Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Ft. Lauderdale Tech-Security Conference

Date: Thursday, November 14, 2013
Location:

Sheraton Fort Lauderdale Airport & Cruise Port Hotel
1825 Griffin Road
Dania, FL 33004
p: 954.920.3500

>>click here for directions

Overview

The Ft. Lauderdale Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Gigamon

Martin Langer

 

Riverbed Technology

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

9:15am-9:45am Break/Vendor Booth Time
9:45am-10:30am Session Two

WatchGuard Technologies, Inc.

Brad Tompkins

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

10:30am-11:15am Session Three

Centrify Corporation

John Kimberly

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?

Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting SaaS and mobile computing using a single, unified approach.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.
  • Learn about approaches for managing privileged user access to servers and apps.

>>click here for the presentation

11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:30pm Session Four

Click Security

Neal Hartsell
VP of Marketing

Real-time Security Analytics (RtSA): Automating the Discovery, Understanding, and Action Against Advanced Security Threats

What does an advanced attack look like?  Why are traditional products failing to provide protection?  What is a security analytic?  Who is the target user for an RtSA solution?  This presentation will address these questions and explain how RtSA can intelligently ingest, automatically contextualize, and render advanced analytics quickly by converting millions of logs and alerts into actor-based actionable intelligence.  Ultimately, it is about cost-effectively reducing business risk from advanced malware and attackers by speeding time-to-detect, time-to-understand, and time-to-act.

>>click here for the presentation

12:30pm-12:45pm Break/Vendor Booth Time
12:45pm-1:30pm Session Five

paloalto Networks

Blake Babila

Dynamic Security against Modern Threats in a Virtualized Environment

Securing the network has never been more challenging.  First, threats are increasingly targeted, fast-moving and evasive.  Second, the computing environment is constantly changing with initiatives like virtualization and BYOD.  This presentation reviews these challenges and offers approaches to network security that keeps pace with both the dynamic computing and threat landscapes.

>>click here for the presentation

1:30pm-2:00pm Session Six

SecureAuth

Bradd Schick

Are we still Secure?

PRISM has been disclosed and now we live in a new security concise world. We always thought this was happening, but now we know exactly how it is happening. Are we still secure? Can we trust our encryption? We will discuss the use of standards based federation, open source encryption, and limiting the exposure of your end users. 

2:00pm-2:15pm Break/Vendor Booth Time
2:15pm-3:00pm Session Seven

Blue Coat Systems.

Grant Asplund
Sr. Technology Evangelist

Embracing Mobility 
Liberate Employees to Work Their Way – and Empower Your Business

The growing use of smartphones and tablets along with
Bring Your Own Device (BYOD) initiatives are fundamentally changing the game.  However, 76% of IT leaders see security as a barrier to enabling employees to choose their own devices, technology and applications at will. You have the unique opportunity to empower your organization by helping it embrace the new possibilities of mobility and its promise of collaboration, productivity, and innovation – without compromising on security.

3:00pm-3:15pm Break/Vendor Booth Time
3:15pm-4:00pm Session Eight

Check Point Software Technologies Ltd.

Jeffrey Fogel
SE

What’s Hiding in Your Network?

In 2012, 900 organizations and 100 million security events were analyzed. We want to share the results of our research with you.

4:00pm-4:30pm Session Nine

DG Technology Consulting, LLC

Travis Abrams

Big Security Data

 

 

 

>>click here for the presentation

  Prize Drawings For All In Attendance
4:30pm-5:00pm Session Ten

NetScout Systems, Inc.

Michelle Ramus

NetScout: Bringing the Network & Application perspective to the Security Solution

The NetScout nGenius Service Assurance Solution manages end-to-end IP Service Delivery from a single platform.  Despite significant efforts in securing the perimeter and end-points, networks continue to be penetrated and assets compromised. These issues can often be caught in Network and Application activity by observing changes in behavior or conducting a forensic investigation into an event. Holistic visibility across applications, servers and networks enables us to understand all aspects of service performance and interrelationships.  Additionally, IT organizations rely on an increasing number of diverse packet-flow analysis tools to enable performance management, security, compliance and forensics.  The nGenius Packet Flow switch transforms access of network traffic and removes the barriers to monitoring tool attachment commonly encountered with traditional approaches based solely on TAPs and mirror/SPAN ports. Network traffic is streamlined, extended, filtered, aggregated, and scaled across the enterprise to enhance the scope and efficacy of network monitoring, performance management, and security strategies.

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accunet Solutions
Accuvant, Inc.
Aerohive Networks, Inc.
AirWatch, LLC
ArcMail Technology
Arista Networks, Inc.
Aruba Networks, Inc.
BEW Global
Beyond Security
BeyondTrust Software, Inc.
Blue Coat Systems.
Blue Door Networks, LLC
BrightPlanIT Inc.
Centrify Corporation
Check Point Software Technologies Ltd.
Click Security
Cyberoam
DG Technology Consulting, LLC
ESET, LLC
Event Tracker
F5 Networks, Inc.
FireMon
FishNet Security, Inc.
ForeScout Technologies
Fortinet, Inc.
Gigamon
Infoblox Inc.
ISACA South Florida
 Ixia NVS
LANDesk Software
LogRhythm
McAfee, Inc.
Meru Networks
Milestone Systems, Inc.
NH&A LLC
NetScout Systems, Inc.
Network America
Netwrix Corporation
paloalto Networks
Promisec
ReliaQuest 
Riverbed Technology
SafeNet
SAINT Corporation
SecureAuth
Shavlik Technologies, LLC
Sims Recycling Solutions
http://www.solutionary.com/
Symplified, Inc
Tufin Software Technologies Ltd.

Varonis Systems

WatchGuard Technologies, Inc.
WinMagic Inc.
Zix Corporation
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy