Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Portland Tech-Security Conference

Date: Thursday, July 11, 2013
Location:

Portland Marriott Downtown Waterfront
1401 SW Naito Parkway
Portland, OR 97201
p: 503.226.7600

>>click here for directions

Overview

The Portland Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Varonis Systems

Michael McCabe

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

9:15am-9:45am Break/Vendor Booth Time
9:45am-10:15am Session Two

Gigamon

Nick Kalegi

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

10:15am-11:00am Session Three

Blue Coat Systems.
Grant Asplund
Sr. Technology Evangelist

Embracing Mobility
Liberate Employees to Work Their Way – and Empower Your Business

The growing use of smartphones and tablets along with
Bring Your Own Device (BYOD) initiatives are fundamentally 
changing the game.  However, 76% of IT leaders see security
as a barrier to enabling employees to choose their own
devices, technology and applications at will.

You have the unique opportunity to empower your organization
by helping it embrace the new possibilities of mobility
and its promise of collaboration, productivity, and
innovation – without compromising on security.

11:00am-11:30am Break/Vendor Booth Time/Lunch
11:30am-12:15pm Session Four

WatchGuard Technologies, Inc.

Johan Bloomhart

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

12:15pm-12:30pm Break/Vendor Booth Time
12:30pm-1:15pm Session Five

Centrify Corporation

Steven Hansen
Systems Engineer

FusionStorm

 

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?

Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting SaaS and mobile computing using a single, unified approach.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.
  • Learn about approaches for managing privileged user access to servers and apps.

>>click here for the presentation

1:15pm-2:00pm Session Six

Quest

Gary Schick
Director of Sales

Keeping your Business Secure in 2013

If you think the information technology on which your business depends is safe, think again:  IT risks and vulnerabilities aren’t going away – they’re multiplying. Join Quest’s Director of Sales, Gary Schick, as he shows you the dangers your business IT faces in 2013 and what you can do to mitigate them.  Gary will discuss:

  • What level of IT security is important to you
  • What you need to worry about most – and why
  • The good news for IT security in 2013
  • 10 ways you can boost your business’ IT security

>>click here for the presentation

2:00pm-2:45pm Session Seven

paloalto Networks

Jeff Stiling
Regional Manager

Dynamic Security against Modern Threats in a Virtualized Environment

Securing the network has never been more challenging.  First, threats are increasingly targeted, fast-moving and evasive.  Second, the computing environment is constantly changing with initiatives like virtualization and BYOD.  This presentation reviews these challenges and offers approaches to network security that keeps pace with both the dynamic computing and threat landscapes.

2:45pm-3:00pm Break/Vendor Booth Time
3:00pm-3:30pm Session Eight

EVault, Inc.

Mike Jackson
Jason Shorter

Account & Channel Management

Five Security Questions to Ask When Choosing a Cloud Provider

Increasingly, companies are moving components of their business operations to the cloud, including backup and disaster recovery. The reasons are compelling:

  • Reduced IT expenses
  • Greater efficiency
  • Greater collaboration and mobility

But news headlines are a stark reminder that not all Clouds are created equal. When evaluating a Cloud service provider to manage your critical business data, it’s important to understand how your security goals and those of the Cloud provider are aligned.

Asking five critical questions today could save you considerable headaches tomorrow. Learn what these questions are and how they can help you ensure a secure cloud solution for your organization.

>>click here for the presentation

3:30pm-4:00pm Session Nine

GCSIT

 

Silver Peak Systems, Inc.

Colm Foley

Storage Replication Acceleration - Taking control of the problem.

 

 

 

 

 

 

>>click here for the presentation

  Prize Drawings For All In Attendance
4:00pm-4:30pm Session Ten

Portnox Access Layers

Uri Lichtenfeld
General Manager

Think you know your network? Think again.

Even before the BYOD revolution our networks were filled with devices we couldn’t control. We’ve all been there at one point or another, hoping to layer some degree of access control and validation before allowing connectivity but the reality is that the abundance of devices and demands on productivity have basically forced our hands to connect first and ask questions later. Today, with the torrent of new devices on the market, this problem is even more pronounced. Mobile Device Management solutions (MDMs) focus on the known devices but do not keep your networks clear of unmanaged devices.

Portnox’s revolutionary Network Access Control delivers clear and complete network visibility, insight and control and requires no appliances, network infrastructure changes or agent software. Join us as we review the solution and discuss successful BYOD and network security strategies.

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
Aerohive Networks, Inc.
AirWatch, LLC
All Tech 1
BEW Global
BeyondTrust Software, Inc.
Bit9
Blue Coat Systems.
Centrify Corporation
EVault, Inc.
FireMon
Fortinet, Inc.
FusionStorm
GCSIT
Gigamon
Infoblox Inc.
Kaspersky Lab
LANDesk Software
Meru Networks
NetClarity, Inc.
Network Critical Solutions Limited
paloalto Networks
Portnox Access Layers
Quest
SAINT Corporation
Silver Peak Systems, Inc.
Sims Recycling Solutions
http://www.solutionary.com/
Sophos PLC
Varonis Systems
WatchGuard Technologies, Inc.
Wave Systems Corp.
Websense, Inc.
Windstream Communications
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy