Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Washington DC Tech-Security Conference

Date: Thursday, August 22, 2013
Location:

L'Enfant Plaza Hotel
480 L'Enfant Plaza, SW,
Washington, D.C. 20024
p: 202.484.1000

>>click here for directions

Overview

The Washington DC Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Aerohive Networks, Inc.

Ben McDonald

Transforming Your Network into a Platform for Mobility

The modern “mobile-first” enterprise network requires a mobility-optimized approach that is not simply dependent on network access for policy enforcement and control. Contextual elements, such as user identity, device type, application, location, and time of day are the primary building blocks used to create granular policies that dictate how, when, and what the user can access. In this session, we’ll assess the mobility-optimized approach which tightly integrates systems and adds contextual intelligence to create sophisticated “user centric” policies that reduce the complexities of a highly mobile user base. This will provide a vision for how optimizing for mobility can transform your network into a platform for mobility; a platform able to add business value, reduce operational cost and regain control of your network.

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:30am Session Two

Fixmo Inc.

Michael Dennehy
SVP Enterprise Sales

Embracing BYOD Without Compromising Security or Compliance

Embracing iPads, mobile apps or BYOD and trying to figure out how to manage security and compliance without controlling the entire device? IT organizations must start to look beyond traditional device management technologies to ensure private corporate applications and data remain protected, uncompromised and within compliance guidelines – no matter who owns the device. This session will explore emerging mobile technologies such as Secure Containerization and Application Management as a means to addressing security and compliance in the next era of enterprise mobility and BYOD, and will present an emerging methodology for containing and managing corporate data on employee-owned devices.

>>click here for presentation

10:30am-11:00am Session Three

Varonis Systems

Brian Vecci

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

11:00am-11:30am Break/Vendor Booth Time/Lunch
11:30am-12:00pm Session Four

Trend Micro Incorporated

Matt Hubbard
Sr. Regional Product Manager

 

Securing Your Physical, Virtual, Cloud Infrastructure

Protect confidential data, ensure compliance and prevent costly damage, without hindering productivity. Join Trend Micro and learn how to secure your data at rest or in motion; across the entire spectrum of computing. Let Trend empower you to prevent unauthorized access and data breeches throughout your enterprise, regardless of whether your infrastructure is physical, virtual or in the cloud.

>>click here for the presentation

12:00pm-12:15pm Break/Vendor Booth Time
12:15pm-12:45pm Session Five

Gigamon

Mike Glaser

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

12:45pm-1:15pm Session Six

VENAFI

Mike Burwick
Principal Systems Engineer

A blueprint for the perfect attack: Addressing the open doors in your APT strategy

Targeted cyber-attacks are steadily increasing, and business executives face challenges with trust exploits. While organizations adopt cloud computing and allow employee owned devices (BYOD movement) onto the network, the challenge of securing company data everywhere increases exponentially—especially when the organization does not own the devices or infrastructure that its data is housed on or accessed from. 
When it comes to advanced persistent threats (APTs), bad actors will take advantage of any and every exploit that they can use to steal your data, and look for the weakest link in your security systems. Common, well-known trust exploits like digitally signed malware with stolen private keys, poor key and certificate management, fraudulent certificates, and weak outdated cryptographic methods are all still in place in many organizations.

The problem is systemic and the exposure significant. Over half of all enterprises don’t know how many keys and certificates are in use, for instance. More than sixty percent of organizations would take a day or more to correct CA trust relationships if attacked by digitally signed malware or respond to a compromised SSH key. Combine the inability to understand how trust is established with the incapacity to quickly respond when it breaks down, and you have the perfect vehicle for APT and sophisticated attackers to launch their exploits.
With APTs leveraging these weaknesses, it’s critical to have visibility and control of enterprise key and certificate inventories. Cyber criminals understand that the easy targets are those organizations that have little visibility into their threat surface and cannot respond quickly. We need to gain control over trust; we need to plug the gap related to key & certificate-based exploits.

Learning objectives:

  • Gain insight into the current trust exploits and how recent primary research from the Ponemon Institute places Global 2000 organizations at nearly $400 million in exposure over two years
  • Find out some of the top threats and concerns that global 2000 organizations are facing today, and understand where you fit in on the industry scorecard for trust exploits
  • Learn what steps you need to take in order to gain control over trust and ensure proper enterprise-wide key and certificate management
1:15pm-1:30pm Break/Vendor Booth Time
1:30pm-2:00pm Session Seven

FireEye, Inc.

Andrew Jones
Federal Systems Engineer

Gears and Sprockets: A Few Tangible Examples of How Exploits Function

Awareness of cyber security is growing; terms like "malware", "phishing", and even "botnet" have all now entered the common lexicon for even most novice computer users.  However, fewer individuals understand what exactly happens behind the scenes of their computer screen when they visit that malicious website or open that suspect email attachment.  This presentation will review a few specific examples of how exploits are included and detonated within various website components and file types to initiate the infection lifecycle.

2:00pm-2:45pm Session Eight

WatchGuard Technologies, Inc.

Brian Leedy

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

2:45pm-3:00pm Break/Vendor Booth Time
3:00pm-3:45pm Session Nine

Cyber-Ark Software, Ltd.

Kevin Corbett

Analyzing the DNA of Privileged Accounts and Their Connection to Advanced Threats

Cyber-Ark® Software is a global information security company that specializes in protecting and managing privileged users, sessions, applications and sensitive information to improve compliance, productivity and protect organizations against insider threats and advanced external threats. With its award-winning Privileged Identity Management, Privileged Session Management and Sensitive Information Management Suites, organizations can more effectively manage and govern data center access and activities, whether on-premise, off-premise or in the cloud, while demonstrating returns on security investments. Cyber-Ark works with more than 1,300 customers, including more than 40 percent of the Fortune 100. Headquartered in Newton, Mass., Cyber-Ark has offices and authorized partners in North America, Europe and Asia Pacific. For more information, please visit www.cyber-ark.com.
3:45pm-4:30pm Session Ten

Click Security

Neal Hartsell
VP of Marketing

Real-time Security Analytics (RtSA): Automating the Discovery, Understanding, and Action Against Advanced Security Threats

What does an advanced attack look like?  Why are traditional products failing to provide protection?  What is a security analytic?  Who is the target user for an RtSA solution?  This presentation will address these questions and explain how RtSA can intelligently ingest, automatically contextualize, and render advanced analytics quickly by converting millions of logs and alerts into actor-based actionable intelligence.  Ultimately, it is about cost-effectively reducing business risk from advanced malware and attackers by speeding time-to-detect, time-to-understand, and time-to-act.

>>click here for the presentation

  Prize Drawings For All In Attendance
4:30pm-5:15pm Session Eleven

paloalto Networks

Chuck Thomas

Dynamic Security against Modern Threats in a Virtualized Environment

Securing the network has never been more challenging.  First, threats are increasingly targeted, fast-moving and evasive.  Second, the computing environment is constantly changing with initiatives like virtualization and BYOD.  This presentation reviews these challenges and offers approaches to network security that keeps pace with both the dynamic computing and threat landscapes.

>>click here for the presentation

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
AccessIT Group, Inc.
Aerohive Networks, Inc.
AhnLab, Inc.
AirWatch, LLC
Alert Logic
ArcMail Technology
Assurance Data
Beyond Security
BeyondTrust Software, Inc.
Blue Door Networks, LLC
BrightPlanIT Inc.
Check Point Software Technologies Ltd.
Click Security
Cyber-Ark Software, Ltd.
Event Tracker
Exinda
F5 Networks, Inc.
FireEye, Inc.
FishNet Security, Inc.
Fixmo Inc.
Fortinet, Inc.
Gigamon
iNETWORKS Group, Inc.
Infoblox Inc.
International Systems Marketing, Inc.
ITWatchDogs
LANDesk Software
LogRhythm
McAfee, Inc.
Net Optics
NetScout Systems, Inc.
Norman Shark
paloalto Networks
Patriot Technologies, Inc.
Plan B Technologies, Inc.
ReliaQuest 
SafeNet
SAINT Corporation
SecureAuth
Talariax
Sims Recycling Solutions
http://www.solutionary.com/
Sourcefire, Inc.
SSH Communications Security
 Sun Management
Teneo
ThreatSim - Stratum Security 2012
Trend Micro Incorporated
Unisys
Varonis Systems
VENAFI
Viper Network Systems, LLC.  
WatchGuard Technologies, Inc.
Wave Systems Corp.
Websense, Inc.
WestonInfoSec.com
WILDPACKETS, INC
XIRRUS
Zix Corporation
   Copyright © 2009-2013. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy