Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Calgary Tech-Security Conference

Date: Thursday, June 13, 2013
Location:

Commonwealth Hall & Conference Centre
Unit 1177- 3961 52 Ave NE
Calgary, Alberta T3J 0J7
p: 403.338.2100

>>click here for directions

Overview

The Calgary Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Conexsys

Toni Buhrke, MBA, CISSP
Senior Security Solutions Architect

Addressing the BYOD Challenge

 

 

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:30am Session Two

Silver Peak Systems, Inc.

Edward Lau
Regional Sales Manager-Canada

The Next Generation of Data Acceleration

Silver Peak software accelerates data between data centers, branch offices and the cloud.  The company’s software-defined acceleration solves network quality, capacity and distance challenges to provide fast and reliable access to data anywhere in the world.  Leveraging its leadership in data center class wide area network (WAN) optimization, Silver Peak is a key enabler for strategic IT projects like virtualization, disaster recovery and cloud computing.

>>click here for the presentation

10:30am-11:15am Session Three

Infoblox Inc.

Ed O’Connell
Sr. Product Marketing Manager

The threat landscape is changing… are you keeping up?

The bad guys are continually changing their methods for getting into your IT infrastructure.  Are you keeping up with the changes to your network to combat it?  How do you stop BYOD from being a conduit for information leaving your network?   In today's world, challenges like external compliance mandates, internal security best practices, and the massive spike in changes to network devices such as routers and firewalls are growing for every IT team.  New thinking from Infoblox allows you to face these challenges and control your network.

Join us as we cover how to:

  • Remove the DNS protocol as a conduit for malware communication
  • Have a systematic method for finding and fixing infected devices within your IT infrastructure
  • Reduce risk of network breaches and be ready to handle access requests without compromising network standards
  • Leverage automation to discover, view and provision firewall and router polices and ACL
  • See the history of every change and be alerted of ACL or rule violations
  • Maintain strict user-based controls
  • Hardened your network with Common Criteria Level 2 proven products that consume 3x less power than typical IT equipment
  • And more…

>>click here for the presentation

11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:15pm Session Four

Entrust

Chris Taylor

Critical infrastructure Protection ... a layered Identity based security solution for gas/oil and power utilities

 

 

>>click here for the presentation

12:15pm-12:30pm Break/Vendor Booth Time
12:30pm-1:00pm Session Five

Varonis Systems

Ben Hui
Solution Architect

 

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

1:00pm-1:30pm Session Six

Gigamon

Steve Watt

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

1:30pm-1:45pm Break/Vendor Booth Time
1:45pm-2:15pm Session Seven

FireEye, Inc.

Ajay Sood

Malware pandemic?  Sometimes getting a shot only treats the symptoms and not the cause

Global brands continue to make the headlines following security incidents that result in the installation of malware that enables exfiltration of critical data.  A broad survey of global enterprises entities reveal that in fact almost all large companies are compromised by malware to varying degrees, despite near universal use of firewalls, web proxies, and desktop and email antivirus screening.  To some extent who ends up in the headlines may be a matter of bad luck.  Still, there is a very large range in the extent of the compromise (infection rates) and obviously the more malware kept out of the network, the lower the odds of a truly bad incident. Malware uses a range of tactics to avoid detection, but they can be broken into two over-arching categories - to be broad but highly dynamic, or very targeted and narrow.  Learn how FireEye views the problem of Advanced Persistent Threats.

2:15pm-2:30pm Break/Vendor Booth Time
2:30pm-3:15pm Session Eight

Invincea, Inc.

PJ Bihuniak
Director of Sales

Stop Spear-Phishing and Watering Hole Attacks - Put the User in a Bubble

Your employees are the primary target of attack by a variety of adversaries bent on doing your organization harm. This is a fact that simply cannot be challenged based on the last 24-36 months’ worth of breach disclosures. Spear-phishing and watering hole attacks have been at the root of virtually every major attack disclosed during this time - whether the RSA breach, the campaign disclosed by Kaspersky labeled "Red October," the "Nitro" attacks, attacks against the energy sector, The New York Times, The Washington Post, The Wall Street Journal, The White House, Facebook, Apple, etc, etc, etc.

We've got a user problem on our hands that we need to rapidly solve. We're currently losing the battle to our adversaries because the endpoint has become the new perimeter and our endpoint defenses are largely antiquated.

However, innovation is here that you must take a look at...come hear why the NSA recently won a SANS National Security Award for its work with Invincea in combatting APTs and user-targeted attacks.

Join PJ Bihuniak and Eddie DeWolfe of Invincea for an informative discussion that will cover:

  • Recent examples of user targeted attacks and thoughts on why they've succeeded
  • How advances in virtualization enable the creation of segregated environments for your users to run highly targeted applications such as the web browser, PDF reader, 
      Office suite, etc.
  • How behavioral based malware detection is being used in these segregated environments to spot and kill zero-days - including the recently announced Java 7 exploit
  • Methods for turning thwarted attacks into rich forensic information that can feed your entire infrastructure and extend its usefulness

>>click here for the presentation

3:15pm-4:00pm Session Nine

paloalto Networks

Sandeep Lota

Practical strategies to safeguard your network

According to Gartner the enterprise network firewall market is undergoing a period of dynamic evolution, as effective next-generation firewalls are now increasingly necessary. There is a new generation of Internet applications that traditional firewalls cannot see. They play host to various malware and find creative ways to penetrate your firewall by disguising themselves, hiding in SSL tunnels, and targeting multiple ports to find entry points. Gone are the days of lone, brute force attackers out to steal credit cards. The new breed of predators on your infrastructures and applications are highly organized, evasive, and patient. Regain control of these apps before they take control of your business! Join Palo Alto Networks in this session where you'll learn practical strategies to safeguard your network.

  Prize Drawings For All In Attendance
4:00pm-4:45pm Session Ten

IBM

Stewart Wolfe CISSP, CISM, CISA
Senior Security Services Architect, Cross-GTS Solutions Pre Sales/Solution Design, IBM Global Technology Services

Managing The Cyber Security threat Landscape - Are we becoming more secure?

Over the past year, the IT security space has had numerous mainstream headlines. From the discovery of  sophisticated toolkits with ominous names like Flame to cross-platform zero-day vulnerabilities, both  consumers and corporations were inundated with advisories and alerts regarding emerging threats. The frequency of data breaches and incidents?which had already hit a new high in 2011? continued their upward trajectory.

This presentation will focus on the IBM 10 essential practices to effectively deal with the Cyber Security landscape.

>>click here for the presentation

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
ACSI Connect
Aerohive Networks, Inc.
AirWatch, LLC
Aruba Networks, Inc.
Blue Coat Systems.
Centrify Corporation
Conexsys
Core Security Technologies
EMULEX
Entrust
Exinda
FireEye, Inc.
Fortinet, Inc.
Gigamon
IBM
Infoblox Inc.
Invincea, Inc.
IPS - Security
 Ixia NVS
Kaspersky Lab
LANDesk Software
LogRhythm
NetClarity, Inc.
paloalto Networks
Radware Ltd.
SecureAuth
Silver Peak Systems, Inc.
Sourcefire, Inc.
Tripwire, Inc.
Varonis Systems
Vcura Incorporated
 Veeam® Software
VENAFI
WatchGuard Technologies, Inc.
   Copyright © 2009-2013. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy