Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Baltimore Tech-Security Conference

Date: Thursday, May 9, 2013
Location:

Hilton Baltimore
401 West Pratt Street
Baltimore, Maryland, 21201
p: 443.573.8700

>>click here for directions

Overview

The Baltimore Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Aerohive Networks, Inc.

Ben McDonald
System Engineer

Transforming Your Network into a Platform for Mobility

The modern “mobile-first” enterprise network requires a mobility-optimized approach that is not simply dependent on network access for policy enforcement and control. Contextual elements, such as user identity, device type, application, location, and time of day are the primary building blocks used to create granular policies that dictate how, when, and what the user can access. In this session, we’ll assess the mobility-optimized approach which tightly integrates systems and adds contextual intelligence to create sophisticated “user centric” policies that reduce the complexities of a highly mobile user base. This will provide a vision for how optimizing for mobility can transform your network into a platform for mobility; a platform able to add business value, reduce operational cost and regain control of your network.

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:30am Session Two

Bit9

Ebbonie Kirk

Accuvant, Inc.

Trust-based Security: A Proactive Approach that Puts You in Control

Enterprises worldwide are being hit hard by targeted cyberattacks that easily bypass antivirus and other traditional security solutions. In this session, attendees will learn why a trust-based security approach that only allows software you trust to execute in your environment is your best defense against advanced threats and malware.

 

 

10:30am-11:00am Session Three

Varonis Systems

Michael Hartman
Systems Engineer
Mid-Atlantic region

Eliminating Data Security Threats

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

Michael Hartman brings over 10 years experience in the IT industry and has served in technical roles for companies such as General Electric, NBC, and 20th Century Fox.  In his most recent position at Varonis, Hartman helps organizations gain total visibility and control over their data, ensuring that only the right users have access to the right data at all times from all devices, all use is monitored, and abuse is flagged.

>>click here for the presentation

11:00am-11:30am Break/Vendor Booth Time/Lunch
11:30am-12:00pm Session Four

Trend Micro Incorporated

Dan Reis
Director, Regional Product Marketing

 

Securing Your Physical, Virtual, Cloud Infrastructure

Protect confidential data, ensure compliance and prevent costly damage, without hindering productivity. Join Trend Micro and learn how to secure your data at rest or in motion; accessible on servers, desktops, laptops, tablets, smartphones and even removable media. Let Trend empower you to prevent unauthorized access and data breeches throughout your enterprise, regardless of whether your infrastructure is physical, virtual or in the cloud.

>>click here for the presentation

12:00pm-12:15pm Break/Vendor Booth Time
12:15pm-12:45pm Session Five

Gigamon

Steve Costolo

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

12:45pm-1:15pm Session Six

FireEye, Inc.

Charles Wilkerson
Sr. Security Engineer

GuidePoint Security

Next Generation Threat Protection

The new generation of threats has exposed the need for next-generation protection against advanced threats. Over 95% of companies already have compromised systems within their networks. Why? Advanced malware has eroded the effectiveness of traditional defenses, leaving a hole in the network. Designed to use signatures to block known threats, traditional, and next-generation firewalls, IPS, AV, and gateways do nothing when zero-day, targeted APT malware attacks.

To fill this gap in network defenses, a new generation of security protections has emerged, ready to do battle against advanced malware, zero-day, and targeted APT attacks. These next-generation security systems must plug the hole left by firewalls, IPS, AV, and Web gateways by applying advanced, coordinated techniques to identify, confirm and block the activities of next-generation threats.

>>click here for the presentation

1:15pm-1:30pm Break/Vendor Booth Time
1:30pm-2:15pm Session Seven

Cyber-Ark Software, Ltd.

Kevin Corbett

Analyzing the DNA of Privileged Accounts and Their Connection to Advanced Threats

Cyber-Ark® Software is a global information security company that specializes in protecting and managing privileged users, sessions, applications and sensitive information to improve compliance, productivity and protect organizations against insider threats and advanced external threats. With its award-winning Privileged Identity Management, Privileged Session Management and Sensitive Information Management Suites, organizations can more effectively manage and govern data center access and activities, whether on-premise, off-premise or in the cloud, while demonstrating returns on security investments. Cyber-Ark works with more than 1,300 customers, including more than 40 percent of the Fortune 100. Headquartered in Newton, Mass., Cyber-Ark has offices and authorized partners in North America, Europe and Asia Pacific. For more information, please visit www.cyber-ark.com.
2:15pm-2:45pm Session Eight

WatchGuard Technologies, Inc.

Brian Leedy

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

2:45pm-3:00pm Break/Vendor Booth Time
3:00pm-3:45pm Session Seven

Click Security

Neal Hartsell
VP of Marketing

Real-time Security Analytics: Visibility, Alerting or Forensic Digging - Which is it?

Global cybercrime is now a $388 billion business.  It only takes minutes for hackers to breach your network and exfiltrate valuable assets.  But, it takes weeks to months to figure out it even happened.  Signature products are easily bypassed.  Other point security products aren't able to piece together multistage attacks.  Log management and forensics tools are rearview mirrors at best.  The attack surface, hacker automation, and overwhelmed security personnel are creating the perfect opportunity for your company to make the wrong headlines.  It’s time for a new approach.

Security Analytics is an emerging market focused on finding, contextualizing and automating action around the hard to find activity that leaves breadcrumbs of dangerous activity in the massive volume of data companies are collecting.  Click Security is focused on Real-time Security Analytics -  the real-time conversion of data into actionable intelligence that helps organizations address a broad range of security needs associated with BYOD, IP Theft, Consumerization of IT, APT's and more.

In this session we will address the following questions:

1. What is a security analytic anyway?
2. Who on my staff would actually use this product?
3. What problems does it actually solve?
4. Does it replace products like Log Management systems and SIEMs?

>>click here for the presentation

3:45pm-4:30pm Session Eight

paloalto Networks

Daniel Kieng
System Engineer

Using The Next Generation Firewall for Detection and Control of Modern Malware

Modern malware is at the heart of many of the most sophisticated IT security breaches the industry has ever seen. Malware has evolved to become some of the most highly evasive, adaptable and resilient networked applications in the world, and often act as the platform for attackers to launch and control increasingly sophisticated attacks. Join us as we dive into the world of modern malware to see what is real, what is hype and what things we need to be doing as an industry and as individual security practitioners to protect our users and networks.

  Prize Drawings For All In Attendance
4:30pm-5:15pm Session Nine

Anchor Technologies, Inc.

RSA, The Security Division of EMC Corporation

Steven Van Ormer

The Future of the Advanced SOC

In today's world of advanced threats and complex compliance issues it's no longer feasible for an organization to resist every attack or manage security based on compliance pressures. There are no more castle walls to keep back the horde.  A more realistic goal is for security operations teams to be fluid, reacting quickly to determine how an attack happened, reduce the 'attacker free time', and put measures in place to prevent similar future attacks. All while automating the proof of compliance process. In this presentation, we will discuss how organizations can manage risk more efficiently and secure trust in IT through comprehensive visibility, actionable intelligence, and advanced security analytics for fast detection and investigation.

>>click here for the presentation

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
Aerohive Networks, Inc.
AirWatch, LLC
Anchor Technologies, Inc.
Aveksa
BeyondTrust Software, Inc.
Bit9
Blue Door Networks, LLC
BrightPlanIT Inc.
Celestix Networks, Inc.
Click Security
Cyber-Ark Software, Ltd.
DAMA-NCR
Event Tracker
Exinda
FireEye, Inc.
FireMon
FishNet Security, Inc.
Gigamon
GuidePoint Security
iboss Security, Inc.
 iNETWORKS Group, Inc.
Infoblox Inc.
Kaspersky Lab
LANDesk Software
LogRhythm
westoninfosec.com
NetClarity, Inc.
Network Critical Solutions Limited
© Norman AS
paloalto Networks
Patriot Technologies, Inc.
RedSeal Networks, Inc.
RSA, The Security Division of EMC Corporation
SecureAuth
Sims Recycling Solutions
http://www.solutionary.com/
Stratum Security 2012
Trend Micro Incorporated
Tripwire, Inc.
Varonis Systems
 Viper Network Systems, LLC.
WatchGuard Technologies, Inc.
Wave Systems Corp.
Websense, Inc.
WILDPACKETS, INC
   Copyright © 2009-2013. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy