Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Dallas Tech-Security Conference

Date: Thursday, August 8, 2013
Location:

DoubleTree by Hilton Hotel Dallas Near the Galleria
4099 Valley View Lane
Dallas, TX 75244
p: 972.385.9000

>>click her for directions

Overview

The Dallas Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Aerohive Networks, Inc.

Ray Clounch
Regional Sales Engineer

Transforming Your Network into a Platform for Mobility

The modern “mobile-first” enterprise network requires a mobility-optimized approach that is not simply dependent on network access for policy enforcement and control. Contextual elements, such as user identity, device type, application, location, and time of day are the primary building blocks used to create granular policies that dictate how, when, and what the user can access. In this session, we’ll assess the mobility-optimized approach which tightly integrates systems and adds contextual intelligence to create sophisticated “user centric” policies that reduce the complexities of a highly mobile user base. This will provide a vision for how optimizing for mobility can transform your network into a platform for mobility; a platform able to add business value, reduce operational cost and regain control of your network.

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:30am Session Two

Varonis Systems

Debbie Lay

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

10:30am-11:00am Session Three

Gigamon

John Mattes

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

11:00am-11:30am Break/Vendor Booth Time/Lunch
11:30am-12:00pm Session Four

Corero

Stephen Gates

Key Steps of Protection for a First Line of Defense - Defending Against DDoS Attacks and Unwanted Traffic

With the number of successful attacks on the rise, it is evident that firewalls, intrusion prevention systems, and traditional security infrastructures are not equipped to combat them.  These technologies were not built to stop DDoS attacks, undesirable behaviors, advanced evasion attacks and other unwanted malicious traffic targeting your infrastructure.

Corero Network Security, an organization’s First Line of Defense, is the leading provider of Distributed Denial of Service (DDoS) defense.

12:00pm-12:30pm Break/Vendor Booth Time
12:30pm-1:00pm Session Five

FireEye, Inc.

Rob Davis, CISSP
Managing Principal

Anatomy of Modern Malware Attacks

What many companies have experienced over the last 12 months is a stark reminder that no public or private organization is immune to advanced cyber-attacks. The global threat landscape continues to evolve, creating more complexity and introducing additional risks to your most critical IT assets. Cyber adversaries include terrorists and hacktivists, criminals, insiders, and nation-sponsored groups. How can enterprises reduce the risk exposure associated with these threat vectors?  

Critical Start will review actual attacks that occurred in production environments, including the network forensics that highlight exactly what happened.  After reviewing the attacks, an follow-up interactive session will be held to discuss preventative best practices.

>>click here for the presentation

1:00pm-1:45pm Session Six

WatchGuard Technologies, Inc.

Terrence Davis

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

1:45pm-2:30pm Session Seven

Axway

Kathryn Hughes

Govern the Flow of Data:
Moving from Chaos to Control

>>click here for the presentation

2:30pm-2:45pm Break/Vendor Booth Time
2:45pm-3:30pm Session Eight

Cyber-Ark Software, Ltd.

Analyzing the DNA and Risks associated with Privileged Accounts.

Privileged accounts and passwords are extremely powerful, and have complete control of the target system with full access to all of the information on that system. This vulnerability could potentially cause tremendous financial losses and reputational damage for businesses.

For enterprises, privileged accounts are especially difficult to manage:

  • The average enterprise has thousands of privileged identities, accounts, and passwords. Manually managing and updating these are a time-consuming, costly and repetitive process.
  • Administrative and application accounts (hard-coded, embedded credentials) are found on virtually every piece of hardware, software, and application within an organization, including virtual environments.
  • Administrative or application accounts are shared, which means that the system does not track WHO logged in as an Administrator, merely that a login occurred—a significant audit challenge.
  • Unlike a personal identity, such as JDoe, administrative or application accounts are nearly impossible to disable due to high potential for disruption to business.
  • Administrative and application accounts are subject to regulations such as Sarbanes Oxley, PCI, and Basel II, requiring that companies prove exactly who logs in to sensitive systems and, increasingly, what they are doing.

Do you know how many privileged identities are in your environment? 

3:15pm-3:30pm Break/Vendor Booth Time
3:30pm-4:15pm Session Nine

Centrify Corporation

Wade Tongen
System Engineer

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?

Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting SaaS and mobile computing using a single, unified approach.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.
  • Learn about approaches for managing privileged user access to servers and apps.

>>click here for the presentation

  Prize Drawings For All In Attendance
4:15pm-5:00pm Session Ten

Invincea, Inc.

Joseph Lee
Principal Sales Engineer

Stop Spear-Phishing and Watering Hole Attacks – Put the User in a Bubble

Your employees are the primary target of attack by a variety of adversaries bent on doing your organization harm. This is a fact that simply cannot be challenged based on the last 24-36 months’ worth of breach
disclosures. Spear-phishing and watering hole attacks have been at the root of virtually every major attack disclosed during this time - whether the RSA breach, the campaign disclosed by Kaspersky labeled "Red October," the"Nitro" attacks, attacks against the energy sector, The New York Times, The Washington Post, The Wall Street Journal, The White House, Facebook, Apple, etc, etc, etc.

>>click here for the presentation

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
Aerohive Networks, Inc.
AirTight Networks, Inc.
AirWatch, LLC
Alert Logic
ArcMail Technology
Axway
BEW Global
Beyond Security
BeyondTrust Software, Inc.
Bit9
Blue Coat Systems.
Blue Door Networks, LLC
Celestix Networks, Inc.
Centrify Corporation
Click Security
Corero
Cyber-Ark Software, Ltd.
Entrust
Event Tracker
F5 Networks, Inc.
FireEye, Inc.
Fortinet, Inc.
Gigamon
Global Data Vault
Infoblox Inc.
Innovation Network Technologies Corporation
Invincea, Inc.
Information Systems Security Association
Kaspersky Lab
LogRhythm
M&S Technologies, Inc.
Net Optics
NetClarity, Inc.
NetSPI Inc.
Network Critical Solutions Limited
paloalto Networks
Promisec
Quest
SAINT Corporation
SecureAuth
Secure Data Solutions, Inc. 
Sentinel Intrusion Prevention Services
Sims Recycling Solutions
http://www.solutionary.com/
Sophos PLC
Talari Networks
Tripwire, Inc.
Unique Digital Inc.
Varonis Systems
VASCO Data Security International, Inc.
WatchGuard Technologies, Inc.
Websense, Inc.
Zix Corporation
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy