Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2013


San Francisco Tech-Security Conference

Date: Thursday, December 5, 2013
Location:

Hyatt Regency San Francisco
5 Embarcadero Center
San Francisco, CA 94111
p: 415.788.1234

>>click here for directions

Overview

The San Francisco Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Varonis Systems

Amy Tam
Sr. Systems Engineer

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

9:15am-9:45am Session Two

Gigamon

Curt Phare

The Dynamic World of Threat Detection, Containment & Response

Regardless of size, network security is a top priority for all organizations. Networks are more vulnerable than ever due to the inherent risk of facilitating remote access in conjunction with the volume of traffic and the speed at which that traffic is flowing. As organizations migrate from 1Gb to 10Gb and beyond, network security tools struggle to keep up with these increasing connection speeds as the tools may not be designed to process the volume of packet traffic going through the protected link. Therefore, it is vital to implement security architectures and strategies that not only prevent security breaches, but can also dynamically react to potential threats and scale to meet future needs.

>>click here for presentation

9:45am-10:15am Break/Vendor Booth Time
10:15am-10:45am Session Three

GTB Technologies Inc.

Uzi Yair

DLP vs. DLD? -  The Keys to a Successful Data Loss Prevention Program

The major key to a successful DLP deployment is to reduce the number of incidents to a minimum by setting up the system to report only pertinent violations.  Many DLP systems fail in accurately detecting incidents, and instead, report thousands of irrelevant events, most vendors refer to this phase as "Tuning".  When you find yourself Tuning all day long, you've ended up with a very expensive DLD toy.

Need to learn about Data Loss Prevention and how it differs from Data Loss Detection?  How not to have your DLP Program Fail?  Having solved the industry known problems of False Positives &  Bring your own Cloud... see for yourself the differences which GTB offers in Detection quality, port coverage, Real-Time Detection & Cyber Threat Protection.

Our presentation offers a product analysis & live demonstration that points out exactly what those differences are & how to spot them when evaluating DLP products

>>click here for the presentation

10:45am-11:30am Session Four

Centrify Corporation

Steven Hansen
Systems Engineer

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?

Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting SaaS and mobile computing using a single, unified approach.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.
  • Learn about approaches for managing privileged user access to servers and apps.

>>click here for the presentation

11:30am-12:00pm Break/Vendor Booth Time/Lunch
12:00pm-12:30pm Session Five

Corero

Stephen Gates

Key Steps of Protection for a First Line of Defense - Defending Against DDoS Attacks and Unwanted Traffic

With the number of successful attacks on the rise, it is evident that firewalls, intrusion prevention systems, and traditional security infrastructures are not equipped to combat them.  These technologies were not built to stop DDoS attacks, undesirable behaviors, advanced evasion attacks and other unwanted malicious traffic targeting your infrastructure.

Corero Network Security, an organization’s First Line of Defense, is the leading provider of Distributed Denial of Service (DDoS) defense.

12:30am-12:45pm Break/Vendor Booth Time
12:45pm-1:15pm Session Six

Sims Recycling Solutions

Bill Vasquez
West Region General Manager

Data Destruction & the Impact on Recycling

 

 

 

>>click here for the presentation

1:15pm-1:45pm Session Seven

Fortinet, Inc.

Robert Graham
Regional Account Mgr.

Continuing Trends and Security Predictions for 2014

In many ways, IT is experiencing a significant paradigm shift in forms like Infrastructure-as-a-Service/Platforms-as-a-service offerings, SDN, and BYOD. These changes often obviate traditional prevention, detection, and response measures. Meanwhile, cybercriminals and state-sponsored agents are kicking it into high-gear. Never before has Neumann’s “security is hard” epigram been more true. In this presentation, we’ll take a peek at what this means for 2014.

1:45pm-2:00pm Break/Vendor Booth Time
2:00pm-2:30pm Session Eight

WatchGuard Technologies, Inc.

Chris Moynier
Southwest Sales Engineer

Data Loss Prevention:  Protect Your Company’s Most Important Possession

All companies that handle personally identifiable information like credit cards, national identity numbers, bank accounts, health records, or intellectual property need to focus on how to prevent data leakage.  Join Chris Moynier of WatchGuard Technologies as he reveals the who, why, where, when, how and what you may be losing - patient, student, and customer personal information, credit card and financial data, and intellectual property. We will show you how it happens, how to prevent it, and how to report on it.

>>click here for the presentation

2:30pm-3:00pm Session Nine

Bradford Networks

Tom Murphy
CMO

Secure BYOD: Onboarding Personal Devices to Corporate Networks

Many IT organizations are being asked to allow personal devices onto corporate networks.  Unlike corporate-issued devices that are well-managed and under IT’s control, this new Bring-Your-Own-Device (BYOD) initiative introduces a unique set of security challenges that require a balance of flexibility, visibility, security.
This presentation will explain the concept of a “BYOD Blueprint” and lessons learned from onboarding personal devices to over 900 networks around the world.


>>click here for the presentation

3:00pm-3:15pm Break/Vendor Booth Time
3:15pm-3:45pm Session Ten

SecureAuth

Joe Revels
Sales Director
Northwest & Asia Pacific

Multi-Factor Authentication and Single Sign-On in a Mobile World

As the world grows increasingly mobile, we are faced with the obstacle of balancing ease of use and maintaining high levels of security on any device. This session explores some of the best practices for simplifying BYOD and how to embrace change in your growing mobile enterprise.

>>click here for the presentation

  Prize Drawings For All In Attendance
3:45pm-4:30pm Session Eleven

SEEBURGER, Inc.

David Chinn

Preventing Data Breach Disasters from Insiders

Hackers may be grabbing the headlines, but insiders remain the biggest source of data breaches. And the consumer-ization of file-sharing/-synching isn’t helping.  In this session, you’ll learn how to modernize your corporate file-sharing infrastructure to protect against today’s biggest threat.

Understand the Silent Enemy: employees and partners. How they’re outflanking data security policies

  • What kinds of data are most at risk
  • What this means for compliance

Identify and plug the gaps

  • FTP software
  • Network shares
  • Email
  • Storage devices
  • Consumer tools

Create a 360-degree solution for secure end-to-end file transfer

  • Use data intelligence and analytics to gain actionable INTEL
  • Defend data through access-inspect-dispose-kill policies
  • Deploy centralized, highly automated managed file transfer
  • Make it as convenient and easy to use as users’ current tools
  • Integrate with key applications (SAP, ERP)

Don’t forget system-to-system and system-to-human transfers

>>click here for the presentation

4:30pm-5:00pm Session Twelve

Metaforic

 
  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
Aerohive Networks, Inc.
AhnLab, Inc.
AirWatch, LLC
AlephCloud Systems, Inc.
Alert Logic
NetZoomDC by AltimaTechnologies, Inc.
Arista Networks, Inc.
Aruba Networks, Inc.
BeyondTrust Software, Inc.
Bit9
Bradford Networks
bTrade
Centrify Corporation
Check Point Software Technologies Ltd.
Corero
EVault, Inc.
F5 Networks, Inc.
FireMon
Fortinet, Inc.
Fujitsu
FusionStorm
Gigamon
GTB Technologies Inc.
Infoblox Inc.
Interface Masters, Inc.
San Francisco Bay Area ISSA Chapter
Kaspersky Lab
KEMP Technologies, Inc.
LANDesk Software
Metaforic
NetIQ Corporation
Norman Shark
Novacoast
Novell, Inc.
Promisec
SecureAuth
SEEBURGER, Inc.
Silver Peak Systems, Inc.
Sims Recycling Solutions
http://www.solutionary.com/
Soonr, Inc.
SOS Security
Sourcefire, Inc.
STEALTHbits
Talariax
Unisys
Tripwire, Inc.
Varonis Systems
WatchGuard Technologies, Inc.
Wave Systems Corp.
Western Digital Technologies, Inc.
WILDPACKETS, INC
XIRRUS
 
   Copyright © 2009-2013. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy