Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Montreal Tech-Security Conference

Date: Thursday, September 12, 2013
Location:

Delta Centre-Ville (Downtown Montreal Hotel)
777 University Street
Montreal
Quebec, H3C 3Z7
p: 514.879.1370

>>click here for directions

Overview

The Montreal Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Silver Peak Systems, Inc.

Scott Stanney
Systems Engineer
North East Region

Quadbridge Inc.

The next generation of data Acceleration

Rapidly Move Data Anytime, Anywhere

 


 

 



>>click here for the presentation

9:15am-9:45am Session Two

Entrust

Steve Croucher

Turning the Mobile Device Evolution in Your Favor

The Emerging Mobile Landscape and the Positive Effects on Security and Business Enablement

 

9:45am-10:15am Break/Vendor Booth Time
10:15am-10:45am Session Three

Gigamon

Jason Brydges

 

Riverbed Technology

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

10:45am-11:15pm Session Four

FireEye, Inc.

Philippe Dumont

Malware pandemic?  Sometimes getting a shot only treats the symptoms and not the cause

Global brands continue to make the headlines following security incidents that result in the installation of malware that enables exfiltration of critical data.  A broad survey of global enterprises entities reveal that in fact almost all large companies are compromised by malware to varying degrees, despite near universal use of firewalls, web proxies, and desktop and email antivirus screening.  To some extent who ends up in the headlines may be a matter of bad luck.  Still, there is a very large range in the extent of the compromise (infection rates) and obviously the more malware kept out of the network, the lower the odds of a truly bad incident. Malware uses a range of tactics to avoid detection, but they can be broken into two over-arching categories - to be broad but highly dynamic, or very targeted and narrow.  Learn how FireEye views the problem of Advanced Persistent Threats.

>>click here for the presentation

11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:15pm Session Five

Corero

Stephen Gates

Key Steps of Protection for a First Line of Defense - Defending Against DDoS Attacks and Unwanted Traffic

With the number of successful attacks on the rise, it is evident that firewalls, intrusion prevention systems, and traditional security infrastructures are not equipped to combat them.  These technologies were not built to stop DDoS attacks, undesirable behaviors, advanced evasion attacks and other unwanted malicious traffic targeting your infrastructure.

Corero Network Security, an organization’s First Line of Defense, is the leading provider of Distributed Denial of Service (DDoS) defense.

12:15pm-12:30pm Break/Vendor Booth Time
12:30pm-1:15pm Session Six

Click Security

Rocky DeStefano
VP of Strategy & Technology

Enterprise Visibility & Security Analytics

This presentation will discuss the importance of enterprise visibility and using security analytics to defend against advanced attacks. 

  • What is the baseline of visibility you need to do analysis? 
  • What works?
  • What does not work?

>>click here for the presentation

1:15pm-2:00pm Session Seven

IBM

Stewart Wolfe, CISSP, CISA, CISM
Security Project Executive, Security & Strategy Services IBM

Managing The Cyber Security threat Landscape - Are we becoming more secure?

Over the past year, the IT security space has had numerous mainstream headlines. From the discovery of  sophisticated toolkits with ominous names like Flame to cross-platform zero-day vulnerabilities, both  consumers and corporations were inundated with advisories and alerts regarding emerging threats. The frequency of data breaches and incidents?which had already hit a new high in 2011? continued their upward trajectory.

This presentation will focus on the IBM 10 essential practices to effectively deal with the Cyber Security landscape.

2:00pm-2:15pm Break/Vendor Booth Time
2:15pm-2:45pm Session Eight

Bit9

Francis LeGault
Strategic Account manager

INSA

 

Trust-based Security: A Proactive Approach that Puts You in Control

In 2012 we’ve seen an unprecedented rise in targeted cyber attacks and an acceleration of the loss of core IP.  While state sponsored attacks and cyber espionage have been occurring for decades, the level of disclosure and visibility of these attacks is rising to new levels. We are witnessing the greatest theft of intellectual property in history. Industry analysts state traditional Anti-virus security does not work and is “fighting a losing battle”. A trust-based approach is the most effective way to stop advanced threats and malware

In this session, attendees will receive an in-depth review of the importance of a trust-based security solution.

2:45pm-3:00pm Break/Vendor Booth Time
3:00pm-3:45pm Session Nine

Blue Coat Systems.

Mohammad Kaouk

Embracing Mobility 
Liberate Employees to Work Their Way – and Empower Your Business

The growing use of smartphones and tablets along with
Bring Your Own Device (BYOD) initiatives are fundamentally changing the game.  However, 76% of IT leaders see security as a barrier to enabling employees to choose their own devices, technology and applications at will. You have the unique opportunity to empower your organization by helping it embrace the new possibilities of mobility and its promise of collaboration, productivity, and innovation – without compromising on security.

  Prize Drawings For All In Attendance
3:45pm-4:30pm Session Ten

Bradford Networks

Matt Noon
Regional Sales Manager

Onboarding Personal Devices to Corporate Networks

Many IT organizations are being asked to allow personal devices onto corporate networks.  Unlike corporate-issued devices that are well-managed and under IT’s control, this new Bring-Your-Own-Device (BYOD) initiative introduces a unique set of security challenges that require a balance of flexibility, visibility, security.

This presentation will explain the concept of a “BYOD Blueprint” and lessons learned from onboarding personal devices to over 800 networks around the world.

>>click here for the presentation

  Prize Drawings For All In Attendance
4:30pm-5:15pm Session Eleven

Fortinet, Inc.

Mathieu Nantel
Conseiller Technique - Est du Canada

Shielding a website : how a web application firewall can do so much more than firewalls and IPSes.

Web threats are in perpetual evolution and websites continue to be a prime target for attackers wanting to access critical information. Securing regulations like the PCI DSS have spun off an array of products aimed at lowering the exposure risk against web borne attacks like those described by the OWASP Top10.

Web applications continue to increase in complexity and are gradually more challenging to understand and to enforce security for at the code level, when said code is available in the first place. Continued commercial pressure to accelerate go to market speeds make the deployment of a WAF a critical component of a secured external or internal web application by empowering security professionals with a tool that allows for positive and negative security enforcement.

This session will allow you to discover how FortiWeb offers an advanced multilayered security approach to web application protection in order to shield your data against internal and external threats.

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

Aerohive Networks, Inc.
AhnLab, Inc.
AirWatch, LLC
Altea Communications Inc.
Arista Networks, Inc.
Beyond Security
Bit9
Blue Coat Systems.
Bradford Networks
Click Security
Corero
Core Security Technologies
Entrust
F5 Networks, Inc.
FireEye, Inc.
Fixmo Inc.
Fortinet, Inc.
Gigamon
IBM
INSA
Interwork Technologies Inc.
ITWatchDogs
 Ixia NVS
Kaspersky Lab
KEMP Technologies, Inc.
LANDesk Software
LogLogic, Inc.
LogRhythm
LE GROUPE TECHNIQUE MICROCOMP
Novell, Inc.
Quadbridge Inc.
Riverbed Technology
Secure Links
Silver Peak Systems, Inc.
Solantus Inc.
Sourcefire, Inc.
Tripwire, Inc.
Varonis Systems
VASCO Data Security International, Inc.
WatchGuard Technologies, Inc.
Websense, Inc.
WILDPACKETS, INC
WinMagic Inc.
XIRRUS
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy