Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Orange County Tech-Security Conference

Date: Thursday, June 6, 2013
Location:

Doubletree Hotel Anaheim/Orange County
100 City Drive
Orange, California 92868
p: 714.634.4500

>>click here for directions

Overview

The Orange County Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Varonis Systems

Kilian Englert

 

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for presentation

9:15am-9:45am Session Two

GTB Technologies Inc.

Uzi Yair

DLP vs DLD? -  The Keys to a Successful Data Loss Prevention Program

The major key to successful DLP deployment is to reduce the number of incidents to a minimum by setting up the system to report only pertinent violations.  Many DLP systems fail in accurately detecting incidents, and instead, report thousands of irrelevant events.  Most vendors refer to this phase as "Tuning"; for GTB, Tuning equates to "FAILURE".
Want a quick way to learn about Data Loss Prevention and how it differs from Data Loss Detection?  How not to have your DLP Program Fail?  Having solved the industry known problems of False Positives &  Bring your own Cloud... see for yourself the differences which GTB offers in Quality, Port Coverage, Real-Time Detection & Cyber Threat Protection.

Our presentation offers a product analysis & live demonstration that points out exactly what those differences are & how to spot them when evaluating DLP products

>>click here for the presentation

9:45am-10:15am Break/Vendor Booth Time
10:15am-10:45am Session Three

Digital Scepter Corporation

Jon Robinson
CISSP

 

Simple Analytical Tools to Assess your Security Posture

We'll provide and demonstrate three simple tools to better understand your security controls and create a security strategy.

>>click here for the presentation

10:45am-11:30pm Session Four

ISD Security, LLC

Sophos PLC

John Coulter
Sophos Security Engineer

 

The Security Threat Landscape: What’s at risk and how to get the best Protection.

Last year, Sophos saw attackers extend their reach to more platforms, from social networks and cloud services to Android mobile devices. We saw them respond to new security research findings more rapidly, and leverage zero-day exploits more effectively. It’s a clear sign the data threat is growing at an alarming rate. In 2013, as computing increasingly shifts to virtualized cloud services and mobile platforms, attackers will follow, just as they always have. This means IT organizations and users will need to ask tough new questions of their IT service providers and partners; become more systematic about protecting diverse devices and network infrastructure; and become more agile about responding to new threats.

Attend our Seminar to learn how your data can become vulnerable, including the latest issues stemming from unprotected data on mobile devices and social media sites.  We’ll discuss:

  • The most significant threats and what to watch for
  • What puts your data and your devices at risk
  • Data Protection Strategies to keep your information safe
  • Understanding compliance issues

>>click here for presentation

11:30am-12:00pm Break/Vendor Booth Time/Lunch
12:00pm-12:45pm Session Five

Blue Coat Systems.

Damos Tech
Sr. System Engineer

Considerations to Protect and Speed Up Your Network

With the explosion of BYOD and the seemingly ubiquitous use of handheld devices, IT organizations are challenged to maintain security and control and mitigate the impact of the associated explosion of network traffic as a result of these devices.  These devices introduce security, control and performance issues that must be addressed.

This presentation discusses:

  • Growth/size of BYOD market and the network traffic they generate
  • Growth of IP based network traffic and the flood of video
  • BYOD challenges vs traditional laptop/desktop
  • Threat landscape – mobile threat vectors – mobile malware delivery networks
  • The need for Web and mobile Web application and operational controls
  • The need for highly granular network visibility, optimization and control of network traffic
12:45pm-1:00pm Break/Vendor Booth Time
1:00pm-1:30pm Session Six

Gigamon

Rich Southall

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

1:30pm-2:15pm Session Seven

WatchGuard Technologies, Inc.

Coy Thorp

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

2:15pm-2:45pm Session Eight

Axway

Steve Jordan

Govern the Flow of Data:
Moving from Chaos to Control

>>click here for the presentation

2:45pm-3:00pm Break/Vendor Booth Time
3:00pm-3:45pm Session Nine

paloalto Networks

Jon Anderson
Systems Engineering Manager

Dynamic Security against Modern Threats in a Virtualized Environment

Securing the network has never been more challenging.  First, threats are increasingly targeted, fast-moving and evasive.  Second, the computing environment is constantly changing with initiatives like virtualization and BYOD.  This presentation reviews these challenges and offers approaches to network security that keeps pace with both the dynamic computing and threat landscapes.

3:45pm-4:15pm Session Ten

BeyondTrust Software, Inc.

Alex DaCosta
Distinguished Security Engineer

On the Frontline of the Threat Landscape

BeyondTrust - Distinguished Security Engineer – Alex DaCosta will be dissecting the latest in the movement of the IT threat landscape. Practical information will be given on the latest threats organizations face and how to prevent such attacks. With over 8 years of experience in IT security Alex will  be inform attendees about the latest IT security dangers, including zero-day vulnerabilities hype or reality, recent high-profile attacks, and how many of these can be avoided through a combination of technology solutions and pragmatic security practices.

  Prize Drawings For All In Attendance
4:15pm-4:45pm Session Eleven

SecureAuth

Tommy Wu
Sales Engineer

Why Enterprises need an On Premise Identity Provider

 

>>click here for the presentation

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
AhnLab 
AirWatch, LLC
Alert Logic
ArcMail Technology
Axway
Beyond Security
BeyondTrust Software, Inc.
Bit9
Blue Coat Systems.
BrightPlanIT Inc.
Brocade Communications Systems, Inc.
Celestix Networks, Inc.
Cenzic, Inc.
Click Security
Digital Scepter Corporation
EdgeWave Inc.
EVault, Inc.
Exinda
Fortinet, Inc.
GFI Software
Gigamon
Global Data Vault
GTB Technologies Inc.
Guidance Software Inc.
iboss Security, Inc.
IBM
Imperva
Infoblox Inc.
Interface Masters, Inc.
ISD Security, LLC
 Ixia NVS
Kaspersky Lab
LANDesk Software
LogRhythm
NetClarity, Inc.
NetScout Systems, Inc.
NetIQ Corporation
NetSPI Inc.
© Norman AS
paloalto Networks
Promisec
RedSeal Networks, Inc.
SAINT Corporation
SecureAuth
Security On Demand™
Sophos PLC
Sims Recycling Solutions
Talariax
Splunk Inc.
Tripwire, Inc.
Trusteer
Varonis Systems
WatchGuard Technologies, Inc.
WILDPACKETS, INC
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy