What We Do
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013

Honolulu Tech-Security Conference

Date: Thursday, December 12, 2013

Waikiki Beach Marriott Resort & Spa
2552 Kalakaua Avenue
Oahu · Honolulu, Hawaii 96815
p: 808-922-6611

>>click here for directions


The Honolulu Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


This Conference Qualifies For
CPE Credits.

8:15am-9:00am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
9:00am-9:45am Session One

Aerohive Networks, Inc.

Dean Williams
Regional Manager

Transforming Your Network into a Platform for Mobility

The modern “mobile-first” enterprise network requires a mobility-optimized approach that is not simply dependent on network access for policy enforcement and control. Contextual elements, such as user identity, device type, application, location, and time of day are the primary building blocks used to create granular policies that dictate how, when, and what the user can access. In this session, we’ll assess the mobility-optimized approach which tightly integrates systems and adds contextual intelligence to create sophisticated “user centric” policies that reduce the complexities of a highly mobile user base. This will provide a vision for how optimizing for mobility can transform your network into a platform for mobility; a platform able to add business value, reduce operational cost and regain control of your network.

>>click here for the presentation

9:45am-10:15am Break/Vendor Booth Time
10:15am-11:00am Session Two


Fortinet, Inc.

Mike Wysocki
Regional Manager
LA, IE, Vegas & HI

Hawaiian Telcom 

David Morris
Solutions Engineer
Managed Services


Fortinet and Hawaiian Telcom have teamed up to provide a fully managed solution to address the most common security threats for Hawaii’s business and government customers.  This will be a joint presentation in which Fortinet will focus on technology and discuss how consolidation can help reduce management overhead and IT expenditures enabling you to spend less time on security and more time growing your business.  Hawaiian Telcom will then present examples of real world attacks with a focus on the importance of people and processes in planning, implementing, managing, and operating secure information systems.



>>click here for the presentation

11:00am-11:30am Break/Vendor Booth Time/Lunch
11:30am-12:15pm Session Three

Check Point Software Technologies Ltd.

Charles Riordan
GRC Services

We secure the internet.

Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

12:15am-12:30pm Break/Vendor Booth Time
12:30pm-1:00pm Session Four


Michael Reznick
Sr. Solutions Enginner

A New Generation of Endpoint and Server Security: Real-time visibility and protection

In 2012 we’ve seen an unprecedented rise in targeted cyber attacks and an acceleration of the loss of core IP.  While state sponsored attacks and cyber espionage have been occurring for decades, the level of disclosure and visibility of these attacks is rising to new levels. We are witnessing the greatest theft of intellectual property in history. Industry analysts state traditional Anti-virus security does not work and is “fighting a losing battle”. A trust-based approach is the most effective way to stop advanced threats and malware

In this session, attendees will receive an in-depth understanding of the benefits of a real-time visibility and protection solution.

1:00pm-1:30pm Session Five

WatchGuard Technologies, Inc.

Peter McNaull
Director of Technical Marketing


SMART Data Loss Prevention for Regulatory Compliance

All companies that handle personally identifiable information like credit cards, national identity numbers, bank accounts, health records, or intellectual property need to focus on how to prevent data leakage to stay in compliance.  Join Peter McNaull, Director of Technical Marketing for WatchGuard Technologies, as he reveals the who, why, where, when, how and what you may be losing - patient, student, and customer personal information, credit card and financial data, and intellectual property. Peter will show you how it happens, how to prevent it, and how to report on it.

>>click here for the presentation

1:30pm-1:45pm Break/Vendor Booth Time
1:45pm-2:30pm Session Six

EVault, Inc.

David Chapa
EVault’s Chief Technology Evangelist

What's Next: Tech Trends

With technology growing at such a rapid speed, how do you know which direction to follow?  Rethink backup, rethink recovery - join us for guidance as to what trends are here to stay and which to watch.

David A. Chapa is EVault"s Chief Technology Evangelist with more than 25 years in the storage industry, focusing specifically on data protection, DR, and business continuity. He has held senior level technical positions with companies such as Quantum, OpenVision (VERITAS), ADIC, Unisys, NetApp and the ESG (Enterprise Strategy Group). He has been a featured speaker at major industry conferences and is a recognized blogger and author. He is co-author of Implementing Backup and Recovery and technical editor of “Cloud Security,” “Security 2020,” and “Web Commerce Security Design and Development.”

3:00pm-3:45pm Prize Drawings For All In Attendance



Event Sponsors/Exhibitors

Aerohive Networks, Inc.
Beyond Security
Check Point Software Technologies Ltd.
EVault, Inc.
Fortinet, Inc.
Hawaiian Telcom 
Infoblox Inc.
 ISSA Hawaii Chapter
 Ixia NVS
Kaspersky Lab
Meru Networks
Norman Shark
paloalto Networks
STHI, Secure Technology Hawaii
Tegile Systems
Varonis Systems
WatchGuard Technologies, Inc.
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy