Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Omaha Tech-Security Conference

Date: Thursday, July 25, 2013
Location:

Hilton Omaha
1001 Cass Street
Omaha, NE 68102
p: 402.998.3400

>>click here for directions

Overview

The Omaha Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Gigamon

Eric Dix

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

9:15am-9:45am Break/Vendor Booth Time
9:45am-10:30am Session Two

WatchGuard Technologies, Inc.

Bill Larsen

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

10:30am-11:00am Session Three

Fortinet, Inc.

Christian Barnes
Systems Engineer II

Next Generation Firewalls:

A Discussion on Consolidated Security, Application Inspection and Blended Threat Mitigation

>>click here for the presentation

11:00am-11:30am Break/Vendor Booth Time/Lunch
11:30am-12:15pm Session Four

RJS Smart Security

Josh More

Lean Security 101: Lean and Practical Approaches to Security Projects

For years, we've been told the key to security is technology. We purchase and deploy technology to create layers behind layers, making our walls taller and taller to keep the bad guys out. Sadly, it's not working.
What does work is combining lessons learned in other industries to the security world. By examining best practices within Lean Manufacturing, Agile Development and Rugged DevOps, this presentation delivers ways you can be successful in security, not by purchasing technology, but by:

  • Effectively using what you have and what you can get for free
  • Re-allocating security budget from the point of diminishing return
  • Identifying and maximizing learning opportunities
  • Engaging in small, inexpensive test projects
  • Choosing custom and rational metrics to measure what matters
  • Replacing defective systems with ones that grow with you
  • Turning security from a catch-up game into one of strategic and competitive advantage.

Success in security depends on the right mix of people, technology and process. Without all three, you are doomed to failure.

>>click here for the presentation

12:15pm-12:30pm Break/Vendor Booth Time
12:30pm-1:15pm Session Five

Blue Coat Systems.

Grant Asplund
Senior Technology Evangelist

Embracing Mobility
Liberate Employees to Work Their Way – and Empower Your Business

The growing use of smartphones and tablets along with
Bring Your Own Device (BYOD) initiatives are fundamentally changing the game.  However, 76% of IT leaders see security as a barrier to enabling employees to choose their own devices, technology and applications at will.

You have the unique opportunity to empower your organization by helping it embrace the new possibilities of mobility and its promise of collaboration, productivity, and innovation – without compromising on security.

1:15pm-2:00pm Session Six

Trusteer

Chance Casey

Application Exploits - What They Are and Why They Matter

Application exploits continue to infiltrate the enterprise, disrupt operations, and steal valuable data. Learn about some of the latest malicious tactics and defense approaches.

2:00pm-2:15pm Break/Vendor Booth Time
2:15pm-3:00pm Session Seven

Check Point Software Technologies Ltd.

Kellman Meghu
Head of Security Engineering

Weaponized Security

Imagine having access to an amazing technology, that makes searching patterns of data in the network very simple. Then imagine implementing that technology on an open wifi and seeing what you find. This talk discusses how a tool to secure people can be turned against them, and the results of random people, leaking data about their computers, and themselves.

PLEASE NOTE: This presentation contains content from a free wifi connection that the users did agree to full release of information in exchange for service, in so much as they clicked accept on a captive portal to get online. You can’t say we didn’t try to warn them. The data extracted from this network in no way reflects the thoughts, feelings or attitudes of the presenter, and some of it may be offensive in nature. Who knows, maybe you are even in this presentation yourself, have you ever used ‘free’ wifi?

  Prize Drawings For All In Attendance
3:00pm-3:45pm Session Eight

Vital Support Systems

Brian Knudtson
Design Architect

Cloud Services

Brian Knudtson, Design Architect for Vital Support Systems, will present information about how the Cloud is helping to revolutionize business operations, including IT security requirements and disaster recovery services.  Hear more about Vital Support Systems unique Cloud platform, ReliaCloud.

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
AirWatch, LLC
Alert Logic
Alexander Open Systems
Barrier1 - The Barrier Group
BeyondTrust Software, Inc.
Bit9
Blue Coat Systems.
Centrify Corporation
Check Point Software Technologies Ltd.
Choice Solutions, L.L.C.
EPC USA Inc.
EVault, Inc.
FireMon
FishNet Security, Inc.
Forsythe Solutions Group, Inc.
Fortinet, Inc.
Gigamon
Heartland IIBA Chapter
Imperva
Infoblox Inc.
Infogressive, Inc.
Integrity Technology Systems
 Ixia NVS
Kaspersky Lab
KEMP Technologies, Inc.
LANDesk Software
 Linoma Software
LogRhythm
MCS IT - Management Communication Services, Inc.
NetIQ Corporation
Qualys, Inc.
RJS Smart Security
SafeNet
Silver Peak Systems, Inc.
http://www.solutionary.com/
Sourcefire, Inc.
 Heartland Chapter of STC
SunGard
Tenable Network Security
Tripwire, Inc.
Trusteer
Varonis Systems
Vital Support Systems
WatchGuard Technologies, Inc.
Websense, Inc.
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy