What We Do
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013

Hartford Tech-Security Conference

Date: Thursday, June 20, 2013

Crowne Plaza Hotel
p: 860.635.2000

>>click here for directions


The Hartford Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Silver Peak Systems, Inc.

Eric Morin
Manager, North America Channel Sales

The Next Generation of Data Acceleration

Silver Peak software accelerates data between data centers, branch offices and the cloud.  The company’s software-defined acceleration solves network quality, capacity and distance challenges to provide fast and reliable access to data anywhere in the world.  Leveraging its leadership in data center class wide area network (WAN) optimization, Silver Peak is a key enabler for strategic IT projects like virtualization, disaster recovery and cloud computing.

>>click here for the presentation

9:15am-9:45am Session Two


Jessica Couto

Accuvant, Inc.

Trust-based Security: A Proactive Approach that Puts You in Control

In 2012 we’ve seen an unprecedented rise in targeted cyber attacks and an acceleration of the loss of core IP.  While state sponsored attacks and cyber espionage have been occurring for decades, the level of disclosure and visibility of these attacks is rising to new levels. We are witnessing the greatest theft of intellectual property in history. Industry analysts state traditional Anti-virus security does not work and is “fighting a losing battle”. A trust-based approach is the most effective way to stop advanced threats and malware

In this session, attendees will receive an in-depth review of the importance of a trust-based security solution.

9:45am-10:15am Break/Vendor Booth Time
10:15am-10:45am Session Three

Trend Micro Incorporated

Matt Hubbard
Sr. Regional Product Manager

Securing Your Physical, Virtual, Cloud Infrastructure

Protect confidential data, ensure compliance and prevent costly damage, without hindering productivity. Join Trend Micro and learn how to secure your data at rest or in motion; accessible on servers, desktops, laptops, tablets, smartphones and even removable media. Let Trend empower you to prevent unauthorized access and data breeches throughout your enterprise, regardless of whether your infrastructure is physical, virtual or in the cloud.

>>click here for presentation

10:45am-11:15am Session Four


Perry Romano

Riverbed Technology

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:15pm Session Five


Stephen Gates

Key Steps of Protection for a First Line of Defense - Defending Against DDoS Attacks and Unwanted Traffic

With the number of successful attacks on the rise, it is evident that firewalls, intrusion prevention systems, and traditional security infrastructures are not equipped to combat them.  These technologies were not built to stop DDoS attacks, undesirable behaviors, advanced evasion attacks and other unwanted malicious traffic targeting your infrastructure.

Corero Network Security, an organization’s First Line of Defense, is the leading provider of Distributed Denial of Service (DDoS) defense.

12:15pm-12:30pm Break/Vendor Booth Time
12:30pm-1:00pm Session Six

FireEye, Inc.

Joshua Senzer

FireEye, the Leader in Next Generation Threat Protection

1:00pm-1:45pm Session Seven

WatchGuard Technologies, Inc.

Steve Butera

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

1:45pm-2:30pm Session Eight


Christian Karwatske

Internet Security Thread Landscape

Threats to IT security have grown and evolved considerably in 2012.  From threats of cyberespionage and industrial esponage to the widespread, chronic problems of malware and phishing, there has been constant innovation from malware authors.  There has also been an expansion of traditional threats into new forums, including social media and mobile devices.  This presentation is an overview of the intelligence collected from Symantec's comprehensive vulnerability databases consisting of over 50,000 vulnerabilities over 20 years.  

2:30pm-2:45pm Break/Vendor Booth Time
2:45pm-3:30pm Session Nine

Cyber-Ark Software, Ltd.

Barak Feldman

Secure, Manage and Control Privileged Accounts

Identity Management Tools, such as Single Sign-On and Directories are examples of important building blocks in any organization's Identity Management infrastructure. However, these tools are only geared towards individual users. An additional solution for privileged users should be deployed to complement the Identity Management Infrastructure.

This presentation will focus on best practices in:

  • Frequent and automatic password changes of shared privileged accounts
  • Automatically detecting and managing Service accounts
  • Privileged Session recording and management
  • Strong auditing of privileged passwords usage to ensure accountability
  • Secured long term storage and automatic failover to eliminate risks of loss and to ensure availability during disaster recovery
  • Removing clear text passwords embedded in scripts, and automatically changing them according to corporate policy
  Prize Drawings For All In Attendance
3:30pm-4:15pm Session Ten

Centrify Corporation

Brian Durkin
Senior Systems Engineer

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?

Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting SaaS and mobile computing using a single, unified approach.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.
  • Learn about approaches for managing privileged user access to servers and apps.

>>click here for the presentation

  Prize Drawings For All In Attendance
4:15pm-5:00pm Session Eleven

Click Security

Steven Urban
Sales Engineer

Real-time Security Analytics: Visibility, Alerting or Forensic Digging - Which is it?

Global cybercrime is now a $388 billion business.  It only takes minutes for hackers to breach your network and exfiltrate valuable assets.  But, it takes weeks to months to figure out it even happened.  Signature products are easily bypassed.  Other point security products aren't able to piece together multistage attacks.  Log management and forensics tools are rearview mirrors at best.  The attack surface, hacker automation, and overwhelmed security personnel are creating the perfect opportunity for your company to make the wrong headlines.  It’s time for a new approach.

Security Analytics is an emerging market focused on finding, contextualizing and automating action around the hard to find activity that leaves breadcrumbs of dangerous activity in the massive volume of data companies are collecting.  Click Security is focused on Real-time Security Analytics -  the real-time conversion of data into actionable intelligence that helps organizations address a broad range of security needs associated with BYOD, IP Theft, Consumerization of IT, APT's and more.

In this session we will address the following questions:

  1. What is a security analytic anyway?
  2. Who on my staff would actually use this product?
  3. What problems does it actually solve?
  4. Does it replace products like Log Management systems and SIEMs?

>>click here for the presentation

  Prize Drawings For All In Attendance

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accunet Solutions
Accuvant, Inc.
AirWatch, LLC
ArcMail Technology
Beyond Security
BrightPlanIT Inc.
Castle Ventures LLC
Centrify Corporation
Check Point Software Technologies Ltd.
Click Security
Cyber-Ark Software, Ltd.
FireEye, Inc.
Kaspersky Lab
LANDesk Software
Meru Networks
McAfee, Inc.
North American Communications Resource, Inc.
NetClarity, Inc.
Network Security Group, Inc.
© Norman AS
Novell, Inc.
PacketLogix, Inc.
paloalto Networks
Riverbed Technology
Sacred Heart University
Silver Peak Systems, Inc.
SIM Central CT
Sims Metal Management Limited
The Business Network Group
Trend Micro Incorporated
Tripwire, Inc.
Tufin Software Technologies Ltd.
Varonis Systems
Versatile Security Sweden AB
WatchGuard Technologies, Inc.
Wave Systems Corp.
Websense, Inc.
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy