What We Do
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013

New York Tech-Security Conference

Date: Thursday, October 17, 2013

The New Yorker Hotel
481 8th Avenue
New York, NY 10001
p: 212.971.0101

>>click here for directions


The New York Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Fixmo Inc.

Tyler Lessard
Chief Marketing & Product Officer

Embracing Mobility and BYOD Without Compromising Security or Compliance

Mobile devices have become an unstoppable force within the Enterprise, and the bring-your-own-device (BYOD) approach is nowbeing adopted across all industries. Next-generation mobility holds the promise of improved business productivity, real-time collaboration and operational efficiency, but it also exposes organizations to increased risk of corporate data leakage and cyber attacks. So how can organizations truly embrace mobility and BYOD without sacrificing security or compliance? Join this session for a discussion on the risks associated with mobile devices and the BYOD approach, and emerging technologies for protecting corporate data and maintaining compliance as mobility becomes mainstream in your organization.

9:15am-9:45am Break/Vendor Booth Time
9:45am-10:15am Session Two


Aaron Cote

CipherTechs, Inc.

Trust-based Security: A Proactive Approach that Puts You in Control

In 2012 we’ve seen an unprecedented rise in targeted cyber attacks and an acceleration of the loss of core IP.  While state sponsored attacks and cyber espionage have been occurring for decades, the level of disclosure and visibility of these attacks is rising to new levels. We are witnessing the greatest theft of intellectual property in history. Industry analysts state traditional Anti-virus security does not work and is “fighting a losing battle”. A trust-based approach is the most effective way to stop advanced threats and malware

In this session, attendees will receive an in-depth review of the importance of a trust-based security solution.

10:15am-10:45am Session Three

GTB Technologies Inc.

Uzi Yair

DLP or DLD? The Keys to a Sucessful Data Loss Prevention Program


>>click here for the presentation

10:45am-11:15pm Session Four

Trend Micro Incorporated

Kazbek Khumush
Senior Sales Engineer

Securing Your Physical, Virtual, Cloud Infrastructure

Protect confidential data, ensure compliance and prevent costly damage, without hindering productivity. Join Trend Micro and learn how to secure your data at rest or in motion; across the entire spectrum of computing. Let Trend empower you to prevent unauthorized access and data breeches throughout your enterprise, regardless of whether your infrastructure is physical, virtual or in the cloud.

>>click here for the presentation

11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:15pm Session Five


Stephen Gates

Key Steps of Protection for a First Line of Defense - Defending Against DDoS Attacks and Unwanted Traffic

With the number of successful attacks on the rise, it is evident that firewalls, intrusion prevention systems, and traditional security infrastructures are not equipped to combat them.  These technologies were not built to stop DDoS attacks, undesirable behaviors, advanced evasion attacks and other unwanted malicious traffic targeting your infrastructure.

Corero Network Security, an organization’s First Line of Defense, is the leading provider of Distributed Denial of Service (DDoS) defense.

12:15pm-12:30pm Break/Vendor Booth Time
12:30pm-1:00pm Session Six


Patrick Kane

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

1:00pm-1:30pm Session Seven


Gregory Webb

A blueprint for the perfect attack: Addressing the open doors in your APT strategy

Targeted cyber-attacks are steadily increasing, and business executives face challenges with trust exploits. While organizations adopt cloud computing and allow employee owned devices (BYOD movement) onto the network, the challenge of securing company data everywhere increases exponentially—especially when the organization does not own the devices or infrastructure that its data is housed on or accessed from.

When it comes to advanced persistent threats (APTs), bad actors will take advantage of any and every exploit that they can use to steal your data, and look for the weakest link in your security systems. Common, well-known trust exploits like digitally signed malware with stolen private keys, poor key and certificate management, fraudulent certificates, and weak outdated cryptographic methods are all still in place in many organizations.

The problem is systemic and the exposure significant. Over half of all enterprises don’t know how many keys and certificates are in use, for instance. More than sixty percent of organizations would take a day or more to correct CA trust relationships if attacked by digitally signed malware or respond to a compromised SSH key. Combine the inability to understand how trust is established with the incapacity to quickly respond when it breaks down, and you have the perfect vehicle for APT and sophisticated attackers to launch their exploits.
With APTs leveraging these weaknesses, it’s critical to have visibility and control of enterprise key and certificate inventories. Cyber criminals understand that the easy targets are those organizations that have little visibility into their threat surface and cannot respond quickly. We need to gain control over trust; we need to plug the gap related to key & certificate-based exploits.

Learning objectives:

  • Gain insight into the current trust exploits and how recent primary research from the Ponemon Institute places Global 2000 organizations at nearly $400 million in exposure over two years
  • Find out some of the top threats and concerns that global 2000 organizations are facing today, and understand where you fit in on the industry scorecard for trust exploits
  • Learn what steps you need to take in order to gain control over trust and ensure proper enterprise-wide key and certificate management


1:30pm-1:45pm Break/Vendor Booth Time
1:45pm-2:30pm Session Eight

WatchGuard Technologies, Inc.

Steve Butera

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

2:30pm-3:00pm Session Nine


Susan Feinberg

Govern the Flow of Data:
Moving from Chaos to Control

>>click here for the presentation

3:00pm-3:15pm Break/Vendor Booth Time
3:15pm-4:00pm Session Ten

Cyber-Ark Software, Ltd.

Dan Hacker
AE NYC Metro

Evan Litwak
Manager of Solution Engineers North East


Secure, Manage and Control Privileged Accounts

Identity Management Tools, such as Single Sign-On and Directories are examples of important building blocks in any organization's Identity Management infrastructure. However, these tools are only geared towards individual users. An additional solution for privileged users should be deployed to complement the Identity Management Infrastructure.
This presentation will focus on best practices in:

  • Frequent and automatic password changes of shared privileged accounts
  • Automatically detecting and managing Service accounts
  • Privileged Session recording and management
  • Strong auditing of privileged passwords usage to ensure accountability
  • Secured long term storage and automatic failover to eliminate risks of loss and to ensure availability during disaster recovery
  • Removing clear text passwords embedded in scripts, and automatically changing them according to corporate policy
  Prize Drawings For All In Attendance
4:00pm-4:45pm Session Eleven

Invincea, Inc.

Steve Ward
VP of Marketing

Free the User | Contain the Threat

Can you have your cake and eat it too?

  • Can you find a way to meet the demands of the business while at the same time the need to secure it? 
  • Can you stop advanced targeted attacks dead in their tracks without changing employee workflows?
  • Can you change security from a group that 'gets in the way' to the one that 'ignites productivity'?
  • Can you solve the user problem without restricting the user?

With Invincea...yes, you can!

Find out how you can Free the User but at the same time Contain the Threat...

Join us for this informative discussion in which we'll talk through:

  • How the user has become the primary target of attack with real-world case studies on spear-phishing, watering hole attacks and drive by downloads
  • How Invincea's unique, non-signature based secure virtual container technology protects your network against user-targeted attacks and user-initiated compromise
  • How you can finally deliver unfettered access to the Internet for your users without exposing the network to breach
  • Why Dell recently selected Invincea as its only, direct from factory anti-malware partner - touching 20m+ machines, and how this relationship can benefit you
  • How Invincea clients are reducing costs, increasing employee productivity and avoiding the damage of breach

This is revolutionary stuff - a ying and yang proposition the likes of which you've not had in the past...attend this session and get on the path to becoming an internal hero.

  Prize Drawings For All In Attendance

Event Sponsors/Exhibitors

4A Security
AccessIT Group, Inc.
Accuvant, Inc.
Aerohive Networks, Inc.
AhnLab, Inc.
AirWatch, LLC
AirTight Networks, Inc.
Alert Logic
ArcMail Technology
Arista Networks, Inc.
Atrion Communications Resources
 Belkin International,Inc
Beyond Security
BeyondTrust Software, Inc.
Blue Coat Systems.
Bradford Networks
BrightPlanIT Inc.
Celestix Networks, Inc.
Check Point Software Technologies Ltd.
CipherTechs, Inc.
Click Security
Code 42
Cyber-Ark Software, Ltd.
Dyntek Services, Inc.
Enterprise Risk Associates, LLC
EVault, Inc.
F5 Networks, Inc.
FishNet Security, Inc.
Fixmo Inc.
Fortinet, Inc.
GTB Technologies Inc.
Invincea, Inc.
Kaspersky Lab
LANDesk Software
McAfee, Inc.
Meru Networks
NetIQ Corporation
Network Security Group, Inc.
Norman Shark
PacketLogix, Inc.
paloalto Networks
Patriot Technologies, Inc.
Protegrity Corporation
Shavlik Technologies, LLC
Sims Recycling Solutions
SSH Communications Security
Trend Micro Incorporated
Varonis Systems
VASCO Data Security International, Inc.
WatchGuard Technologies, Inc.
Websense, Inc.
Wontok Enterprises
Zenith Infotech Ltd. 
Zix Corporation
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy