Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Toronto Tech-Security Conference

Date: Thursday, May 16, 2013
Location:

Sheraton Toronto Airport Hotel & Conference Centre
801 Dixon Road
Toronto, Ontario M9W 1J5
p: 416.675.6100

>>click here for directions

Overview

The Toronto Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors

Data Connectors is proud to host the Tech-Security Strategies Conference.

 

8:45am-9:15am Session One

Fixmo Inc.

Tyler Lessard

Embracing BYOD Without Compromising Security or Compliance

Embracing iPads, mobile apps or BYOD and trying to figure out how to manage security and compliance without controlling the entire device? IT organizations must start to look beyond traditional device management technologies to ensure private corporate applications and data remain protected, uncompromised and within compliance guidelines – no matter who owns the device. This session will explore emerging mobile technologies such as Secure Containerization and Application Management as a means to addressing security and compliance in the next era of enterprise mobility and BYOD, and will present an emerging methodology for containing and managing corporate data on employee-owned devices.

>>click here for the presentation

9:15am-9:45am Break/Vendor Booth Time
9:45am-10:30am Session Two

Conexsys

Toni Buhrke, MBA, CIISP
Sr. Security Solutions Architect

Addressing the BYOD Challenge

 

 

>>click here for the presentation

10:30am-11:00am Session Three

Silver Peak Systems, Inc.

Katie Tracy
Channel Sales Manager

The Next Generation of Data Acceleration

Silver Peak software accelerates data between data centers, branch offices and the cloud.  The company’s software-defined acceleration solves network quality, capacity and distance challenges to provide fast and reliable access to data anywhere in the world.  Leveraging its leadership in data center class wide area network (WAN) optimization, Silver Peak is a key enabler for strategic IT projects like virtualization, disaster recovery and cloud computing.

>>click here for the presentation

11:00am-11:30am Break/Vendor Booth Time/Lunch
11:30am-12:00pm Session Four

Bit9

Francis Legault

Accuvant, Inc.

Trust-based Security: A Proactive Approach that Puts You in Control

In 2012 we’ve seen an unprecedented rise in targeted cyber attacks and an acceleration of the loss of core IP.  While state sponsored attacks and cyber espionage have been occurring for decades, the level of disclosure and visibility of these attacks is rising to new levels. We are witnessing the greatest theft of intellectual property in history. Industry analysts state traditional Anti-virus security does not work and is “fighting a losing battle”. A trust-based approach is the most effective way to stop advanced threats and malware

In this session, attendees will receive an in-depth review of the importance of a trust-based security solution.

12:00pm-12:15pm Break/Vendor Booth Time
12:15pm-12:45pm Session Five

Entrust

James Ford

Mobile For Strong Authentication -Turning the Mobile Device Evolution in Your Favor

Mobile devices are everywhere.  While many organizations are focused on mobile device management, a growing number of them are realizing other strategic uses for these mobile devices. Whether corporate owned, or BYOD a growing number of organizations are utilizing mobile devices to replace and enhance legacy authentication technologies. Mobile devices are powerful identity tools that can enhance and replace authenticators such as: OTP tokens, smart cards, and user names/passwords. In this presentation Entrust will discuss the mobile landscape, threats and some new innovative ways users can easily, and strongly authenticate to physical/logical systems.

>>click here for the presentation

12:45pm-1:15pm Session Six

Varonis Systems

Vitaly Levin

 

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

1:15pm-1:30pm Break/Vendor Booth Time
1:30pm-2:00pm Session Seven

Gigamon

Jason Brydges

Riverbed Technology

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

 

2:00pm-2:30pm Session Eight

VENAFI

Elie Nasrallah
Senior Sales Engineer

Secure Cloud and BYOD Strategies: Managing Trust and Encryption

Using the cloud and allowing for BYOD means losing some control. Digital certificates, SSH authentication and encryption keys restore control, right? Unfortunately, these security mechanisms—which have become foundational in every enterprise for establishing trust and connectivity—have become ticking time bombs in many cloud and mobility initiatives. Simple errors and malicious attacks have turned these assets into operational, compliance and security liabilities.  Learn how to identify these risks and build best-practice cloud and BYOD architectures to keep your enterprise safe.

2:30-2:45pm Break/Vendor Booth Time
2:45pm-3:15pm Session Nine

FireEye, Inc.

Jason Dookwah

“Malware pandemic? Sometimes getting a shot only treats the symptoms and not the cause”...

Global brands continue to make the headlines following security incidents that result in the installation of malware that enables exfiltration of critical data. A broad survey of global enterprises entities reveal that in fact almost all large companies are compromised by malware to varying degrees, despite near universal use of firewalls, web proxies, and desktop and email antivirus screening. To some extent who ends up in the headlines may be a matter of bad luck. Still, there is a very large range in the extent of the compromise (infection rates) and obviously the more malware kept out of the network, the lower the odds of a truly bad incident.

Malware uses a range of tactics to avoid detection, but they can be broken into two over-arching categories - to be broad but highly dynamic, or very targeted and narrow. Malware in the former category will change it's MD5, domain of origin, etc many times a day.
In the second category falls the custom spear-phishing email attacks which continues to plague organizations.

>>click here for the presentation

3:15pm-4:00pm Session Ten

Bradford Networks

Michael Killoran
VP of Sales

Onboarding Personal Devices to Corporate Networks

Many IT organizations are being asked to allow personal devices onto corporate networks.  Unlike corporate-issued devices that are well-managed and under IT’s control, this new Bring-Your-Own-Device (BYOD) initiative introduces a unique set of security challenges that require a balance of flexibility, visibility, security.

This presentation will explain the concept of a “BYOD Blueprint” and lessons learned from onboarding personal devices to over 800 networks around the world.

>>click here for the presentation

4:00pm-4:30pm Session Eleven

Axway

Steve Jordan

Govern the Flow of Data:
Moving from Chaos to Control


>>click here for the presentation

4:30pm-5:15pm Session Twelve

Centrify Corporation

Brian Durkin
Senior Systems Engineer

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?

Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting SaaS and mobile computing using a single, unified approach.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.
  • Learn about approaches for managing privileged user access to servers and apps.

>>click here for the presentation

Event Sponsors/Exhibitors

Accuvant, Inc.
Aerohive Networks, Inc.
AirWatch, LLC
Axway
BeyondTrust Software, Inc.
Bit9
Blue Coat Systems.
Bradford Networks
Centrify Corporation
Conexsys
Entrust
ESET, LLC
Expert Systems Resources
Exinda
FireEye, Inc.
FireMon
Fixmo Inc.
Fortinet, Inc.
Fox Technologies
Gigamon
 Ixia NVS
Kaspersky Lab
LogRhythm
Network Critical Solutions Limited
© Norman AS
Protegrity Corporation
Riverbed Technology
SecureAuth
Secure Links
Silver Peak Systems, Inc.
Solantus Inc.
Sophos PLC
Tegile Systems, Inc.
Varonis Systems
 Veeam® Software
VENAFI
Wave Systems Corp.
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy