What We Do
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013

Albuquerque Tech-Security Conference

Date: Thursday, October 31, 2013

Hyatt Regency Albuquerque
330 Tijeras NW,
Albuquerque, NM 87102
p: 505.842.1234

>>click here for directions


The Albuquerque Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Aerohive Networks, Inc.

Brad Hall
Inside Sales Manager

Transforming Your Network into a Platform for Mobility

The modern “mobile-first” enterprise network requires a mobility-optimized approach that is not simply dependent on network access for policy enforcement and control. Contextual elements, such as user identity, device type, application, location, and time of day are the primary building blocks used to create granular policies that dictate how, when, and what the user can access. In this session, we’ll assess the mobility-optimized approach which tightly integrates systems and adds contextual intelligence to create sophisticated “user centric” policies that reduce the complexities of a highly mobile user base. This will provide a vision for how optimizing for mobility can transform your network into a platform for mobility; a platform able to add business value, reduce operational cost and regain control of your network.

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:30am Session Two


Eric Dix

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

10:30am-11:15am Session Three

Blue Coat Systems.

Grant Asplund
Sr. Technology Evangelist

Embracing Mobility 
Liberate Employees to Work Their Way – and Empower Your Business

The growing use of smartphones and tablets along with
Bring Your Own Device (BYOD) initiatives are fundamentally changing the game.  However, 76% of IT leaders see security as a barrier to enabling employees to choose their own devices, technology and applications at will. You have the unique opportunity to empower your organization by helping it embrace the new possibilities of mobility and its promise of collaboration, productivity, and innovation – without compromising on security.

11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:15pm Session Four

Ruckus Wireless, Inc

Troy Schaetzle

Better Wi-Fi coming in waves, literally.

802.11ac is all the rage, and rightfully so. It represents another fundamental change in the innovation of the 802.11 protocol that promises to boost speeds into the gigabit world.


12:15pm-12:30pm Break/Vendor Booth Time
12:30pm-1:00pm Session Five


John Weeks


Wi-Fi Optimization: Every day, another 4 million devices are activated. Are you ready?

The mobile enterprise challenges are mounting: enabling users simple and secure access to the network, ensuring applications run smoothly, and building sufficient capacity to handle unpredictable usage and future growth. A superior level of Wi-Fi design is now required—something shown to be lacking by a recent Gartner report: “By 2015, 80% of newly installed wireless networks will be obsolete because of a lack of proper planning.”  A clear indication of the problem is that a typical wireless user is provisioned with less than 5% of the bandwidth of a typical wired user. Wi-Fi Optimization includes designing for: the user, device, application, spectrum and capacity. This session will examine critical design components to ensure predictable performance, even under heavy loads.

1:00pm-1:45pm Session Six

Check Point Software Technologies Ltd.

Mark Bennett
Security Engineer


Do you know what‘s hiding in your network?

It is hard enough to protect your enterprise against threats, but what can you do when you do not know what malware is targeting you or that attacks are even occurring.  Join Mark Bennett, Check Point’s Security Engineer as he will present what we discovered in 900 customers’ networks from undetected bots, usage of risky applications, potential data losses and much more.  More importantly Mark will discuss a security blueprint recommendation based on multi-layered threat prevention to help fend against known and unknown cyber-threats.

>>click here for presentation
(presentation is a 35 min. video, YouTube)

1:45pm-2:00pm Break/Vendor Booth Time
2:00pm-2:45pm Session Seven

BEW Global

Eric Stevens
Senior Solution Advisor

Building a Critical Asset Protection Program

Organizations are swimming in data and every day are becoming more interconnected with partners and vendors on the “Global Electronic Nervous System”. Because of this, companies need to plan, implement and maintain a Critical Asset Protection Program that clearly defines what assets are deemed most important to the organization based on revenue, income, reputation and core operational impact. 

Join BEW Global Senior Solution Advisor, Eric Stevens, as he discusses the step-by-step process and methodology to building a risk-based, cost-effective program. Specific topics discussed will include:

  • Obtaining executive level program buy-in
  • Designing, building and maintaining an Information Security Management Systems (ISMS)
  • Identifying critical assets and how they are created, stored, used and transmitted
  • Evaluating existing technologies and opportunities for new security tools

>>click here for the presentation

2:45pm-3:15pm Session Eight

Arista Networks, Inc.

Josh Frank
Systems Engineer

Network Applications - How Visibility and Telemetry can solve the problems arising in the Data Center

This presentation will focus on the need within the data center to provide real-time visibility with solutions that are both cost effective and scale at an unprecedented rate.  We will discuss the current threat profile of the network and evaluate how different visibility mechanisms provide the necessary network telemetry data.  We will discuss a solution set that can address these threat profiles in a simple and non-intrusive way by not just focusing on the tap/aggregation elements, but also combining a rich set of solutions from the best technology solutions partners in the industry.

  Prize Drawings For All In Attendance

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
Aerohive Networks, Inc.
AirWatch, LLC
Aquila Group
ArcMail Technology
Arista Networks, Inc.
Aruba Networks, Inc.
BEW Global
Blue Coat Systems.
BrightPlanIT Inc.
Check Point Software Technologies Ltd.
F5 Networks, Inc.
Infoblox Inc.
 Ixia NVS
Kaspersky Lab
Network Critical Solutions Limited
paloalto Networks
RedSeal Networks, Inc.
Ruckus Wireless, Inc
Shavlik Technologies, LLC
Sourcefire, Inc.
Technology Integration Group
Tripwire, Inc.
Varonis Systems
WatchGuard Technologies, Inc.
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy