Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Sacramento Tech-Security Conference

Date: Thursday, August 29, 2013
Location:

DoubleTree by Hilton Sacramento
2001 Point West Way, Sacramento, CA 95815
p: 916.929.8855

click here for directions

Overview

The Sacramento Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Gigamon

Farhan Dani

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

9:15am-9:45am Break/Vendor Booth Time
9:45am-10:15am Session Two

ISD Security, LLC

 

Sophos PLC

Scott Spiker
Sophos

Protecting Data on the Move

Last year, Sophos saw attackers extend their reach to more platforms, from social networks and cloud services to Android mobile devices. We saw them respond to new security research findings more rapidly, and leverage zero-day exploits more effectively. It’s a clear sign the data threat is growing at an alarming rate. This means IT organizations and users will need to ask tough new questions of their IT service providers and partners; become more systematic about protecting diverse devices and network infrastructure; and become more agile about responding to new threats. Moreover, they need to understand where their data resides and how to protect it at every point.

Attend our Seminar to watch the story unfold about how your data can become vulnerable, including the latest issues stemming from unprotected data on mobile devices and social media sites.  We’ll cover all the ways that data is not static but open to varying levels of risk.

>>click here for the presentation

10:15am-11:00am Session Three

Cyber-Ark Software, Ltd.

Berenice Jacobs
Account Executive

Securing Administrative Passwords: Privileged Identity Management

11:00am-11:30pm Break/Vendor Booth Time/Lunch
11:30am-12:15pm Session Four

Centrify Corporation

John Macintosh
Senior Systems Engineer

 

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?

Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting SaaS and mobile computing using a single, unified approach.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.
  • Learn about approaches for managing privileged user access to servers and apps.

>>click here for the presentation

12:15pm-12:30pm Break/Vendor Booth Time
12:30pm-1:00pm Session Five

Sims Recycling Ltd.

Bill Vasquez 

Data Destruction and its impact on the environment

1:00pm-1:30pm Session Six

Fortinet, Inc.

Robert Neuroth
Regional Director – West, Wireless Solutions

Fortinet Wireless – Security and Wireless Together at Last

Despite sound recommendations from information security professionals since at least the late 80s, security measures are almost always added to infrastructure technologies after the fact; and for a long time, wireless networking was no exception. This made securing your environment a lot harder and more tedious than it should be. In this talk, you’ll learn how Fortinet has built security into its wireless solutions from the ground up and how this will empower you to manage the security of your wireless network in ways not possible before.

>>click here for the presentation

1:30pm-1:45pm Break/Vendor Booth Time
1:45pm-2:15pm Session Seven

WatchGuard Technologies, Inc.

Peter McNaull

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

2:15pm-3:00pm Session Eight

Invincea, Inc.

Darin Dick

Stop Spear-Phishing and Watering Hole Attacks – Put the User in a Bubble

Your employees are the primary target of attack by a variety of adversaries bent on doing your organization harm. This is a fact that simply cannot be challenged based on the last 24-36 months’ worth of breach
disclosures. Spear-phishing and watering hole attacks have been at the root of virtually every major attack disclosed during this time - whether the RSA breach, the campaign disclosed by Kaspersky labeled "Red October," the "Nitro" attacks, attacks against the energy sector, The New York Times, The Washington Post, The Wall Street Journal, The White House, Facebook, Apple, etc, etc, etc.

We've got a user problem on our hands that we need to rapidly solve. We're currently losing the battle to our adversaries because the endpoint has become the new perimeter and our endpoint defenses are largely antiquated.

However, innovation is here that you must take a look at...come hear why the NSA recently won a SANS National Security Award for its work with Invincea in combatting APTs and user-targeted attacks. ***

*Join Darin Dick and Shaun Munoz of Invincea for an informative discussion that will cover:

  • Recent examples of user targeted attacks and thoughts on why they've
    succeeded
  • How advances in virtualization enable the creation of segregated environments for your users to run highly targeted applications such as the web browser, PDF reader, Office suite, etc.
  • How behavioral based malware detection is being used in these segregated environments to spot and kill zero-days - including the recently announced Java 7 exploit
  • Methods for turning thwarted attacks into rich forensic information that can feed your entire infrastructure and extend its usefulness***

>>click here for the presentation

3:00pm-3:15pm Break/Vendor Booth Time
3:15pm-4:00pm Session Nine

paloalto Networks

Chris Ruybal
Systems Engineer

Dynamic Security against Modern Threats in a Virtualized Environment

Securing the network has never been more challenging.  First, threats are increasingly targeted, fast-moving and evasive.  Second, the computing environment is constantly changing with initiatives like virtualization and BYOD.  This presentation reviews these challenges and offers approaches to network security that keeps pace with both the dynamic computing and threat landscapes.

  Prize Drawings For All In Attendance
4:00pm-4:45pm Session Ten

Blue Coat Systems.

Grant Asplund
Sr. Technology Evangelist

Embracing Mobility 
Liberate Employees to Work Their Way – and Empower Your Business

The growing use of smartphones and tablets along with
Bring Your Own Device (BYOD) initiatives are fundamentally changing the game.  However, 76% of IT leaders see security as a barrier to enabling employees to choose their own devices, technology and applications at will. You have the unique opportunity to empower your organization by helping it embrace the new possibilities of mobility and its promise of collaboration, productivity, and innovation – without compromising on security.

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
AdvanTel Networks
Aerohive Networks, Inc.
AhnLab, Inc.
AirWatch, LLC
Aplena Inc.
ArcMail Technology
Assurance Data
Beyond Security
Bit9
Blue Coat Systems.
BrightPlanIT Inc.
Celestix Networks, Inc.
Centrify Corporation
Check Point Software Technologies Ltd.
Cyber-Ark Software, Ltd.
DATAWAY
Dell SonicWALL L.L.C.
Dhaani Systems, Inc.
Enterprise Networking Solutions, Inc.
ESET, LLC
FishNet Security, Inc.
Fortinet, Inc.
Gigamon
 Hewlett-Packard Development Company, L.P.
Infoblox Inc.
Interface Masters, Inc.
Invincea, Inc.
ISD Security, LLC
ISSA Sacramento
ITWatchDogs
 Ixia NVS
Kaspersky Lab
Meru Networks
NetIQ Corporation
Novacoast
paloalto Networks
Rapid7
Silver Peak Systems, Inc.
Sims Recycling Ltd.
SOA Software, Inc.
http://www.solutionary.com/
Sonic.net, Inc.
Sophos PLC
Tripwire, Inc.
Varonis Systems
WatchGuard Technologies, Inc.
Wave Systems Corp.
Arkeia Software, Inc. and Western Digital Technologies, Inc.
XIRRUS
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy