What We Do
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013

Austin Tech-Security Conference

Date: Thursday, November 21, 2013

Omni Austin Hotel at Southpark
4140 Governor’s Row
Austin, Texas 78744
p: 512.4482222

>>click here for directions


The Austin Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One


Ruben Garcia

Turning the Mobile Device Evolution in Your Favor

The Emerging Mobile Landscape and the Positive Effects on Security and Business Enablement


>>click here for the presentation

9:15am-9:45am Session Two


Bill Thompson

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

9:45am-10:15am Break/Vendor Booth Time
10:15am-10:45am Session Three

FireEye, Inc.

Dan Walters
Central Region SE Director

FishNet Security, Inc.

Dan Walters is the Central Region SE Director at FireEye, where he works closely with a team of researchers and engineers providing companies assistance with their fight against modern malware. Dan joined FireEye early in 2010 and has been involved in the study of malware exploits and nation-state threat actors operating in his customer-base. Dan is entering his 18th year in the IT industry, most of which has been focused on Security solutions.

10:45am-11:30pm Session Four

WatchGuard Technologies, Inc.

Terrence Davis

Oceans of Data: The Big Data Challenge

The overall focus of this topic is understanding the overwhelming amount of data being collected by IT staff and what to do with it; how to interpret it.  WatchGuard’s New Dimension provides the first UTM SIEM, correlating UTM data to provide the necessary security information that IT staffs need.

11:30pm-12:00pm Break/Vendor Booth Time/Lunch
12:00pm-12:45pm Session Five

Centrify Corporation

Wade Tongen
Senior Systems Engineer


Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?

Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting SaaS and mobile computing using a single, unified approach.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.
  • Learn about approaches for managing privileged user access to servers and apps.

>>click here for the presentation

12:45pm-1:00pm Break/Vendor Booth Time
1:00pm-1:45pm Session Six

paloalto Networks

Jarrett Avery

Dynamic Security against Modern Threats in a Virtualized Environment

Securing the network has never been more challenging.  First, threats are increasingly targeted, fast-moving and evasive.  Second, the computing environment is constantly changing with initiatives like virtualization and BYOD.  This presentation reviews these challenges and offers approaches to network security that keeps pace with both the dynamic computing and threat landscapes.

>>click here for the presentation

1:45pm-2:30pm Session Seven

Blue Coat Systems.

Ty Mellon

Embracing Mobility 
Liberate Employees to Work Their Way – and Empower Your Business

The growing use of smartphones and tablets along with
Bring Your Own Device (BYOD) initiatives are fundamentally changing the game.  However, 76% of IT leaders see security as a barrier to enabling employees to choose their own devices, technology and applications at will. You have the unique opportunity to empower your organization by helping it embrace the new possibilities of mobility and its promise of collaboration, productivity, and innovation – without compromising on security.
2:30pm-2:45pm Break/Vendor Booth Time
2:45pm-3:15pm Session Eight


Rod Johnson
Director Regional Sales

Wi-Fi Optimization: Every day, another 4 million devices are activated. Are you ready?

The mobile enterprise challenges are mounting: enabling users simple and secure access to the network, ensuring applications run smoothly, and building sufficient capacity to handle unpredictable usage and future growth. A superior level of Wi-Fi design is now required—something shown to be lacking by a recent Gartner report: “By 2015, 80% of newly installed wireless networks will be obsolete because of a lack of proper planning.”  A clear indication of the problem is that a typical wireless user is provisioned with less than 5% of the bandwidth of a typical wired user. Wi-Fi Optimization includes designing for: the user, device, application, spectrum and capacity. This session will examine critical design components to ensure predictable performance, even under heavy loads.

  Prize Drawings For All In Attendance
3:15pm-4:00pm Session Nine

Check Point Software Technologies Ltd.

Anthony Silva

What’s Hiding in Your Network?

In 2012, 900 organizations and 100 million security events were analyzed. We want to share the results of our research with you.

  Prize Drawings For All In Attendance
4:00pm-4:30pm Session Ten


Dr. Paul Card, Ph.D., M.Sc

Detecting Insider Threats Using Sentiment Analysis 

During this Security Briefing Dr. Paul Card will review the definition of an “insider threat” and this risks posed by insiders. Dr. CArd will discuss why today’s cyber security controls and polices are ineffective at detecting and mitigating this category of risk. He will then review the various types of tools such as anomaly detection that can be used to identify compromised credentials and users. Dr. Card will conclude with an in-depth view of the latest sentiment analysis algorithms and how they can be integrated into a monitoring framework whether through a Managed Security Services Provider (MSSP) or in-house.

Dr. Card has more than 15 years of experience working with domestic including small startups and multinations in telecom, energy, finance and government sector to advance technology, research, and development strategies. As Director of Research and Development for Seccuris, Dr. Card has been responsible for a wide range of initiatives including the development of reputation based systems, web user traffic modeling and behavioral based anomaly detection algorithms. Prior to joining Seccuris, Dr. Card was a Research Scientist at Telecommunications Research Labs (TRLabs) one of Canada’s largest research consortium with over 50 industry members where he was responsible for the security research portfolio. Projects included Network-based Security, Sensor Networks, Mobile Application Development, SaaS, Big Data Analytics, Machine Learning  and Artificial Intelligence. Dr. Card holds a Ph.D. and M.Sc. in Electrical and Computer Engineering from the University of Manitoba and is an adjunct professor of the University of Manitoba where he lectures on Security topics including Software Engineering, Design of Robust Online Applications,  Network Based Information Security.

  Prize Drawings For All In Attendance

Event Sponsors/Exhibitors

A10 Networks, Inc.
AhnLab, Inc.
AirWatch, LLC
Alert Logic
Arista Networks, Inc.
Array Networks, Inc.
Aruba Networks, Inc.
Beyond Security
BeyondTrust Software, Inc.
Blue Coat Systems.
BlueCat Networks
The Broadleaf Group, Inc.
Centrify Corporation
Channel Systems, LLC.
Check Point Software Technologies Ltd.
Critical Start, LLC
Event Tracker
FireEye, Inc.
FishNet Security, Inc.
Fortinet, Inc.
Infoblox Inc.
Innovation Network Technologies Corporation
Interface Masters, Inc.
Kaspersky Lab
LANDesk Software
Meru Networks
NetBoundary Inc.
Net Optics
NetSPI Inc.
Network Critical Solutions Limited
NetZoomDC by AltimaTechnologies, Inc.
NIKSUN Incorporated
Norman Shark
paloalto Networks
PMI Austin Chapter
Pure Storage, Inc. 
SAINT Corporation
Secure Data Solutions, Inc. 
Set Solutions, Inc.
Shavlik Technologies, LLC
Sims Recycling Solutions
Sourcefire, Inc.
 The Hacker Academy & MAD Security, LLC.
Unique Digital Inc.
Varonis Systems
WatchGuard Technologies, Inc.
Websense, Inc.
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy