Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Columbus Tech-Security Conference

Date: Thursday, May 23, 2013
Location:

Quest Conference Centers
8405 Pulsar Place
Columbus, Ohio 43240
p: 614.540.5540 / 800.909.7665

>> click here for directions

Overview

The Columbus Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Aerohive Networks, Inc.

Matt Hanna
Regional Systems Engineer

 

Transforming Your Network into a Platform for Mobility

The modern “mobile-first” enterprise network requires a mobility-optimized approach that is not simply dependent on network access for policy enforcement and control. Contextual elements, such as user identity, device type, application, location, and time of day are the primary building blocks used to create granular policies that dictate how, when, and what the user can access. In this session, we’ll assess the mobility-optimized approach which tightly integrates systems and adds contextual intelligence to create sophisticated “user centric” policies that reduce the complexities of a highly mobile user base. This will provide a vision for how optimizing for mobility can transform your network into a platform for mobility; a platform able to add business value, reduce operational cost and regain control of your network.

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:30am Session Two

Bit9

Patrick Kenny

FishNet Security, Inc.

Trust-based Security: A Proactive Approach that Puts You in Control

In 2012 we’ve seen an unprecedented rise in targeted cyber attacks and an acceleration of the loss of core IP.  While state sponsored attacks and cyber espionage have been occurring for decades, the level of disclosure and visibility of these attacks is rising to new levels. We are witnessing the greatest theft of intellectual property in history. Industry analysts state traditional Anti-virus security does not work and is “fighting a losing battle”. A trust-based approach is the most effective way to stop advanced threats and malware

In this session, attendees will receive an in-depth review of the importance of a trust-based security solution.

10:30am-11:00am Session Three

Gigamon

Marc Holden

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

11:00am-11:30am Break/Vendor Booth Time/Lunch
11:30am-12:15pm Session Four

WatchGuard Technologies, Inc.

Brian Leedy

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

12:15pm-12:30pm Break/Vendor Booth Time
12:30pm-1:15pm Session Five

Centrify Corporation

Robertson Pimentel
Senior Systems Engineer

 

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?

Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting SaaS and mobile computing using a single, unified approach.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.
  • Learn about approaches for managing privileged user access to servers and apps.

>>click here for the presentation

1:15pm-2:00pm Session Six

Check Point Software Technologies Ltd.

Justin Sowder

Modern Day Attacks and a Silent Security Audit

In this talk we look back at 2012 and analyze some major hacks followed by a detailed  security audit report of 900 businesses.  We will discuss the similarities found and the cold hard reality that requires us to think more diligently about the tools we use today and the visibility they provide us.

Justin has worked in the security field for the past 10 years as an administrator and consultant in industries locally and globally. Currently working as a Security Engineer for Check Point Software Technologies, he now focuses on security needs for financial and medical partners along with critical infrastructure for the US.

>>click here for the presentation

2:00pm-2:15pm Break/Vendor Booth Time
2:15pm-3:00pm Session Seven

Invincea, Inc.

Ken Kreitzer

Stop Spear-Phishing and Watering Hole Attacks - Put the User in a Bubble

Your employees are the primary target of attack by a variety of adversaries bent on doing your organization harm. This is a fact that simply cannot be challenged based on the last 24-36 months’ worth of breach disclosures. Spear-phishing and watering hole attacks have been at the root of virtually every major attack disclosed during this time - whether the RSA breach, the campaign disclosed by Kaspersky labeled "Red October," the "Nitro" attacks, attacks against the energy sector, The New York Times, The Washington Post, The Wall Street Journal, The White House, Facebook, Apple, etc, etc, etc.

We've got a user problem on our hands that we need to rapidly solve. We're currently losing the battle to our adversaries because the endpoint has become the new perimeter and our endpoint defenses are largely antiquated.

However, innovation is here that you must take a look at...come hear why the NSA recently won a SANS National Security Award for its work with Invincea in combatting APTs and user-targeted attacks.

Join Ken Kreitzer of Invincea for an informative discussion that will cover:

  • Recent examples of user targeted attacks and thoughts on why they've succeeded
  • How advances in virtualization enable the creation of segregated environments for your users to run highly targeted applications such as the web browser, PDF reader,
    Office suite, etc.
  • How behavioral based malware detection is being used in these segregated environments to spot and kill zero-days - including the recently announced Java 7 exploit
  • Methods for turning thwarted attacks into rich forensic information that can feed your entire infrastructure and extend its usefulness

>>click here for the presentation

3:00pm-3:15pm Break/Vendor Booth Time
3:15pm-4:00pm Session Eight

paloalto Networks

Sean Mullins

Practical strategies to safeguard your network

According to Gartner the enterprise network firewall market is undergoing a period of dynamic evolution, as effective next-generation firewalls are now increasingly necessary. There is a new generation of Internet applications that traditional firewalls cannot see. They play host to various malware and find creative ways to penetrate your firewall by disguising themselves, hiding in SSL tunnels, and targeting multiple ports to find entry points. Gone are the days of lone, brute force attackers out to steal credit cards. The new breed of predators on your infrastructures and applications are highly organized, evasive, and patient. Regain control of these apps before they take control of your business! Join Palo Alto Networks in this session where you'll learn practical strategies to safeguard your network.

  Prize Drawings For All In Attendance
4:00pm-4:30pm Session Nine

SecureAuth

Timothy Arvanites
Senior Sales Engineer

Cloud Security:  How to Securely Move to the Cloud

Timothy Arvanites is the Senior Sales Engineer for SecureAuth Corporation. His primary focus is the management of technical relationships with customers in the Midwest and architecting and deploying new authentication and federation methods into gateway and web applications, specializing in Microsoft technologies. He graduated from the University of Illinois with a Bachelor of Science in Engineering and was the managing partner of two information technology consulting companies prior to joining SecureAuth.  He has been Microsoft Certified as a Systems Engineer for more than 15 years and has been architecting enterprise level solutions for over a decade.

  Prize Drawings For All In Attendance
4:30pm-5:15pm Session Ten

SEEBURGER, Inc.

Brian Jolley

Preventing Data Breach Disasters from Insiders

Hackers may be grabbing the headlines, but insiders remain the biggest source of data breaches. And the consumer-ization of file-sharing/-synching isn’t helping.  In this session, you’ll learn how to modernize your corporate file-sharing infrastructure to protect against today’s biggest threat.

Understand the Silent Enemy: employees and partners. How they’re outflanking data security policies

  • What kinds of data are most at risk
  • What this means for compliance

Identify and plug the gaps

  • FTP software
  • Network shares
  • Email
  • Storage devices
  • Consumer tools

Create a 360-degree solution for secure end-to-end file transfer

  • Use data intelligence and analytics to gain actionable INTEL
  • Defend data through access-inspect-dispose-kill policies
  • Deploy centralized, highly automated managed file transfer
  • Make it as convenient and easy to use as users’ current tools
  • Integrate with key applications (SAP, ERP)

Don’t forget system-to-system and system-to-human transfers

>>click here for the presentation

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Aerohive Networks, Inc.
AirTight Networks, Inc.
AirWatch, LLC
Alert Logic
Beyond Security
Bit9
Blue Door Networks, LLC
CentraComm
Centrify Corporation
Check Point Software Technologies Ltd.
Exinda
FishNet Security, Inc.
Gigamon
Hurricane Labs, LLC
Infoblox Inc.
Invincea, Inc.
Kaspersky Lab
LANDesk Software
MCS IT - Management Communication Services, Inc.
NetClarity, Inc.
NetIQ Corporation
paloalto Networks
Protegrity Corporation
Riverbed Technology
SecureAuth
SEEBURGER, Inc.
Solera Networks Inc.
http://www.solutionary.com/
Talari Networks
Tenable Network Security
Tripwire, Inc.
Varonis Systems
WatchGuard Technologies, Inc.
Wave Systems Corp.
Websense, Inc.
WILDPACKETS, INC
Zix Corporation
   Copyright © 2009-2013. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy