What We Do
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013

Cincinnati Tech-Security Conference

Date: Thursday, September 19, 2013

Millennium Hotel Cincinnati
150 West Fifth Street
Cincinnati, OH 45202-2393
p: 513.352.2100

Click here for directions


The Cincinnati Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One


Patrick Kenny
Regional Account Director


Trust-based Security: A Proactive Approach that Puts You in Control

In 2012 we’ve seen an unprecedented rise in targeted cyber attacks and an acceleration of the loss of core IP.  While state sponsored attacks and cyber espionage have been occurring for decades, the level of disclosure and visibility of these attacks is rising to new levels. We are witnessing the greatest theft of intellectual property in history. Industry analysts state traditional Anti-virus security does not work and is “fighting a losing battle”. A trust-based approach is the most effective way to stop advanced threats and malware

In this session, attendees will receive an in-depth review of the importance of a trust-based security solution.

>>click here for the presentation

9:15am-9:45am Session Two

Trend Micro Incorporated

Matt Hubbard
Sr. Regional Product Manager

Securing Your Physical, Virtual, Cloud Infrastructure

Protect confidential data, ensure compliance and prevent costly damage, without hindering productivity. Join Trend Micro and learn how to secure your data at rest or in motion; across the entire spectrum of computing. Let Trend empower you to prevent unauthorized access and data breeches throughout your enterprise, regardless of whether your infrastructure is physical, virtual or in the cloud.

>>click here for the presentation

9:45am-10:15am Break/Vendor Booth Time
10:15am-10:45am Session Three


Marc Holden

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

10:45am-11:15am Session Four


Thomas Masso

Key Steps of Protection for a First Line of Defense - Defending Against DDoS Attacks and Unwanted Traffic

With the number of successful attacks on the rise, it is evident that firewalls, intrusion prevention systems, and traditional security infrastructures are not equipped to combat them.  These technologies were not built to stop DDoS attacks, undesirable behaviors, advanced evasion attacks and other unwanted malicious traffic targeting your infrastructure.

Corero Network Security, an organization’s First Line of Defense, is the leading provider of Distributed Denial of Service (DDoS) defense.

11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:15pm Session Five

FireEye, Inc.

Tim Davidson
System Engineer

Creative Breakthroughs, Inc.

Malware pandemic?  Sometimes getting a shot only treats the symptoms and not the cause

Global brands continue to make the headlines following security incidents that result in the installation of malware that enables exfiltration of critical data.  A broad survey of global enterprises entities reveal that in fact almost all large companies are compromised by malware to varying degrees, despite near universal use of firewalls, web proxies, and desktop and email antivirus screening.  To some extent who ends up in the headlines may be a matter of bad luck.  Still, there is a very large range in the extent of the compromise (infection rates) and obviously the more malware kept out of the network, the lower the odds of a truly bad incident.

Malware uses a range of tactics to avoid detection, but they can be broken into two over-arching categories - to be broad but highly dynamic, or very targeted and narrow.  Malware in the former category will change it's MD5, domain of origin, etc many times a day.  In the second category falls the custom spear-phishing email attacks which continues to plague organizations.

Tim Davidson is a System Engineer at FireEye with over a decade of security industry experience.  As a well-rounded security practitioner, Tim works with customers and partners to utilize FireEye technology to provide clear Enterprise Threat Assessments of existing security architectures.  Tim is also responsible for assisting  with some of the largest enterprise customer architectures and APT prevention implementations.

>>click here for the presentation

12:15pm-12:30pm Break/Vendor Booth Time
12:30pm-1:15pm Session Six

WatchGuard Technologies, Inc.

Brian Leedy

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

1:15pm-2:00pm Session Seven

Centrify Corporation

Robertson Pimentel
Senior Sales Engineer

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?

Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting SaaS and mobile computing using a single, unified approach.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.
  • Learn about approaches for managing privileged user access to servers and apps.

>>click here for the presentation

2:00pm-2:15pm Break/Vendor Booth Time
2:15pm-3:00pm Session Eight

Check Point Software Technologies Ltd.

Kierk Sanderlin
Senior Security Engineering Manager

Modern Day Attacks & A Silent Security Audit

The presentation outlines major world events and new attack techniques that have been dissected or silently monitored in order to understand current and future attack vectors and better defend against them.

Kierk Sanderlin is a Senior Security Engineering Manager at Check Point Software Technologies and has over 15 years of experience in the network and endpoint security field.  Kierk spends much of his time listening to the security challenges of today’s largest and smallest organizations across many different business verticals and has dedicated his career to security, research and innovation to meet those challenges.

>>click here for the presentation

3:00pm-3:15pm Break/Vendor Booth Time
3:15pm-3:45pm Session Nine

EVault, Inc.

Jonathan Mayne

How to Choose the Right Cloud Service Week Provider



>>click here for the presentation

3:45pm-4:15pm Session Ten

Arista Networks, Inc.

Dean Nebrig
Director of Sales

Network Visibility and Telemetry - the problem too big to ignore!

This presentation will focus on the need within the data center to provide real-time visibility with solutions that are both cost effective and scale at an unprecedented rate.  We will discuss the current threat profile of the network and evaluate how different visibility mechanisms provide the necessary network telemetry data.  We will discuss a solution set that can address these threat profiles in a simple and non-intrusive way by not just focusing on the tap/aggregation elements, but also combining a rich set of solutions from the best technology solutions partners in the industry.

  Prize Drawings For All In Attendance
4:15pm-4:45pm Session Eleven

AhnLab, Inc.

Leo Versola
VP of Technology

Multi-Layered Malware /  Advanced Persistent Threat (APT)  Defense

Come learn why today's advanced and sophisticated malware and advanced persistent threats require a multi-layered, multi-dimensional approach to detection, prevention and remediation.  See how to leverage integration between cloud, network and endpoint technologies to achieve full spectrum protection.

Leo Versola brings over 20 years of proven success and expertise in the network security space helping early to late-stage startups as well as established, public companies internationally by building and managing world-class technical teams, both domestically and globally.  Prior to joining AhnLab, he has held various senior leadership roles at a number of technology companies including Barracuda Networks, WebSense, nCircle, RedSeal Networks, Fortinet, Juniper Networks and NetScreen Technologies.

  Prize Drawings For All In Attendance

Event Sponsors/Exhibitors

A10 Networks, Inc.
Aerohive Networks, Inc.
AhnLab, Inc.
AirWatch, LLC
Alert Logic
Arista Networks, Inc.
BeyondTrust Software, Inc.
Centrify Corporation
Check Point Software Technologies Ltd.
Core Security Technologies
Creative Breakthroughs, Inc.
EVault, Inc.
FireEye, Inc.
FishNet Security, Inc.
Fortinet, Inc.
Infoblox Inc.
Interface Masters, Inc.
 JAMF Software, LLC
Kaspersky Lab
LANDesk Software
MCS IT - Management Communication Services, Inc.
NetClarity, Inc.
NetIQ Corporation
Nexum, Inc.
Novell, Inc.
Riverbed Technology
Sourcefire, Inc.
Tenable Network Security
Trend Micro Incorporated
Varonis Systems
Viper Network Systems, LLC.  
WatchGuard Technologies, Inc.
Wave Systems Corp.
Websense, Inc.
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy