What We Do
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013

Philadelphia Tech-Security Conference

Date: Thursday, May 30, 2013

Hilton Philadelphia City Avenue
4200 City Avenue
Philadelphia, PA 19131
p: 215.879.4000

>>click here for directions


The Philadelphia Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One


Aaron Cote
Regional Sales Director
East Coast

Accuvant, Inc.

Trust-based Security: A Proactive Approach that Puts You in Control

In 2012 we’ve seen an unprecedented rise in targeted cyber attacks and an acceleration of the loss of core IP.  While state sponsored attacks and cyber espionage have been occurring for decades, the level of disclosure and visibility of these attacks is rising to new levels. We are witnessing the greatest theft of intellectual property in history. Industry analysts state traditional Anti-virus security does not work and is “fighting a losing battle”. A trust-based approach is the most effective way to stop advanced threats and malware

In this session, attendees will receive an in-depth review of the importance of a trust-based security solution.

9:15am-10:00am Break/Vendor Booth Time
10:00am-10:30am Session Two

Trend Micro Incorporated

Matt Hubbard
Sr. Regional Product Manager

Securing Your Physical, Virtual, Cloud Infrastructure

Protect confidential data, ensure compliance and prevent costly damage, without hindering productivity. Join Trend Micro and learn how to secure your data at rest or in motion; accessible on servers, desktops, laptops, tablets, smartphones and even removable media. Let Trend empower you to prevent unauthorized access and data breeches throughout your enterprise, regardless of whether your infrastructure is physical, virtual or in the cloud.

>>click here for presentation

10:30am-11:00am Session Three


Jack Shea

Need for a New Approach

As the networking landscape changes with emerging technologies like virtualization, cloud computing, mobility and big data, organizations are looking to traffic visibility as an essential component in managing, analyzing and securing their networks. However legacy approaches offer limited traffic visibility with limited filtering capabilities; are difficult and costly to scale and manage; and often require change orders or network downtime in order to adapt to the evolving network. The Enterprise Strategy Group Report highlights a variety of drivers that both identify the shortcomings of current alternatives and substantiate the need for a new approach.

11:00am-11:30am Break/Vendor Booth Time/Lunch
11:30am-12:00pm Session Four


Stephen Gates

Key Steps of Protection for a First Line of Defense - Defending Against DDoS Attacks and Unwanted Traffic

With the number of successful attacks on the rise, it is evident that firewalls, intrusion prevention systems, and traditional security infrastructures are not equipped to combat them.  These technologies were not built to stop DDoS attacks, undesirable behaviors, advanced evasion attacks and other unwanted malicious traffic targeting your infrastructure.

Corero Network Security, an organization’s First Line of Defense, is the leading provider of Distributed Denial of Service (DDoS) defense.

12:00am-12:15pm Break/Vendor Booth Time
12:15pm-12:45pm Session Five


Jay Runkel
Senior Sales Engineer

Secure Cloud and BYOD Strategies: Managing Trust and Encryption

Using the cloud and allowing for BYOD means losing some control. Digital certificates, SSH authentication and encryption keys restore control, right? Unfortunately, these security mechanisms—which have become foundational in every enterprise for establishing trust and connectivity—have become ticking time bombs in many cloud and mobility initiatives. Simple errors and malicious attacks have turned these assets into operational, compliance and security liabilities.  Learn how to identify these risks and build best-practice cloud and BYOD architectures to keep your enterprise safe.

>>click here for the presentation

12:45pm-1:30pm Session Six

WatchGuard Technologies, Inc.

Brian Leedy

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

1:30pm-2:15pm Session Seven

Bradford Networks

Matt Noon

Onboarding Personal Devices to Corporate Networks

Many IT organizations are being asked to allow personal devices onto corporate networks.  Unlike corporate-issued devices that are well-managed and under IT’s control, this new Bring-Your-Own-Device (BYOD) initiative introduces a unique set of security challenges that require a balance of flexibility, visibility, security.

This presentation will explain the concept of a “BYOD Blueprint” and lessons learned from onboarding personal devices to over 800 networks around the world.

2:15pm-2:30pm Break/Vendor Booth Time
2:30pm-3:15pm Session Eight



Symantec Corporation

Jonathan Poon

Mobility is not about the device; it’s about the data!

Businesses have begun to leverage the explosion in mobile devices to improve business functions through targeted mobile applications. With this new platform, IT has been challenged to secure the devices as well as the data that resides on them. Mobile device management(MDM) solutions have proliferated as a direct result of this need and many successful solutions exist in the market place. These products do a great job of securing the device and the data at rest, but do nothing to control the flow of data to the application.  

In this presentation, you will learn about the four aspects of a secure mobile infrastructure:

  • Device Security – a Mobile Device Management (MDM) solution to manage provisioning and base device security.
  • Mobile Application Management – to secure application access and data on the mobile device.
  • Mobile Data Access Management – a central control point to safely expose data to custom mobile applications
  • Application Authentication and Authorization – centralized authentication provided by an authentication gateway

>>click here for the presentation

3:15pm-4:00pm Session Nine

Cyber-Ark Software, Ltd.

Barak Feldman

Secure, Manage and Control Privileged Accounts

Identity Management Tools, such as Single Sign-On and Directories are examples of important building blocks in any organization's Identity Management infrastructure. However, these tools are only geared towards individual users. An additional solution for privileged users should be deployed to complement the Identity Management Infrastructure.

This presentation will focus on best practices in:

  • Frequent and automatic password changes of shared privileged accounts
  • Automatically detecting and managing Service accounts
  • Privileged Session recording and management
  • Strong auditing of privileged passwords usage to ensure accountability
  • Secured long term storage and automatic failover to eliminate risks of loss and to ensure availability during disaster recovery
  • Removing clear text passwords embedded in scripts, and automatically changing them according to corporate policy
4:00pm-4:45pm Session Ten

Invincea, Inc.

Ken Kreitzer
Director of Sales

Stop Spear-Phishing and Watering Hole Attacks - Put the User in a Bubble

Your employees are the primary target of attack by a variety of adversaries bent on doing your organization harm. This is a fact that simply cannot be challenged based on the last 24-36 months’ worth of breach disclosures. Spear-phishing and watering hole attacks have been at the root of virtually every major attack disclosed during this time - whether the RSA breach, the campaign disclosed by Kaspersky labeled "Red October," the "Nitro" attacks, attacks against the energy sector, The New York Times, The Washington Post, The Wall Street Journal, The White House, Facebook, Apple, etc, etc, etc.

We've got a user problem on our hands that we need to rapidly solve. We're currently losing the battle to our adversaries because the endpoint has become the new perimeter and our endpoint defenses are largely antiquated.

However, innovation is here that you must take a look at...come hear why the NSA recently won a SANS National Security Award for its work with Invincea in combatting APTs and user-targeted attacks.

Join Steve Ward and Ken Kreitzer of Invincea for an informative discussion that will cover:

  • Recent examples of user targeted attacks and thoughts on why they've succeeded
  • How advances in virtualization enable the creation of segregated environments for your users to run highly targeted applications such as the web browser, PDF reader,
    Office suite, etc.
  • How behavioral based malware detection is being used in these segregated environments to spot and kill zero-days - including the recently announced Java 7 exploit
  • Methods for turning thwarted attacks into rich forensic information that can feed your entire infrastructure and extend its usefulness

>>click here for the presentation

  Prize Drawings For All In Attendance
4:45pm-5:30pm Session Eleven

paloalto Networks

Bill Swartz
Systems Engineer

Breaking the Lifecycle of the Modern Threat

Enterprise security teams are facing attackers that are highly targeted, motivated and skilled at hiding in the blind spots of traditional security measures. In order to adapt, enterprises must address the fundamental, underlying problems and build a modern approach to security where full visibility, context and prevention of both known and unknown threats is built in to the foundation of the network. In this presentation we will look at examples of real-world threats, how they work, and how they can be controlled throughout the entire lifecycle of an attack.

  Prize Drawings For All In Attendance

Event Sponsors/Exhibitors

A10 Networks, Inc.
AccessIT Group, Inc.
Accuvant, Inc.
Aerohive Networks, Inc.
AirTight Networks, Inc.
AirWatch, LLC
AITP Philadelphia Chapter
Alert Logic
ArcMail Technology
Atrion Communications Resources
BeyondTrust Software, Inc.
Bradford Networks
BrightPlanIT Inc.
Check Point Software Technologies Ltd.
Cyber-Ark Software, Ltd.
EVault, Inc.
Fortinet, Inc.
iboss Security, Inc.
Infoblox Inc.
Invincea, Inc.
 Ixia NVS
Kaspersky Lab
LANDesk Software
MCS IT - Management Communication Services, Inc.
NetClarity, Inc.
© Norman AS
paloalto Networks
Patriot Technologies, Inc.
PhillyCom Inc.
Plan B Technologies, Inc.
SAINT Corporation
Sims Metal Management Limited
Sun Management
Symantec Corporation
Trend Micro Incorporated
Varonis Systems
WatchGuard Technologies, Inc.
Wave Systems Corp.
Websense, Inc.
Zix Corporation
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy