Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


Phoenix Tech-Security Conference

Date: Thursday, November 7, 2013
Location:

The Tempe Mission Palms Hotel
60 East Fifth Street
Tempe, AZ 85281
p: 480.894.1400

>>click here for directions

Overview

The Phoenix Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Varonis Systems

Adam Niles

Eliminating Data Security Threats

Unstructured and semi-structured data presents unique challenges to IT organizations when it comes to identifying who has access, who is accessing and most importantly, who should have access to shared Windows, NAS and UNIX folders, SharePoint sites and Exchange mailboxes and public folders. Information Security organizations have traditionally struggled with the overwhelming manual process of enforcing authentication, authorization and accountability controls on these resources as well as identifying data owners who should be making these decisions. Varonis Systems, a global leader in data governance presents new solutions for helping meet these challenges both today and into the future.

>>click here for the presentation

9:15am-9:45am Session Two

Axway

Dave Butcher
Director Solutions Architecture

Thinking Outside the Box

What's not being said about Secure File Sharing

 

 

>>click here for the presentation

9:45am-10:15am Break/Vendor Booth Time
10:15am-10:45am Session Three

Gigamon

Rich Southall

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for the presentation

10:45m-11:30am Session Four

Cyber-Ark Software, Ltd.

Bret Newman
SE Manager, Southwest

Who’s “Really” Accessing Your Privileged Accounts?

11:30am-12:00pm Break/Vendor Booth Time/Lunch
12:00pm-12:30pm Session Five

Corero

Stephen Gates

 

 

Key Steps of Protection for a First Line of Defense - Defending Against DDoS Attacks and Unwanted Traffic

With the number of successful attacks on the rise, it is evident that firewalls, intrusion prevention systems, and traditional security infrastructures are not equipped to combat them.  These technologies were not built to stop DDoS attacks, undesirable behaviors, advanced evasion attacks and other unwanted malicious traffic targeting your infrastructure.

Corero Network Security, an organization’s First Line of Defense, is the leading provider of Distributed Denial of Service (DDoS) defense.

12:30am-12:45pm Break/Vendor Booth Time
12:45pm-1:15pm Session Six

WatchGuard Technologies, Inc.

Chris Moynier

BYOD: Bring Your Own Device or Bring Your Own Danger?

Understanding the benefits and the risks

>>click here for the presentation

1:15pm-2:00pm Session Seven

paloalto Networks

Steve Brown
Systems Engineer

Dynamic Security against Modern Threats in a Virtualized Environment

Securing the network has never been more challenging.  First, threats are increasingly targeted, fast-moving and evasive.  Second, the computing environment is constantly changing with initiatives like virtualization and BYOD.  This presentation reviews these challenges and offers approaches to network security that keeps pace with both the dynamic computing and threat landscapes.

2:00pm-2:15pm Break/Vendor Booth Time
2:15pm-3:00pm Session Eight

Blue Coat Systems.

Jeromee Tilton
Systems Engineer

Embracing Mobility 
Liberate Employees to Work Their Way – and Empower Your Business

The growing use of smartphones and tablets along with
Bring Your Own Device (BYOD) initiatives are fundamentally changing the game.  However, 76% of IT leaders see security as a barrier to enabling employees to choose their own devices, technology and applications at will. You have the unique opportunity to empower your organization by helping it embrace the new possibilities of mobility and its promise of collaboration, productivity, and innovation – without compromising on security.

3:00pm-3:15pm Break/Vendor Booth Time
  Prize Drawings For All In Attendance
3:15pm-4:00pm Session Nine

Bradford Networks

Tom Murphy

Onboarding Personal Devices to Corporate Networks

Many IT organizations are being asked to allow personal devices onto corporate networks.  Unlike corporate-issued devices that are well-managed and under IT’s control, this new Bring-Your-Own-Device (BYOD) initiative introduces a unique set of security challenges that require a balance of flexibility, visibility, security.

This presentation will explain the concept of a “BYOD Blueprint” and lessons learned from onboarding personal devices to over 800 networks around the world.

>>click here for the presentation

  Prize Drawings For All In Attendance
4:00pm-4:45pm Session Ten

Check Point Software Technologies Ltd.

Mark Bennett

We secure the internet.

Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
Aerohive Networks, Inc.
AirTight Networks, Inc.
AirWatch, LLC
Alert Logic
ArcMail Technology
Arista Networks, Inc.
Axway
BeyondTrust Software, Inc.
Bit9
Blue Coat Systems.
Bradford Networks
BrightPlanIT Inc.
Check Point Software Technologies Ltd.
Cloud Security Alliance - Arizona Chapter
Corero
Cyber-Ark Software, Ltd.
ESET, LLC
EVault, Inc.
Event Tracker
FireMon
Fortinet, Inc.
 Fortnet Security
Fujitsu
Gigamon
IIBA Phoenix Chapter
Imperva
Infoblox Inc.
Interwork Technologies Inc.
(ISC)² PHOENIX CHAPTER™
© Phoenix ISSA
ITSecureOne
 Ixia NVS
LANDesk Software
LogRhythm
Network Critical Solutions Limited
Novacoast
paloalto Networks
Ping Identity Corporation
QCM Technologies, Inc.
RedSeal Networks, Inc.
SecureAuth
Sequris Group, LLC
Sims Recycling Solutions
SOS Security
Sourcefire, Inc.
STC Phoenix
STEALTHbits
Tufin Software Technologies Ltd.
Varonis Systems
WatchGuard Technologies, Inc.
Wave Systems Corp.
WILDPACKETS, INC
Zix Corporation
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy