Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


St. Louis Tech-Security Conference

Date: Thursday, August 15, 2013
Location:

Hilton St. Louis Frontenac
1335 South Lindbergh Boulevard
St Louis, MO 63131
p: 314.993.1100

>>click here for directions

Overview

The St. Louis Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Entrust

Ruben Garcia

Turning the Mobile Device Evolution in Your Favor

The Emerging Mobile Landscape and the Positive Effects on Security and Business Enablement

 

>>click here for the presentation

9:15am-9:45am Session Two

Varonis Systems

David Perry

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

9:45am-10:15am Break/Vendor Booth Time
10:15am-11:00am Session Three

Centrify Corporation

Wade Tongen
System Engineer

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?

Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting SaaS and mobile computing using a single, unified approach.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.
  • Learn about approaches for managing privileged user access to servers and apps.

>>click here for the presentation

11:00am-11:30am Break/Vendor Booth Time/Lunch
11:30am-12:00pm Session Four

Corero

Stephen Gates

Key Steps of Protection for a First Line of Defense - Defending Against DDoS Attacks and Unwanted Traffic

With the number of successful attacks on the rise, it is evident that firewalls, intrusion prevention systems, and traditional security infrastructures are not equipped to combat them.  These technologies were not built to stop DDoS attacks, undesirable behaviors, advanced evasion attacks and other unwanted malicious traffic targeting your infrastructure.

Corero Network Security, an organization’s First Line of Defense, is the leading provider of Distributed Denial of Service (DDoS) defense.

12:00pm-12:15pm Break/Vendor Booth Time
12:15pm-12:45pm Session Five

Gigamon

Chris Mahoney

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

12:45pm-1:15pm Session Six

Fortinet, Inc.

Paul Kuhl
Regional Manager

The Human Threat

1:15pm-1:30pm Break/Vendor Booth Time
1:30pm-2:15pm Session Seven

paloalto Networks

Joe Brown

Dynamic Security against Modern Threats in a Virtualized Environment

Securing the network has never been more challenging.  First, threats are increasingly targeted, fast-moving and evasive.  Second, the computing environment is constantly changing with initiatives like virtualization and BYOD.  This presentation reviews these challenges and offers approaches to network security that keeps pace with both the dynamic computing and threat landscapes.

>>click here for the presentation

2:15pm-3:00pm Session Eight

RJS Smart Security

Josh More

Lean Security 101: Lean and Practical Approaches to Security Projects

For years, we've been told the key to security is technology. We purchase and deploy technology to create layers behind layers, making our walls taller and taller to keep the bad guys out. Sadly, it's not working.
What does work is combining lessons learned in other industries to the security world. By examining best practices within Lean Manufacturing, Agile Development and Rugged DevOps, this presentation delivers ways you can be successful in security, not by purchasing technology, but by:

  • Effectively using what you have and what you can get for free
  • Re-allocating security budget from the point of diminishing return
  • Identifying and maximizing learning opportunities
  • Engaging in small, inexpensive test projects
  • Choosing custom and rational metrics to measure what matters
  • Replacing defective systems with ones that grow with you
  • Turning security from a catch-up game into one of strategic and competitive advantage.

Success in security depends on the right mix of people, technology and process. Without all three, you are doomed to failure.

>>click here for the presentation

3:00pm-3:15pm Break/Vendor Booth Time
3:15pm-4:00pm Session Nine

Blue Coat Systems.

Milan Urban

Embracing Mobility 
Liberate Employees to Work Their Way – and Empower Your Business

The growing use of smartphones and tablets along with
Bring Your Own Device (BYOD) initiatives are fundamentally changing the game.  However, 76% of IT leaders see security as a barrier to enabling employees to choose their own devices, technology and applications at will.

You have the unique opportunity to empower your organization by helping it embrace the new possibilities of mobility and its promise of collaboration, productivity, and innovation – without compromising on security.

4:00pm-4:30pm Session Ten

Trend Micro Incorporated

Matt Hubbard

Securing Your Physical, Virtual, Cloud Infrastructure

Protect confidential data, ensure compliance and prevent costly damage, without hindering productivity. Join Trend Micro and learn how to secure your data at rest or in motion; across the entire spectrum of computing. Let Trend empower you to prevent unauthorized access and data breeches throughout your enterprise, regardless of whether your infrastructure is physical, virtual or in the cloud.

>>click here for presentation

  Prize Drawings For All In Attendance
4:30pm-5:00pm Session Eleven

Novacoast

Jim Gerken
Identity Practice Manager

Identity - Moving Forward

Identity for IT is becoming more complicated every day. Authenticating and identifying a user happens more frequently, in significantly different ways, every day and it is not getting simpler. Requirements placed upon identification by government, regulation, best practices and security make authentication more important and more complicated. How can IT get a handle on the problem, and even get ahead of it? Authenticate more securely, have confidence in your access controls, simplify the user experience so they don't cause more problems. Simple, right?

>>click here for presentation

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
Advanced Software Products Group
AirTight Networks, Inc.
AirWatch, LLC
Arista Networks, Inc.
Aruba Networks, Inc.
BeyondTrust Software, Inc.
Bit9
Blue Coat Systems.
Centrify Corporation
Centurion Technologies
Cleo
Corero
Entrust
Exinda
F5 Networks, Inc.
FireMon
FishNet Security, Inc.
Fortinet, Inc.
Gigamon
St Louis IIBA Chapter
Infoblox Inc.
Innovation Network Technologies Corporation
ISSA St. Louis Chapter
Kaspersky Lab
LANDesk Software
Link Technologies, Inc
LogRhythm
MCS IT - Management Communication Services, Inc.
Network Critical Solutions Limited
Network Technology Partners, Inc.
Novacoast
paloalto Networks
RJS Smart Security
Society For Information Management
http://www.solutionary.com/
Sourcefire, Inc.
Trend Micro Incorporated
Tripwire, Inc.
Trusteer
Varonis Systems
WatchGuard Technologies, Inc.
Wave Systems Corp.
Zix Corporation
   Copyright © 2009-2013. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy