Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Pittsburgh Tech-Security Conference

Date: Thursday, August 1, 2013
Location:

Pittsburgh Marriott City Center
112 Washington Place
Pittsburgh, PA 15219
p: 412.471.4000 / 888.456.6600

>> click here for directions

Overview

The Pittsburgh Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Bit9

Jen McCoy

Accuvant, Inc.

Next-Generation Endpoint and Server Security: Real-time monitoring and protection for endpoints and servers

Continuously monitoring and recording all activity on endpoints and servers helps stop cyber threats that evade traditional security defenses. Today, organizations are immediately gaining visibility to everything running on their endpoints and servers. In this session, attendees will receive an in-depth review of the importance  and benefits of a next-generation endpoint and server security methodology.

  • Prioritize alerts and investigate incidents in minutes
  • Stop advanced threats without signatures
  • Reduce remediation time
  • Improve compliance
9:15am-9:45am Session Two

Infoblox Inc.

Matt Gowarty
S r. Product Marketing Manager

The threat landscape is changing… are you keeping up?

The bad guys are continually changing their methods for getting into your IT infrastructure.  Are you keeping up with the changes to your network to combat it?  How do you stop BYOD from being a conduit for information leaving your network?   In today's world, challenges like external compliance mandates, internal security best practices, and the massive spike in changes to network devices such as routers and firewalls are growing for every IT team.  New thinking from Infoblox allows you to face these challenges and control your network.

Join us as we cover how to:

  • Remove the DNS protocol as a conduit for malware communication
  • Have a systematic method for finding and fixing infected devices within your IT infrastructure
  • Reduce risk of network breaches and be ready to handle access requests without compromising network standards
  • Leverage automation to discover, view and provision firewall and router polices and ACL
  • See the history of every change and be alerted of ACL or rule violations
  • Maintain strict user-based controls
  • Hardened your network with Common Criteria Level 2 proven products that consume 3x less power than typical IT equipment
  • And more…

>>click here for the presentation

9:45am-10:15am Break/Vendor Booth Time
10:15am-10:45am Session Three

Varonis Systems

Jeremy Milton

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

10:45am-11:15am Session Four

Gigamon

Yury German

Traffic Visibility across Virtual and Physical Networks

11:15am-11:45pm Break/Vendor Booth Time/Lunch

11:45pm-12:30pm

Session Five

WatchGuard Technologies, Inc.

Brian Leedy

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

12:30am-12:45am Break/Vendor Booth Time
12:45pm-1:30pm Session Six

Cyber-Ark Software, Ltd.

Zack Saric

Secure, Manage and Control Privileged Accounts

Identity Management Tools, such as Single Sign-On and Directories are examples of important building blocks in any organization's Identity Management infrastructure. However, these tools are only geared towards individual users. An additional solution for privileged users should be deployed to complement the Identity Management Infrastructure.
This presentation will focus on best practices in:

  • Frequent and automatic password changes of shared privileged accounts
  • Automatically detecting and managing Service accounts
  • Privileged Session recording and management
  • Strong auditing of privileged passwords usage to ensure accountability
  • Secured long term storage and automatic failover to eliminate risks of loss and to ensure availability during disaster recovery
  • Removing clear text passwords embedded in scripts, and automatically changing them according to corporate policy
1:30pm-2:15pm Session Seven

Centrify Corporation

Robertson Pimentel
Senior Systems Engineer

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?

Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting SaaS and mobile computing using a single, unified approach.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.
  • Learn about approaches for managing privileged user access to servers and apps.

>>click here for the presentation

2:15pm-2:45pm Break/Vendor Booth Time
2:45pm-3:30pm Session Eight

paloalto Networks

Ethan West

Practical strategies to safeguard your network

According to Gartner the enterprise network firewall market is undergoing a period of dynamic evolution, as effective next-generation firewalls are now increasingly necessary. There is a new generation of Internet applications that traditional firewalls cannot see. They play host to various malware and find creative ways to penetrate your firewall by disguising themselves, hiding in SSL tunnels, and targeting multiple ports to find entry points. Gone are the days of lone, brute force attackers out to steal credit cards. The new breed of predators on your infrastructures and applications are highly organized, evasive, and patient. Regain control of these apps before they take control of your business! Join Palo Alto Networks in this session where you'll learn practical strategies to safeguard your network.

  Prize Drawings for All In Attendance
3:30pm-4:15pm Session Nine

Blue Coat Systems.

Ron Burkett

Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the FORTUNE Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance.
  Prize Drawings for All In Attendance
4:15pm-5:00pm Session Ten

SEEBURGER, Inc.

Brent Tisdale

Preventing Data Breach Disasters from Insiders

Hackers may be grabbing the headlines, but insiders remain the biggest source of data breaches. And the consumer-ization of file-sharing/-synching isn’t helping.  In this session, you’ll learn how to modernize your corporate file-sharing infrastructure to protect against today’s biggest threat.

Understand the Silent Enemy: employees and partners. How they’re outflanking data security policies

  • What kinds of data are most at risk
  • What this means for compliance

Identify and plug the gaps

  • FTP software
  • Network shares
  • Email
  • Storage devices
  • Consumer tools

Create a 360-degree solution for secure end-to-end file transfer

  • Use data intelligence and analytics to gain actionable INTEL
  • Defend data through access-inspect-dispose-kill policies
  • Deploy centralized, highly automated managed file transfer
  • Make it as convenient and easy to use as users’ current tools
  • Integrate with key applications (SAP, ERP)

Don’t forget system-to-system and system-to-human transfers

>>click here for the presentation

  Prize Drawings for All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
AirWatch, LLC
Alert Logic
ArcMail Technology
Bit9
Blue Coat Systems.
BrightPlanIT Inc.
CentraComm
Centrify Corporation
Check Point Software Technologies Ltd.
Code 42
Connectivity Communications Inc.
Cyber-Ark Software, Ltd.
Exinda
FireMon
FishNet Security, Inc.
Fortinet, Inc.
Gigamon
Hurricane Labs, LLC
Infoblox Inc.
 Ixia NVS
Kaspersky Lab
LANDesk Software
MCS IT - Management Communication Services, Inc.
NetClarity, Inc.
Network Access Corporation
paloalto Networks
Rapid7
SEEBURGER, Inc.
Sims Metal Management Limited
http://www.solutionary.com/
Sourcefire, Inc.
Varonis Systems
Viper Network Systems, LLC.  
WatchGuard Technologies, Inc.
Wave Systems Corp.
Websense, Inc.
WILDPACKETS, INC
Wontok Enterprises
XIRRUS
   Copyright © 2009-2013. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy