What We Do
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013

Memphis Tech-Security Conference

Date: Thursday, October 10, 2013

Memphis Cook Convention Center
255 N. Main St., Memphis, TN, 38103
p: 901.576.1200

>>click here for directions


The Memphis Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Aerohive Networks, Inc.

Brice Layton
VP of Sales – East

Transforming Your Network into a Platform for Mobility

The modern “mobile-first” enterprise network requires a mobility-optimized approach that is not simply dependent on network access for policy enforcement and control. Contextual elements, such as user identity, device type, application, location, and time of day are the primary building blocks used to create granular policies that dictate how, when, and what the user can access. In this session, we’ll assess the mobility-optimized approach which tightly integrates systems and adds contextual intelligence to create sophisticated “user centric” policies that reduce the complexities of a highly mobile user base. This will provide a vision for how optimizing for mobility can transform your network into a platform for mobility; a platform able to add business value, reduce operational cost and regain control of your network.

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:30am Session Two

FireEye, Inc.

Mark Stanford
Sr. SE Manager
Southeast | Mid-Atlantic Region

Guidance Software Inc.

Next Generation Threat Protection Against Advance Malware, Zero Day Attacks, and Advanced Persistent Threats (APTs)

Traditional network defenses have generally done a very good job of addressing historic threat landscape, but the gap between detection of a novel threat and reaction to it has left countless organizations vulnerable to zero-day attacks, personalized spearphishing and advanced persistent threats (APTs). We will discuss the nature of these new threats and FireEye's solution for addressing them. Whether your adversary is across the street or over the ocean, the reactive nature of current defense-in-depth technologies has left your windows cracked to opportunistic criminal attacks and highly-orchestrated campaigns by nation-states.

Mark has worked in the security space for over 15 years, having held positions from being security architect on the customer side, to his being a cryptography engineer for F-Secure Corp.  He was most recently at Websense, Inc. as the Southeastern (and for a time Federal) SE Manager.  He's led southeastern / mid-atlantic teams at Blue Coat Systems (where he was also a Sr. Engineer) and f5 (southeast, mid-atlantic and for a time strategic), and is no stranger to security start-ups, having been at Top Layer, Mirage Networks and 8e6 (now TrustWave).  Building communication / collaboration platforms specifically for SE orgs, training / enabling teams (partner and internal), and working with leadership strategically to ensure sales success, enablement and growth are things that Mark has focused on in his management career.  His love for technology, and security in general, has brought him to FireEye where he leads the SE team for the Southeast and Mid-Atlantic.

10:30am-11:15am Session Three

WatchGuard Technologies, Inc.

Brad Tompkins

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:30pm Session Four

Cyber-Ark Software, Ltd.

Mitch Moosbrugger

The problem with Privilege –  identifying the risk of privileged account misuse in the modern enterprise.

Privileged Accounts are a vulnerability that is built-in to every device and application that exists within your enterprise.  They are the main vector for attacks whether internal or external, meaning that securing and monitoring access to them is becoming the number one priority for corporations whatever their size.   This presentation will examine how these accounts are exploited, where they are found and the considerations that should be taken into account when embarking on a program to secure them.   With real world examples  and examinations of attacks and exploits, it should provide a valuable insight into this extremely current topic.

12:30pm-12:45pm Break/Vendor Booth Time
12:45pm-1:30pm Session Five

Centrify Corporation

John Kimberly
Systems Engineer

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?

Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting SaaS and mobile computing using a single, unified approach.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.
  • Learn about approaches for managing privileged user access to servers and apps.

>>click here for the presentation

1:30pm-2:15pm Session Six

Click Security

Rocky DeStefano
VP of Strategy & Technology

Enterprise Visibility & Security Analytics 

This presentation will discuss the importance of enterprise visibility and using security analytics to defend against advanced attacks. 
What is the baseline of visibility you need to do analysis? 
What works?
What does not work? 

>>click here for the presentation

2:15pm-2:30pm Break/Vendor Booth Time
2:30pm-3:15pm Session Seven

paloalto Networks

Jefri Hillon

Dynamic Security against Modern Threats in a Virtualized Environment

Securing the network has never been more challenging.  First, threats are increasingly targeted, fast-moving and evasive.  Second, the computing environment is constantly changing with initiatives like virtualization and BYOD.  This presentation reviews these challenges and offers approaches to network security that keeps pace with both the dynamic computing and threat landscapes.

>>click here for the presentation

3:15pm-3:45pm Session Eight


Bradd Schick

Are we still Secure?

PRISM has been disclosed and now we live in a new security concise world. We always thought this was happening, but now we know exactly how it is happening. Are we still secure? Can we trust our encryption? We will discuss the use of standards based federation, open source encryption, and limiting the exposure of your end users.

>>click here for the presentation

3:45pm-4:15pm Session Nine


Jason Eberhardt
Director of Business Development

Symantec Corporation

Securing your environment with Symantec Critical System Protection




>>click here for the presentation

  Prize Drawings For All In Attendance
4:15pm-4:45pm Session Ten

Arista Networks, Inc.

David Wolfenbarger
Systems Engineer

Network Visibility and Telemetry - the problem too big to ignore!

This presentation will focus on the need within the data center to provide real-time visibility with solutions that are both cost effective and scale at an unprecedented rate.  We will discuss the current threat profile of the network and evaluate how different visibility mechanisms provide the necessary network telemetry data.  We will discuss a solution set that can address these threat profiles in a simple and non-intrusive way by not just focusing on the tap/aggregation elements, but also combining a rich set of solutions from the best technology solutions partners in the industry.

  Prize Drawings For All In Attendance

Event Sponsors/Exhibitors

A10 Networks, Inc.
Aerohive Networks, Inc.
AhnLab, Inc.
AirWatch, LLC
Arista Networks, Inc.
BlueCat Networks
BrightPlanIT Inc.
Centrify Corporation
Click Security
Cyber-Ark Software, Ltd.
FireEye, Inc.
ForeScout Technologies
Guidance Software Inc.
Infoblox Inc.
Interwork Technologies Inc.
ISACA Memphis
 Ixia NVS
LANDesk Software
Meru Networks
Milestone Systems, Inc.
Net Optics
paloalto Networks
Sims Recycling Solutions
Tufin Software Technologies Ltd.
Varonis Systems
VASCO Data Security International, Inc.
WatchGuard Technologies, Inc.
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy