Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Orlando Tech-Security Conference

Date: Thursday, October 24, 2013
Location:

Hilton Orlando
6001 Destination Parkway
Orlando, FL 32819
p: 407.313.4300

>>click here for directions

Overview

The Orlando Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

WatchGuard Technologies, Inc.

Brian Leedy

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

 

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:30am Session Two

Gigamon

Martin Langer

 

Riverbed Technology

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

10:30am-11:00am Session Three

FireEye, Inc.

 

Guidance Software Inc.

Mel Pless
Sr. Director
Solutions Consulting
Guidance Software, Inc.

Let’s Get Right to the Endpoint: Leveraging Endpoint Data to Expose, Validate, Triage, and Remediate Security Breaches

The ultimate target of any attacker – laptops, desktops, servers, and the data residing on them—is currently the biggest blind spot for information-security operations and the greatest area of risk. These endpoints are not only hotbeds of valuable data and activity that can provide actionable insights into the hidden security risks threatening your organization’s systems, but also where you need visibility and control the most once a breach is detected.

Join Guidance Software and learn how to:

  • Leverage endpoint data for Big Data security analytics, providing security insights into hidden, nascent, or undetected threats
  • Reduce mean time-to-detection, response and recovery via integration with detection technology
  • Prioritize response based on the existence of sensitive information, validation of a detected event, or by exposing additional compromised machines through similar file analysis
  • Quickly and confidently triage and assess the impact of any security incident

>>click here for the presentation

11:00am-11:30am Break/Vendor Booth Time/Lunch
11:30am-12:00pm Session Four

Corero

Stephen Gates

Key Steps of Protection for a First Line of Defense - Defending Against DDoS Attacks and Unwanted Traffic

With the number of successful attacks on the rise, it is evident that firewalls, intrusion prevention systems, and traditional security infrastructures are not equipped to combat them.  These technologies were not built to stop DDoS attacks, undesirable behaviors, advanced evasion attacks and other unwanted malicious traffic targeting your infrastructure.

Corero Network Security, an organization’s First Line of Defense, is the leading provider of Distributed Denial of Service (DDoS) defense.

12:00pm-12:15pm Break/Vendor Booth Time
12:15pm-1:00pm Session Five

Cyber-Ark Software, Ltd.

Aleck Brailsford
Regional System Engineers Manager

Mitch Moosbrugger

The problem with Privilege –  identifying the risk of privileged account misuse in the modern enterprise.

Privileged Accounts are a vulnerability that is built-in to every device and application that exists within your enterprise.  They are the main vector for attacks whether internal or external, meaning that securing and monitoring access to them is becoming the number one priority for corporations whatever their size.   This presentation will examine how these accounts are exploited, where they are found and the considerations that should be taken into account when embarking on a program to secure them.   With real world examples  and examinations of attacks and exploits, it should provide a valuable insight into this extremely current topic.

1:00pm-1:45pm Session Six

paloalto Networks

Don Moose

Dynamic Security against Modern Threats in a Virtualized Environment

Securing the network has never been more challenging.  First, threats are increasingly targeted, fast-moving and evasive.  Second, the computing environment is constantly changing with initiatives like virtualization and BYOD.  This presentation reviews these challenges and offers approaches to network security that keeps pace with both the dynamic computing and threat landscapes.

>>click here for the presentation

1:45pm-2:00pm Break/Vendor Booth Time
2:00pm-2:30pm Session Seven

SecureAuth

Bradd Schick

Are we still Secure?

PRISM has been disclosed and now we live in a new security concise world. We always thought this was happening, but now we know exactly how it is happening. Are we still secure? Can we trust our encryption? We will discuss the use of standards based federation, open source encryption, and limiting the exposure of your end users. 

2:30pm-3:00pm Session Eight

XIRRUS

Perry Correll
Principle Technologist

Wi-Fi Optimization: Every day, another 4 million devices are activated. Are you ready?

The mobile enterprise challenges are mounting: enabling users simple and secure access to the network, ensuring applications run smoothly, and building sufficient capacity to handle unpredictable usage and future growth. A superior level of Wi-Fi design is now required—something shown to be lacking by a recent Gartner report: “By 2015, 80% of newly installed wireless networks will be obsolete because of a lack of proper planning.”  A clear indication of the problem is that a typical wireless user is provisioned with less than 5% of the bandwidth of a typical wired user. Wi-Fi Optimization includes designing for: the user, device, application, spectrum and capacity. This session will examine critical design components to ensure predictable performance, even under heavy loads.

3:00pm-3:15pm Break/Vendor Booth Time
3:15pm-4:00pm Session Nine

Blue Coat Systems.

Brian Hartpence

Embracing Mobility 
Liberate Employees to Work Their Way – and Empower Your Business

The growing use of smartphones and tablets along with
Bring Your Own Device (BYOD) initiatives are fundamentally changing the game.  However, 76% of IT leaders see security as a barrier to enabling employees to choose their own devices, technology and applications at will. You have the unique opportunity to empower your organization by helping it embrace the new possibilities of mobility and its promise of collaboration, productivity, and innovation – without compromising on security.

4:00pm-4:45pm Session Ten

Check Point Software Technologies Ltd.

Macy Torrey
Account Manager

What’s Hiding in Your Network?

In 2012, 900 organizations and 100 million security events were analyzed. We want to share the results of our research with you.

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
AhnLab, Inc.
AirWatch, LLC
ArcMail Technology
Arista Networks, Inc.
Blue Coat Systems.
Blue Door Networks, LLC
Bradford Networks
BrightPlanIT Inc.
Check Point Software Technologies Ltd.
Corero
Cyber-Ark Software, Ltd.
Data Integrity Services Inc.
DG Technology Consulting, LLC
ESET, LLC
F5 Networks, Inc.
FireEye, Inc.
ForeScout Technologies
Fujitsu
Gigamon
Guidance Software Inc.
Infoblox Inc.
ISC2 Central Florida Chapter
ISSA Central Florida Chapter
 Ixia NVS
Kaspersky Lab
LANDesk Software
MAXIS360
Milestone Systems, Inc.
Network America
NH&A LLC
paloalto Networks
ReliaQuest 
Riverbed Technology
SafeNet
SAINT Corporation
SecureAuth
Shavlik Technologies, LLC
Sims Recycling Solutions
http://www.solutionary.com/
Sophos PLC
Symplified, Inc
ThreatTrack Security, Inc.
Tufin Software Technologies Ltd.
Varonis Systems
WatchGuard Technologies, Inc.
Wave Systems Corp.
XIRRUS
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy