Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2014


Seattle Tech-Security Conference

Date: Thursday, January 30, 2014
Location:

Renaissance® Seattle Hotel
515 Madison Street Seattle, Washington, 98104
p: 206.583.0300

>>click here for directions

Overview

The Seattle Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Zscaler, Inc.

Jeff Bird
Regional Sales Manager

 

Web Traffic Offload: Is MPLS Dead? Have These Reports Been Greatly Exaggerated? 

Zscaler will look at Old IT’s standard “Hub & Spoke” MPLS architecture and see how Web traffic is exploding and rendering these designs obsolete. How to secure the ever growing Web applications including Office 365?

Zscaler's Cloud delivered security solution provides policy-based secure internet access for any employee, on any device anywhere in the world.   Our proxy and Web traffic scanning scalability ensures ultra-low latency in a 100% Cloud based security solution requiring no hardware, no software on any company desktops or appliances in the Data Center.   Zscaler can also provide massive ROI on MPLS networks overloaded by Web traffic by eliminating backhaul.  All while providing complete control over security, reporting, logs, DLP & policy.

>>click here for the presentation

9:15am-9:45am Session Two

Cyber-Ark Software, Ltd.

Bret Newman

Reducing APT Exposure by Protecting Privileged Accounts

Privileged accounts are the primary targets in cyber attacks. CyberArk enables organizations to identify, secure, monitor and control privileged accounts. In addition, CyberArk’s Privileged Threat Analytics provides targeted and immediately actionable threat analytics on these critical attack vectors by identifying previously undetectable malicious privileged user behavior, enabling the incident response team to respond and disrupt in-progress attacks.

CyberArk Privileged Threat Analytics is the latest innovation in CyberArk’s market leading privileged account security solution that secures an organization’s most critical assets and data. By applying patented analytic technology to a rich set of privileged account behavior data from its privileged account security solution, along with contextual information from system resources, CyberArk Privileged Threat Analytics provides targeted, high value and actionable intelligence to security teams.

This session will demonstrate how attackers are exploiting privileged accounts and share best practices for minimizing the threat of targeted attacks.

CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage. The company is trusted by the world’s leading companies – including 40 of the Fortune 100 – to protect their highest value information assets, infrastructure and applications.  CyberArk is a vital security partner to more than 1,500 global businesses, including 17 of the world’s top 20 banks.

9:45am-10:15am Break/Vendor Booth Time
10:15am-10:45am Session Three

Utopic Software - Utopic Software, LLC.

Bob Whirley
Chief Executive Officer

TAMING THE CHAOS OF COMPLIANCE

Most compliance tools simply scan and red-flag, when the true measure of a secure and stable environment is enforcing corrective action in real-time and returning assets to a prescribed ideal state. This next-generation, “self-healing” recovery technology consistently keeps monitored systems in compliance without costly and time-draining manual intervention.

Utopic Software’s cornerstone solution, Persystent Suite, applies an innovative and compliance-forward technology that automatically and immediately responds to unauthorized changes to registry, processes, services, files that might put a PC, mobile device or server at risk.

>>click here for the presentation

10:45am-11:15am Session Four

Infoblox Inc.

Krupa Srivatsan
Senior Product Marketing Manager

Protecting Critical Network Infrastructure

Enterprise networks are facing an onslaught of security attacks as the ‘bad guys’ use every component of the network to attack them. Attacks that target DNS and malware that exploits DNS are increasing in both frequency and severity. Unprotected DNS infrastructure introduces security risks.

This presentation will cover Infoblox’s offerings for protecting an enterprise’s critical network infrastructure, the DNS. It will cover:

  • Overview of Infoblox
  • Security Challenges faced by enterprises today
  • Advanced DNS Protection and DNS Firewall solutions and their benefits

>>click here for the presentation

11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:15pm Session Five

 

Aruba Networks, Inc.

Joshua Gardiner

Managing Access Policies for Mobile Users

Secure network access has never been more challenging.  First, the number of devices per person today makes it impossible to know who connects and with what device. Is it an employee or a guest? IT-managed device or BYOD?  The next challenge is to securely onboard and differentiate access by user role and/or device type.  This session outlines how dynamic role-based policy management for mobility and BYOD provides greater visibility, network security and IT workflow control.

12:15pm-12:30pm Break/Vendor Booth Time
12:30pm-1:15pm Session Six

Blue Coat Systems.

Grant Asplund
Sr. Technology Evangelist

Embracing Mobility 
Liberate Employees to Work Their Way – and Empower Your Business

The growing use of smartphones and tablets along with
Bring Your Own Device (BYOD) initiatives are fundamentally changing the game.  However, 76% of IT leaders see security as a barrier to enabling employees to choose their own devices, technology and applications at will. You have the unique opportunity to empower your organization by helping it embrace the new possibilities of mobility and its promise of collaboration, productivity, and innovation – without compromising on security.
1:15pm-1:45pm Session Seven

FusionStorm

Silver Peak Systems, Inc.

Colm Foley
Channel Sales Manager

Data Center Class WAN Optimization

 

 

 

 

>>click here for the presentation

1:45pm-2:00pm Break/Vendor Booth Time
2:00pm-2:30pm Session Eight

Zix Corporation

Ryan Wall
Regional Sales Manager

A Fresh Approach: RETHINKING BYOD SECURITY

BYOD is here to stay. The majority of your employees are bringing their own devices to work and inevitably exposing your corporate data. Many “first generation” solutions aren't fully protecting corporate data, and many are too invasive. Zix offers a new way of thinking – with no data ever residing on the device. Whether you’re just beginning to investigate BYOD or you have a solution that simply isn't working for you or your employees, join Zix at for fresh, new thinking around BYOD security.

>>Click here for the presentation

2:30pm-3:00pm Session Nine

Fortinet, Inc.

Brian Mclean

Mitigating Network Borders: Balancing User Wants, Business Needs, and Security Requirements

Many companies find themselves in a position where balancing wants, needs, and requirements ends up compromising security in ways that leave them vulnerable to current threats.  However, by digging deeper into the packets and the communications they comprise it’s possible to not only increase security, but fulfill business needs and user desires.

>>click here for the presentation

3:00pm-3:15pm Break/Vendor Booth Time
3:15pm-3:45pm Session Ten

Kaspersky Lab

Steve Winfield, MCSE, CISSP, RCG
Regional Channel Manager

Protecting your Endpoints and Getting a Good Night of Sleep

Join Kaspersky Lab as we talk about endpoint security and the impact of complexity and redundancy in securing desktops, laptops, mobile devices, and virtualized environments.  This talk will explore the basics around anti-malware, control tools, mobile security, MDM, vulnerability assessment, patch management, securing virtualized environments, and leading recommendations for quality stress-free sleep.

>>click here for presentation

3:45pm-4:15pm Session Eleven

WatchGuard Technologies, Inc.

Corey Nachreiner

2014 Security Predictions

  Prize Drawings For All In Attendance
4:15pm-4:45pm Session Twelve

Corero

Stephen Gates

 

DDoS in the Enterprise: Defending against an evolving threat landscape

The increasing frequency and complexity of DDoS attacks is a growing threat to all Enterprises. This discussion will review the rapid evolution of network and application layer DDoS attacks, showing how enterprises can ensure uptime while maximizing their protection, and uncovering why traditional security solutions, like firewalls, are insufficient.

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
ArcMail Technology
Aruba Networks, Inc.
BeyondTrust Software, Inc.
Blue Coat Systems.
BrightPlanIT Inc. 
CLEO
Corero
Cyber-Ark Software, Ltd.
CYLANCE INC,
Dyn
Fortinet, Inc.
Fujitsu
FusionStorm
Gigamon
Guidance Software Inc.
Infoblox Inc.
Invincea, Inc.
Kaspersky Lab
KEMP Technologies, Inc.
LogRhythm
Meru Networks
Ping Identity Corporation
Puget Sound PMI
Silver Peak Systems, Inc.
Solutionary, Inc.
Sophos PLC
SOS Security
STEALTHbits Technologies, Inc.
Structured Communication Systems, Inc.
TierPoint
Utopic Software - Utopic Software, LLC.
Varonis Systems
VASCO Data Security International, Inc.
WatchGuard Technologies, Inc.
Websense, Inc.
Zix Corporation
Zscaler, Inc.
   Copyright © 2009-2013. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy