Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


New Orleans Tech-Security Conference

Date: Thursday, December 19, 2013
Location:

Hyatt Regency New Orleans
601 Loyola Avenue
New Orleans, LA 70113
p: 504.561.1234

>>click here for directions

Overview

The New Orleans Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Gigamon

Bill Thompson

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs. 

>>click here for the presentation

9:15am-9:45am Break/Vendor Booth Time
9:45am-10:30am Session Two

Cyber-Ark Software, Ltd.

Mark Rodriguez
Systems Engineer - TOLA

Analyzing the DNA and Risks associated with Privileged Accounts

Privileged accounts and passwords are extremely powerful, and have complete control of the target system with full access to all of the information on that system. This vulnerability could potentially cause tremendous financial losses and reputational damage for businesses.

For enterprises, privileged accounts are especially difficult to manage:

  • The average enterprise has thousands of privileged identities, accounts, and passwords. Manually managing and updating these are a time-consuming, costly and repetitive process.
  • Administrative and application accounts (hard-coded, embedded credentials) are found on virtually every piece of hardware, software, and application within an organization, including virtual environments.
  • Administrative or application accounts are shared, which means that the system does not track WHO logged in as an Administrator, merely that a login occurred—a significant audit challenge.
  • Unlike a personal identity, such as JDoe, administrative or application accounts are nearly impossible to disable due to high potential for disruption to business.
  • Administrative and application accounts are subject to regulations such as Sarbanes Oxley, PCI, and Basel II, requiring that companies prove exactly who logs in to sensitive systems and, increasingly, what they are doing.

Do you know how many privileged identities are in your environment? 

10:30am-11:15am Session Three

paloalto Networks

Cesar Chavez

Dynamic Security against Modern Threats in a Virtualized Environment

Securing the network has never been more challenging.  First, threats are increasingly targeted, fast-moving and evasive.  Second, the computing environment is constantly changing with initiatives like virtualization and BYOD.  This presentation reviews these challenges and offers approaches to network security that keeps pace with both the dynamic computing and threat landscapes.

>>click here for the presentation

11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:15pm Session Four

ArcMail Technology

Edward Dunn, MCSE
Vice-President – Engineering

Enterprise Information Archiving – What every I.T. Manager Should Know

 

 

 

>>click here for the presentation

12:15pm-12:30pm Break/Vendor Booth Time
12:30pm-1:00pm Session Five

EVault, Inc.

Matt Murphy
Territory Manager

Five Security Questions to Ask When Choosing a Cloud Provider

Increasingly, companies are moving components of their business operations to the cloud, including backup and disaster recovery. The reasons are compelling:

  • Reduced IT expenses
  • Greater efficiency
  • Greater collaboration and mobility

But news headlines are a stark reminder that not all Clouds are created equal. When evaluating a Cloud service provider to manage your critical business data, it’s important to understand how your security goals and those of the Cloud provider are aligned.

Asking five critical questions today could save you considerable headaches tomorrow. Learn what these questions are and how they can help you ensure a secure cloud solution for your organization.

>>click here for the presentation

1:00pm-1:30pm Session Six

SECCURIS INC.

Ivo Wiens
Manager, Security Engineering

All Incidents are not the same

Seccuris will discuss the industry standard methodology for handling security incidents and the best practices for integrating these activities into general incident management processes. Participants will leave with an understanding of:

  • How to know when a security incident has occurred in your environment?
  • What makes a security incident different from other IT incidents?
  • How to best integrate the outcome of an incident handling effort into the change control processes? 
1:30pm-1:45pm Break/Vendor Booth Time
1:45pm-2:15pm Session Seven

Arista Networks, Inc.

Josh Frank
Sr. Systems Engineer

Network Applications - How Visibility and Telemetry can solve the problems arising in the data center.

This presentation will focus on the need within the data center to provide real-time visibility with solutions that are both cost effective and scale at an unprecedented rate.  We will discuss the current threat profile of the network and evaluate how different visibility mechanisms provide the necessary network telemetry data.  We will discuss a solution set that can address these threat profiles in a simple and non-intrusive way by not just focusing on the tap/aggregation elements, but also combining a rich set of solutions from the best technology solutions partners in the industry.

2:15pm-2:45pm Session Eight

Aruba Networks, Inc.

Terry Stout

Managing Access Policies for Mobile Users

Secure network access has never been more challenging.  First, the number of devices per person today makes it impossible to know who connects and with what device. Is it an employee or a guest? IT-managed device or BYOD?  The next challenge is to securely onboard and differentiate access by user role and/or device type.  This session outlines how dynamic role-based policy management for mobility and BYOD provides greater visibility, network security and IT workflow control.

2:45pm-3:00pm Break/Vendor Booth Time
3:00pm-3:30pm Session Nine

WatchGuard Technologies, Inc.

Terrence Davis
Sales Engineer

Oceans of Data: the Big Data Challenge

 

 

>>click here for the presentation

  Prize Drawings For All In Attendance

Event Sponsors/Exhibitors

A10 Networks, Inc.
Aerohive Networks, Inc.
Alert Logic
ArcMail Technology
Arista Networks, Inc.
Aruba Networks, Inc.
Bit9
BrightPlanIT Inc.
Check Point Software Technologies Ltd.
Critical Start, LLC
Cyber-Ark Software, Ltd.
EVault, Inc.
F5 Networks, Inc.
Gigamon
Infoblox Inc.
Kaspersky Lab
LANDesk Software
LogRhythm
NetIQ Corporation
Net Optics
Network Critical Solutions Limited
Novacoast
paloalto Networks
Project Management Institute - Greater New Orleans Chapter, Inc.
Pure Storage, Inc. 
SECCURIS INC.
SecureAuth
Secure Data Solutions, Inc. 
Shavlik Technologies, LLC
http://www.solutionary.com/
TraceSecurity, Inc.
Varonis Systems
WatchGuard Technologies, Inc.
ZIFTEN
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy