Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Milwaukee Tech-Security Conference

Date: Thursday, September 26, 2013
Location:

Hyatt Regency Milwaukee
333 West Kilbourn Avenue
Milwaukee, Wisconsin, USA, 53203
p: 414.276.1234

>>click here for directions

Overview

The Milwaukee Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Entrust

Ruben Garcia

Turning the Mobile Device Evolution in Your Favor

The Emerging Mobile Landscape and the Positive Effects on Security and Business Enablement

 

>>click here for the presentation

9:15am-9:45am Session Two

FireEye, Inc.

Dan Lukas
Sr. Systems Engineer

“Malware pandemic?  Sometimes getting a shot only treats the symptoms and not the cause”...

Global brands continue to make the headlines following security incidents that result in the installation of malware that enables exfiltration of critical data.  A broad survey of global enterprises entities reveal that in fact almost all large companies are compromised by malware to varying degrees, despite near universal use of firewalls, web proxies, and desktop and email antivirus screening.  To some extent who ends up in the headlines may be a matter of bad luck.  Still, there is a very large range in the extent of the compromise (infection rates) and obviously the more malware kept out of the network, the lower the odds of a truly bad incident.

Malware uses a range of tactics to avoid detection, but they can be broken into two over-arching categories - to be broad but highly dynamic, or very targeted and narrow.  Malware in the former category will change it's MD5, domain of origin, etc many times a day.  In the second category falls the custom spear-phishing email attacks which continues to plague organizations.

>>click here for the presentation

9:45am-10:15am Break/Vendor Booth Time
10:15am-10:45am Session Three

Gigamon

John Mulford

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

10:45am-11:30am Session Four

WatchGuard Technologies, Inc.

Bill Larsen

 

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

 

11:30am-12:00pm Break/Vendor Booth Time
12:00pm-12:30pm Session Five

Corero

Thomas Masso

Key Steps of Protection for a First Line of Defense - Defending Against DDoS Attacks and Unwanted Traffic

With the number of successful attacks on the rise, it is evident that firewalls, intrusion prevention systems, and traditional security infrastructures are not equipped to combat them.  These technologies were not built to stop DDoS attacks, undesirable behaviors, advanced evasion attacks and other unwanted malicious traffic targeting your infrastructure.

Corero Network Security, an organization’s First Line of Defense, is the leading provider of Distributed Denial of Service (DDoS) defense.

12:30pm-12:45pm Break/Vendor Booth Time/Lunch
12:45pm-1:30pm Session Six

Cyber-Ark Software, Ltd.

Dave Adamczyk
Director-National Accounts

Manage, Control, and Audit the Use of Shared, Privileged, and Administrative Accounts

  • Do you know how many privileged, shared, or generic identities exist within your IT infrastructure?
  • Do you know who has access to these accounts and what they’re doing during administrative sessions?
  • Are auditors requesting reports on entitlement to and usage of these identities?

The average enterprise includes thousands of privileged identities, accounts, and passwords. Manually managing and updating these is a time-consuming, costly and repetitive process. Administrative and application accounts (hard-coded, embedded credentials) can be found in network devices, servers, and software within an organization, including virtual environments, yet access to these accounts is unmonitored. Sharing of access to these accounts occurs frequently, so the system does not track WHO logged in, merely that a login occurred—a significant audit challenge.

Learn how to mitigate the risk of mismanagement of shared, privileged, and administrative accounts and how to address associated audit and compliance findings.

1:30pm-2:15pm Session Seven

Centrify Corporation

Louise Popyk
Systems Engineer

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?

Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting SaaS and mobile computing using a single, unified approach.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.
  • Learn about approaches for managing privileged user access to servers and apps.

>>click here for the presentation

2:15pm-2:30pm Break/Vendor Booth Time
2:30pm-3:00pm Session Eight

EVault, Inc.

Bryan Tucker
Territory Manager

Five Security Questions to Ask When Choosing a Cloud Provider

Increasingly, companies are moving components of their business operations to the cloud, including backup and disaster recovery. The reasons are compelling:

  • Reduced IT expenses
  • Greater efficiency
  • Greater collaboration and mobility

But news headlines are a stark reminder that not all Clouds are created equal. When evaluating a Cloud service provider to manage your critical business data, it’s important to understand how your security goals and those of the Cloud provider are aligned.

Asking five critical questions today could save you considerable headaches tomorrow. Learn what these questions are and how they can help you ensure a secure cloud solution for your organization.

>>click here for the presentation

  Prize Drawings For All In Attendance
3:00pm-3:45pm Session Nine

Blue Coat Systems.

Milan Urban

Embracing Mobility 
Liberate Employees to Work Their Way – and Empower Your Business

The growing use of smartphones and tablets along with
Bring Your Own Device (BYOD) initiatives are fundamentally changing the game.  However, 76% of IT leaders see security as a barrier to enabling employees to choose their own devices, technology and applications at will. You have the unique opportunity to empower your organization by helping it embrace the new possibilities of mobility and its promise of collaboration, productivity, and innovation – without compromising on security.

  Prize Drawings For All In Attendance
3:45pm-4:30pm Session Ten

Check Point Software Technologies Ltd.

Kevin Jones

What’s Hiding on Your Network?

The presentation outlines current network realities and new attack techniques that have been dissected or silently monitored in order to understand current threats and better defend against them.

>>click here for the presentation

4:30pm-5:00pm Session Eleven

RJS Smart Security

Josh More

Lean Security 101: Lean and Practical Approaches to Security Projects

For years, we've been told the key to security is technology. We purchase and deploy technology to create layers behind layers, making our walls taller and taller to keep the bad guys out. Sadly, it's not working.
What does work is combining lessons learned in other industries to the security world. By examining best practices within Lean Manufacturing, Agile Development and Rugged DevOps, this presentation delivers ways you can be successful in security, not by purchasing technology, but by:

  • Effectively using what you have and what you can get for free
  • Re-allocating security budget from the point of diminishing return
  • Identifying and maximizing learning opportunities
  • Engaging in small, inexpensive test projects
  • Choosing custom and rational metrics to measure what matters
  • Replacing defective systems with ones that grow with you
  • Turning security from a catch-up game into one of strategic and competitive advantage.

Success in security depends on the right mix of people, technology and process. Without all three, you are doomed to failure.

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
Aercor Wireless, Inc.
AhnLab, Inc.
AirWatch, LLC
Alert Logic
BeyondTrust Software, Inc.
Bit9
Blue Coat Systems.
BrightPlanIT Inc.
Centrify Corporation
Check Point Software Technologies Ltd.
Cleo
Communications Finance Inc.
Corero
Core Vision IT Solutions
Cyber-Ark Software, Ltd.
Wisconsin DAMA Chapter
Entrust
EVault, Inc.
FireEye, Inc.
FireMon
Fortinet, Inc.
Gigamon
iNETWORKS Group, Inc.
Infoblox Inc.
Interface Masters, Inc.
Kaspersky Lab
MCS IT - Management Communication Services, Inc.
Meru Networks
NetSPI Inc.
Nexum, Inc.
RJS Smart Security
Software ONE, Inc.
http://www.solutionary.com/
Sourcefire, Inc.
STC Wisconsin
Unitrends
Varonis Systems
WatchGuard Technologies, Inc.
Websense, Inc.
WILDPACKETS, INC
XIRRUS
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy