
1133 West Hastings Street
Vancouver, BC V6E3T3 Canada
p: 604.689.9211

>>Click here for directions

Overview

The Vancouver Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Conexsys

Bob Reny
Sr. System Engineer

Do you know NAC?

 

 

 

 

 

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:30am Session Two

 

Silver Peak Systems, Inc.

Colm Foley
Channel Sales Manager

The Next Generation of Data Acceleration

Silver Peak software accelerates data between data centers, branch offices and the cloud.  The company’s software-defined acceleration solves network quality, capacity and distance challenges to provide fast and reliable access to data anywhere in the world.  Leveraging its leadership in data center class wide area network (WAN) optimization, Silver Peak is a key enabler for strategic IT projects like virtualization, disaster recovery and cloud computing.

>>click here for the presentation

10:30am-11:00am Session Three

Entrust

Steve Croucher

Mobile For Strong Authentication -Turning the Mobile Device Evolution in Your Favor

Mobile devices are everywhere.  While many organizations are focused on mobile device management, a growing number of them are realizing other strategic uses for these mobile devices. Whether corporate owned, or BYOD a growing number of organizations are utilizing mobile devices to replace and enhance legacy authentication technologies. Mobile devices are powerful identity tools that can enhance and replace authenticators such as: OTP tokens, smart cards, and user names/passwords. In this presentation Entrust will discuss the mobile landscape, threats and some new innovative ways users can easily, and strongly authenticate to physical/logical systems.

>>click here for the presentation

11:00am-11:30am Break/Vendor Booth Time/Lunch
11:30am-12:00pm Session Four

Varonis Systems

Scott Truchot

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

12:00pm-12:15pm Break/Vendor Booth Time
12:15pm-1:00pm Session Five

Blue Coat Systems.

Grant Asplund
Blue Coat Evangelist

Considerations to Protect and Speed Up Your Network

With the explosion of BYOD and the seemingly ubiquitous use of handheld devices, IT organizations are challenged to maintain security and control and mitigate the impact of the associated explosion of network traffic as a result of these devices.  These devices introduce security, control and performance issues that must be addressed.

This presentation discusses:

  • Growth/size of BYOD market and the network traffic they generate
  • Growth of IP based network traffic and the flood of video
  • BYOD challenges vs traditional laptop/desktop
  • Threat landscape – mobile threat vectors – mobile malware delivery networks
  • The need for Web and mobile Web application and operational controls
  • The need for highly granular network visibility, optimization and control of network traffic

>>click here for the presentation

1:00pm-1:30pm Session Six

Gigamon

Craig Workman

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

1:30pm-1:45pm Break/Vendor Booth Time
1:45pm-2:30pm Session Seven

Invincea, Inc.

PJ Bihuniak
Director of Sales

Fight back against Java exploits and Spear-Phishing

Your adversaries have figured out that the quickest way into your network is through your users and a new favorite exploit pathway is through Java. Java is proving itself to be an absolute security mess but you can't just uninstall it - the bad guys are using this to their advantage as is evidenced by the wave of recent 0days found in the wild. Using Java based exploits among a big bag of other tricks, our adversaries are hitting our users on a daily basis. Spear-phishing using malicious links or weaponized document attachments; watering-hole attacks using hijacked legitimate sites; poisoned search engine results and social networking worms; and scare ware tactics are all on the rise. Training your users is not an effective solution to this problem. Join us for an educational discussion and learn how you can turn the tide against user directed threats.

In this session, we will discuss:
Real-world case studies of Java exploits in the wild, spear-phishing and watering hole attacks.
The emergence of virtualized environments for the browser, PDF reader and complete document suite that can detect zero-days without signatures, thwart attacks in progress and feed pre-crime forensic information to the broader security infrastructure.
The differing motives of adversaries and how they are targeting your users and duping them into becoming the unwitting accomplices to breach.

>>click here for the presentation

2:30pm-3:15pm Session Eight

paloalto Networks

Geoff Shukin

Practical strategies to safeguard your network

According to Gartner the enterprise network firewall market is undergoing a period of dynamic evolution, as effective next-generation firewalls are now increasingly necessary. There is a new generation of Internet applications that traditional firewalls cannot see. They play host to various malware and find creative ways to penetrate your firewall by disguising themselves, hiding in SSL tunnels, and targeting multiple ports to find entry points. Gone are the days of lone, brute force attackers out to steal credit cards. The new breed of predators on your infrastructures and applications are highly organized, evasive, and patient. Regain control of these apps before they take control of your business! Join Palo Alto Networks in this session where you'll learn practical strategies to safeguard your network.

3:15pm-3:30pm Break/Vendor Booth Time
3:30pm-4:15pm Session Nine

IBM

Stewart Cawthray
Chief Security Architect
IBM Global Technology

IBM X-Force Trend and Risk Report Briefing

IBM Security experts will provide a executive debrief on the latest IBM X-Force Trend and Risk Report.  In this session we will dive into the findings of our latest Trend and Risk report,  impacts to organizations, explore options to protect against threats, and share information the latest security strategies and solutions.

 

>>click here for the presentation

  Prize Drawings For All In Attendance
4:15pm-5:00pm Session Ten

Hitachi ID Systems


  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accunet Solutions
Aerohive Networks, Inc.
AirWatch, LLC
BeyondTrust Software, Inc.
Blue Coat Systems.
Centrify Corporation
Conexsys
Core Security Technologies
Entrust
Exinda
FireEye, Inc.
FireMon
Fortinet, Inc.
Gigamon
Hitachi ID Systems
IBM
Invincea, Inc.
IPS - Security
ISACA Vancouver
 Ixia NVS
LANDesk Software
LogRhythm
MediaPro, Inc.
Opus Consulting Group
paloalto Networks
SecureAuth
Secure Links
Silver Peak Systems, Inc.
Solantus Inc.
Sourcefire, Inc.
Tenable Network Security
Varonis Systems
Vcura Incorporated
   Copyright © 2009-2013. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy