Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Atlanta Tech-Security Conference

Date: Thursday, October 3, 2013
Location:

Cobb Galleria Centre
2 Galleria Pkwy SE, Atlanta, GA 30339
p: 770.955.8000

>>click here for directions

Overview

The Atlanta Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Aerohive Networks, Inc.

Rich Korb
Systems Engineer

Transforming Your Network into a Platform for Mobility

The modern “mobile-first” enterprise network requires a mobility-optimized approach that is not simply dependent on network access for policy enforcement and control. Contextual elements, such as user identity, device type, application, location, and time of day are the primary building blocks used to create granular policies that dictate how, when, and what the user can access. In this session, we’ll assess the mobility-optimized approach which tightly integrates systems and adds contextual intelligence to create sophisticated “user centric” policies that reduce the complexities of a highly mobile user base. This will provide a vision for how optimizing for mobility can transform your network into a platform for mobility; a platform able to add business value, reduce operational cost and regain control of your network.

>>click on the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:45am Session Two

AirTight Networks, Inc.

Devin Akin
Chief Evangelist

The Inevitable “Appification” of Wi-Fi: From Transport to Application Delivery

In this session, you will discover why and how the Wi-Fi industry is moving towards providing software solutions and applications that match new customer requirements --beyond hardware speeds and feeds. Learn why this trend is also driving the transition to cloud architectures and what that means to both IT managers and systems integrators.

The “appification” is bringing fun back into Wi-Fi – meaning that the technology can be easy and exciting to use. Learn about these new trends and why Wi-Fi will never be the same again.

About the speaker: Devin Akin is Chief Evangelist at AirTight. He has 15 years of experience in the WLAN market and 20 years in IT, co-founding CWNP, the de facto standard for vendor-neutral Wi-Fi training and certification. Devin was CTO at CWNP until 2009, serving as the primary subject matter expert, speaker, instructor, and blogger. Devin moved to Aerohive Networks in 2009, where he served as Chief Wi-Fi Architect and Evangelist for 4 years, championing cloud and controller-less Wi-Fi technology. He has authored and edited several books for Wiley-Sybex and McGraw-Hill and holds many industry certifications, including CWNE.

10:45am-11:15am Session Three

Bit9

Bobby Lane

Accuvant, Inc.

Trust-based Security: A Proactive Approach that Puts You in Control

In 2012 we’ve seen an unprecedented rise in targeted cyber attacks and an acceleration of the loss of core IP.  While state sponsored attacks and cyber espionage have been occurring for decades, the level of disclosure and visibility of these attacks is rising to new levels. We are witnessing the greatest theft of intellectual property in history. Industry analysts state traditional Anti-virus security does not work and is “fighting a losing battle”. A trust-based approach is the most effective way to stop advanced threats and malware

In this session, attendees will receive an in-depth review of the importance of a trust-based security solution.

11:15am-11:45pm Break/Vendor Booth Time/Lunch
11:45pm-12:15pm Session Four

Varonis Systems

Mike Sheeran

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

12:15pm-12:30pm Break/Vendor Booth Time
12:30pm-1:00pm Session Five

Gigamon

Jim Hanson

Riverbed Technology

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

1:00pm-1:30pm Session Six

FireEye, Inc.

Mark Stanford
Sr. SE Manager
Southeast | Mid-Atlantic

Guidance Software Inc.

Next Generation Threat Protection Against Advance Malware, Zero Day Attacks, and Advanced Persistent Threats (APTs)

Traditional network defenses have generally done a very good job of addressing historic threat landscape, but the gap between detection of a novel threat and reaction to it has left countless organizations vulnerable to zero-day attacks, personalized spearphishing and advanced persistent threats (APTs). We will discuss the nature of these new threats and FireEye's solution for addressing them. Whether your adversary is across the street or over the ocean, the reactive nature of current defense-in-depth technologies has left your windows cracked to opportunistic criminal attacks and highly-orchestrated campaigns by nation-states.

Mark has worked in the security space for over 15 years, having held positions from being security architect on the customer side, to his being a cryptography engineer for F-Secure Corp.  He was most recently at Websense, Inc. as the Southeastern (and for a time Federal) SE Manager.  He's led southeastern / mid-atlantic teams at Blue Coat Systems (where he was also a Sr. Engineer) and f5 (southeast, mid-atlantic and for a time strategic), and is no stranger to security start-ups, having been at Top Layer, Mirage Networks and 8e6 (now TrustWave).  Building communication / collaboration platforms specifically for SE orgs, training / enabling teams (partner and internal), and working with leadership strategically to ensure sales success, enablement and growth are things that Mark has focused on in his management career.  His love for technology, and security in general, has brought him to FireEye where he leads the SE team for the Southeast and Mid-Atlantic.

1:30pm-1:45pm Break/Vendor Booth Time
1:45pm-2:30pm Session Seven

WatchGuard Technologies, Inc.

Brad Tompkins

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

2:30pm-3:00pm Session Eight

Axway

Shawn Ryan

Bill Reeves

Govern the Flow of Data:
Moving from Chaos to Control

 

>>click here for the presentation

3:00pm-3:15pm Break/Vendor Booth Time
3:15pm-4:00pm Session Nine

Cyber-Ark Software, Ltd.

Aleck Brailsford
Regional System Engineer Manager
Mid-Atlantic, Federal and Southeast USA

The Privileged Pathway: Protect Against Threats by Locking Down the Road Most Traveled

  Prize Drawings For All In Attendance
4:00pm-4:45pm Session Ten

Centrify Corporation

John Kimberly
System Engineer

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?

Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting SaaS and mobile computing using a single, unified approach.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.
  • Learn about approaches for managing privileged user access to servers and apps.

>>click here for the presentation

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

Accuvant, Inc.
Aercor Wireless, Inc.
Aerohive Networks, Inc.
AhnLab, Inc.
AirTight Networks, Inc.
AirWatch, LLC
Alert Logic
ArcMail Technology
Arista Networks, Inc.
Axway
BeyondTrust Software, Inc.
Bit9
BrightPlanIT Inc.
Celestix Networks, Inc.
Centrify Corporation
Cenzic, Inc.
Compliance Engineering, Inc
Cyber-Ark Software, Ltd.
ESET, LLC
FishNet Security, Inc.
FireEye, Inc.
FireMon
ForeScout Technologies
Gigamon
Guidance Software Inc.
IEEE Atlanta
Infoblox Inc.
 Ixia NVS
Kaspersky Lab
WESCOTT TECHNOLOGIES CORPORATION D.B.A LOCKSTEP TECHNOLOGY GROUP
LogRhythm
Milestone Systems, Inc.
Net Optics
NetScout Systems, Inc.
nFront Security, Inc
NH&A LLC
Norman Shark
Novacoast
Novell, Inc.
paloalto Networks
Promisec
ReliaQuest 
Riverbed Technology
SafeNet
SecureAuth
http://www.solutionary.com/
Sophos PLC
STC Atlanta – Society for Technical Communication
Tenable Network Security
Tufin Software Technologies Ltd.
UTGSolutions
Varonis Systems
VENAFI
WatchGuard Technologies, Inc.
Zenith Infotech Ltd. 
   Copyright © 2009-2013. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy