What We Do
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013

Atlantic City Tech-Security Conference

Date: Thursday, September 5, 2013

The Sheraton Atlantic City Convention Center Hotel
2 Convention Blvd
Atlantic City, NJ 08401
p: 609.344.3535

>>click here for directions


The Atlantic City Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One


Aaron Cote

Accuvant, Inc.

Trust-based Security: A Proactive Approach that Puts You in Control

In 2012 we’ve seen an unprecedented rise in targeted cyber attacks and an acceleration of the loss of core IP.  While state sponsored attacks and cyber espionage have been occurring for decades, the level of disclosure and visibility of these attacks is rising to new levels. We are witnessing the greatest theft of intellectual property in history. Industry analysts state traditional Anti-virus security does not work and is “fighting a losing battle”. A trust-based approach is the most effective way to stop advanced threats and malware

In this session, attendees will receive an in-depth review of the importance of a trust-based security solution.

>>click here for the presentation

9:15am-9:45am Session Two

Trend Micro Incorporated

Matt Hubbard
Sr. Regional Product Manager

Securing Your Physical, Virtual, Cloud Infrastructure

Protect confidential data, ensure compliance and prevent costly damage, without hindering productivity. Join Trend Micro and learn how to secure your data at rest or in motion; across the entire spectrum of computing. Let Trend empower you to prevent unauthorized access and data breeches throughout your enterprise, regardless of whether your infrastructure is physical, virtual or in the cloud.

>>click here for the presentation

9:45am-10:15am Break/Vendor Booth Time
10:15am-10:45am Session Three


Yury German

Need for a New Approach

As the networking landscape changes with emerging technologies like virtualization, cloud computing, mobility and big data, organizations are looking to traffic visibility as an essential component in managing, analyzing and securing their networks. However legacy approaches offer limited traffic visibility with limited filtering capabilities; are difficult and costly to scale and manage; and often require change orders or network downtime in order to adapt to the evolving network. The Enterprise Strategy Group Report highlights a variety of drivers that both identify the shortcomings of current alternatives and substantiate the need for a new approach.

10:45am-11:15am Session Four

WatchGuard Technologies, Inc.

Peter McNaull


BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:15pm Session Five


Stephen Gates

Key Steps of Protection for a First Line of Defense - Defending Against DDoS Attacks and Unwanted Traffic

With the number of successful attacks on the rise, it is evident that firewalls, intrusion prevention systems, and traditional security infrastructures are not equipped to combat them.  These technologies were not built to stop DDoS attacks, undesirable behaviors, advanced evasion attacks and other unwanted malicious traffic targeting your infrastructure.

Corero Network Security, an organization’s First Line of Defense, is the leading provider of Distributed Denial of Service (DDoS) defense.

12:15pm-12:30pm Break/Vendor Booth Time
12:30pm-1:15pm Session Six

Cyber-Ark Software, Ltd.

Dan Hacker

Zack Saric

Secure, Manage and Control Privileged Accounts

Identity Management Tools, such as Single Sign-On and Directories are examples of important building blocks in any organization's Identity Management infrastructure. However, these tools are only geared towards individual users. An additional solution for privileged users should be deployed to complement the Identity Management Infrastructure.
This presentation will focus on best practices in:

  • Frequent and automatic password changes of shared privileged accounts
  • Automatically detecting and managing Service accounts
  • Privileged Session recording and management
  • Strong auditing of privileged passwords usage to ensure accountability
  • Secured long term storage and automatic failover to eliminate risks of loss and to ensure availability during disaster recovery
  • Removing clear text passwords embedded in scripts, and automatically changing them according to corporate policy
1:15pm-1:30pm Break/Vendor Booth Time
1:30pm-2:15pm Session Seven

paloalto Networks

Ted Slockbower

Breaking the Lifecycle of the Modern Threat

Enterprise security teams are facing attackers that are highly targeted, motivated and skilled at hiding in the blind spots of traditional security measures. In order to adapt, enterprises must address the fundamental, underlying problems and build a modern approach to security where full visibility, context and prevention of both known and unknown threats is built in to the foundation of the network. In this presentation we will look at examples of real-world threats, how they work, and how they can be controlled throughout the entire lifecycle of an attack.
2:15pm-3:00pm Session Eight

Blue Coat Systems.

Grant Asplund
Sr. Technology Evangelist

Embracing Mobility 
Liberate Employees to Work Their Way – and Empower Your Business

The growing use of smartphones and tablets along with
Bring Your Own Device (BYOD) initiatives are fundamentally changing the game.  However, 76% of IT leaders see security as a barrier to enabling employees to choose their own devices, technology and applications at will. You have the unique opportunity to empower your organization by helping it embrace the new possibilities of mobility and its promise of collaboration, productivity, and innovation – without compromising on security.

3:00pm-3:15pm Break/Vendor Booth Time
3:15pm-3:45pm Session Nine


David Dixon
Territory Account Manager


Wi-Fi Optimization: Every day, another 4 million devices are activated. Are you ready?

The mobile enterprise challenges are mounting: enabling users simple and secure access to the network, ensuring applications run smoothly, and building sufficient capacity to handle unpredictable usage and future growth. A superior level of Wi-Fi design is now required—something shown to be lacking by a recent Gartner report: “By 2015, 80% of newly installed wireless networks will be obsolete because of a lack of proper planning.”  A clear indication of the problem is that a typical wireless user is provisioned with less than 5% of the bandwidth of a typical wired user. Wi-Fi Optimization includes designing for: the user, device, application, spectrum and capacity. This session will examine critical design components to ensure predictable performance, even under heavy loads.

>>click here for the presentation

3:45pm-4:15pm Session Ten

Code 42

Nick Stefanow
Account Executive

Endpoint Backup: Public, Private or Hybrid Cloud?

Learn how enterprises can leverage public and private cloud backup strategies to confidently protect information.

  Prize Drawings For All In Attendance
4:15pm-5:00pm Session Eleven

Meru Networks

Mike Ruiz
Consulting Systems Engineer

Simply connected, Simply secured: Policy Based Access in any Network

With the ever-increasing demand for simultaneous access to personal and work applications from a mix of institutionally owned and personal devices, network administrators often find themselves stymied.    Seamlessly melding policy and technology can be seem like an ominous project,  especially in the heterogeneous networks found today.  Meru Networks has focused on delivering a best-of-breed Wi-Fi solution and has extended that philosophy into a best-of-breed Identity driven network policy engine that can bridge the gap between any network and any device.  Join Mike Ruiz, Consulting Engineer from Meru Networks, to discuss ways to securely deliver a consistent and simple network experience to your users wherever they are, whatever they use.

>>click here for the presentation

  Prize Drawings For All In Attendance

Event Sponsors/Exhibitors

Accuvant, Inc.
Aerohive Networks, Inc.
AirWatch, LLC
AhnLab, Inc.
ArcMail Technology
Atrion Communications Resources
Blue Coat Systems.
BrightPlanIT Inc.
Code 42
Cyber-Ark Software, Ltd.
Extreme Networks
F5 Networks, Inc.
Fiberlink Communications Corp
FishNet Security, Inc.
Fortinet, Inc.
infrastructureWORKS LLC
Kaspersky Lab
LANDesk Software
Meru Networks
paloalto Networks
Patriot Technologies, Inc.
Sims Recycling Solutions
Sourcefire, Inc.
Trend Micro Incorporated
Varonis Systems
Viper Network Systems, LLC.  
WatchGuard Technologies, Inc.
Wave Systems Corp.
Websense, Inc.
Wontok Enterprises
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy