What We Do
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013

Denver Tech-Security Conference

Date: Thursday, July 18, 2013

Embassy Suites Denver-Downtown/Convention Center
1420 Stout Street
Denver, CO, 80202
p: 303.592.1000

>>click here for directions


The Denver Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One


Ruben Garcia

Turning the Mobile Device Evolution in Your Favor

The Emerging Mobile Landscape and the Positive Effects on Security and Business Enablement

9:15am-9:45am Break/Vendor Booth Time
9:45am-10:15am Session Two

Varonis Systems

Tyler Briggs

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

10:15am-11:00am Session Three

Blue Coat Systems.

Paul Shaffer
Systems Engineer
Strategic Accounts

Embracing Mobility
Liberate Employees to Work Their Way – and Empower Your Business

The growing use of smartphones and tablets along with
Bring Your Own Device (BYOD) initiatives are fundamentally 
changing the game.  However, 76% of IT leaders see security
as a barrier to enabling employees to choose their own
devices, technology and applications at will.

You have the unique opportunity to empower your organization
by helping it embrace the new possibilities of mobility
and its promise of collaboration, productivity, and
innovation – without compromising on security.

11:00am-11:30pm Break/Vendor Booth Time/Lunch
11:30am-12:00pm Session Four


Eric Dix

RSA, The Security Division of EMC Corporation

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

12:00pm-12:15pm Break/Vendor Booth Time
12:15pm-1:00pm Session Five

WatchGuard Technologies, Inc.

Johan Bloomhart

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

1:00pm-1:45pm Session Six

Cyber-Ark Software, Ltd.

Bret Newman
Regional SE Manager  -  South West

Analysing the DNA of privileged accounts

Why is it so hard to manage privileged accounts, where do they exist and how you can guard them from be compromised.

1:45pm-2:00pm Break/Vendor Booth Time
2:00pm-2:45pm Session Seven

paloalto Networks

Mark Priester
Sr. System Engineer

Dynamic Security against Modern Threats in a Virtualized Environment

Securing the network has never been more challenging.  First, threats are increasingly targeted, fast-moving and evasive.  Second, the computing environment is constantly changing with initiatives like virtualization and BYOD.  This presentation reviews these challenges and offers approaches to network security that keeps pace with both the dynamic computing and threat landscapes.

2:45pm-3:00pm Break/Vendor Booth Time
3:00pm-3:45pm Session Eight

RJS Smart Security

Josh More

Lean Security 101: Lean and Practical Approaches to Security Projects

For years, we've been told the key to security is technology. We purchase and deploy technology to create layers behind layers, making our walls taller and taller to keep the bad guys out. Sadly, it's not working.
What does work is combining lessons learned in other industries to the security world. By examining best practices within Lean Manufacturing, Agile Development and Rugged DevOps, this presentation delivers ways you can be successful in security, not by purchasing technology, but by:

  • Effectively using what you have and what you can get for free
  • Re-allocating security budget from the point of diminishing return
  • Identifying and maximizing learning opportunities
  • Engaging in small, inexpensive test projects
  • Choosing custom and rational metrics to measure what matters
  • Replacing defective systems with ones that grow with you
  • Turning security from a catch-up game into one of strategic and competitive advantage.

Success in security depends on the right mix of people, technology and process. Without all three, you are doomed to failure.

>>click here for the presentation

  Prize Drawings For All In Attendance
3:45pm-4:30pm Session Nine

Bradford Networks

Mike Spess
Regional Manager

Onboarding Personal Devices to Corporate Networks

Many IT organizations are being asked to allow personal devices onto corporate networks.  Unlike corporate-issued devices that are well-managed and under IT’s control, this new Bring-Your-Own-Device (BYOD) initiative introduces a unique set of security challenges that require a balance of flexibility, visibility, security.

This presentation will explain the concept of a “BYOD Blueprint” and lessons learned from onboarding personal devices to over 800 networks around the world.

>>click here for the presentation

  Prize Drawings For All In Attendance
4:30pm-5:00pm Session Ten

Ruckus Wireless, Inc

Troy Schaetzle

802.11ac, Are you ready?  Better Wi-Fi is coming in waves.

802.11ac is all the rage, and rightfully so. It represents another fundamental change in the innovation of the 802.11 protocol that promises to boost speeds into the gigabit world.

802.11ac gets this big leap in Wi-Fi performance using wider channels, more efficient modulation (the way in which bits are carried within RF waves), and multiple user connections (so-called multi-user MIMO). And it will come in waves.  Literally.  Come learn more about the future of Wi-Fi.

>>click here for the presentation

  Prize Drawings For All In Attendance

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
Aerohive Networks, Inc.
AirTight Networks, Inc.
AirWatch, LLC
ArcMail Technology
Beyond Security
Blue Coat Systems.
Bradford Networks
Celestix Networks, Inc.
Cyber-Ark Software, Ltd.
F5 Networks, Inc.
FishNet Security, Inc.
Fortinet, Inc.
iboss Security, Inc.
Incaption, Inc.
Infoblox Inc.
 ISACA Denver Chapter
 Ixia NVS
Kaspersky Lab
LANDesk Software
NetClarity, Inc.
© Norman AS
Novell, Inc.
paloalto Networks
Ping Identity Corporation
RJS Smart Security
Rocky Mountain Chapter, Society for Technical Communication
RSA, The Security Division of EMC Corporation
Ruckus Wireless, Inc
SAINT Corporation
SIM Colorado
Sims Recycling Solutions
Solutionary, Inc.
Trend Micro Incorporated
Tripwire, Inc.
Varonis Systems
WatchGuard Technologies, Inc.
Wave Systems Corp.
Zix Corporation
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy