Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2014


Boston Tech-Security Conference

Date: Thursday, March 27, 2014
Location:

Boston Marriott Cambridge
Two Cambridge Center
50 Broadway
Cambridge, MA 02142
p: 617.494.6600

>>click here for directions

Overview

The Boston Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Centrify Corporation

John Kimberly
Systems Engineer

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?
Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting a single, unified approach to managing mission-critical servers, SaaS resources and mobile devices.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile
  • Learn about approaches for managing privileged user access to Windows, UNIX and Linux servers – both on-premise and in the cloud – as well as apps.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:30am Session Two

Cyber-Ark Software, Ltd.

Andy Givens
Senior Systems Engineer

Protecting The Privileged Pathway – Defeating the Insider and Advanced External Threat

Not a day goes by when we don’t read about another serious breach … and in almost every single instance, privileged accounts are exploited by an attacker.  The SANS Top 20, Verizon Data Breach Summary, and Microsoft’s recommendations to protect against “pass the  hash” attacks … they all state that privileged accounts need to be protected and monitored.
Four critical steps to stopping advanced threats:

  • Discover all privileged accounts
  • Protect and manage privileged account credentials
  • Control, isolate, and monitor privileged access and activity on servers and databases
  • Use real-time privileged account analytics to detect and respond to in-progress attacks
10:30am-11:00am Session Three

EVault, Inc.

Risk Masters, Inc.

Jim Gursha
Principal
Risk Masters, Inc.

Allan Cytryn
Principal
Risk Masters, Inc.

Emerging Trends in Cyber-Security & Recovery

Cyber Attacks are more sophisticated and more frequent. They have evolved from seemingly random and intermittent events to become the “Advanced Persistent Threat” and are sponsored by states and criminal organizations, as well as hackers and hactivists. Compounding this challenge, BYOD (“Bring Your Own Device”, such as iPads and iPhones) and the consumerization of technology conflict with historical approaches to defense. As a result, existing defenses are being breached daily. Once breached, restoring trust in infrastructure is becoming increasingly difficult.

New strategies and technologies for defense are providing better options than legacy firewall protection. However, they are not well understood and have not been widely adopted. Failure to rapidly modernize the security infrastructure jeopardizes security.

This session discusses some of the emerging approaches to security and the associated technology.

>>click here for the presentation

11:00am-11:30am Break/Vendor Booth Time/Lunch
11:30am-12:00pm Session Four

Corero

Stephen Gates

10 Key Steps for a Sustained DDoS Protection Plan

Today’s breed of DDoS Attacks and Cyber Threats are not only incredibly sophisticated and designed to wreak havoc on your business, they are challenging to identify, and defend against. Without the proper technology in place to detect, analyze mitigate, any online business is vulnerable to effects of a DDoS attack. This session examines key steps to consider in your DDoS protection plan to enhance your existing defense in depth security strategy and the Corero approach to helping customers respond to the wide variety of attacks we see today.
12:00pm-12:15pm Break/Vendor Booth Time
12:15pm-12:45pm Session Five

Aruba Networks, Inc.

Seth Fiermonti

Managing Access Policies for Mobile Users

Secure network access has never been more challenging.  First, the number of devices per person today makes it impossible to know who connects and with what device. Is it an employee or a guest? IT-managed device or BYOD?  The next challenge is to securely onboard and differentiate access by user role and/or device type.  This session outlines how dynamic role-based policy management for mobility and BYOD provides greater visibility, network security and IT workflow control.

12:45pm-1:15pm Session Six

Arista Networks, Inc.

Chris Campbell

Network Visibility and Telemetry - the problem too big to ignore!

This presentation will focus on the need within the data center to provide real-time visibility with solutions that are both cost effective and scale at an unprecedented rate.  We will discuss the current threat profile of the network and evaluate how different visibility mechanisms provide the necessary network telemetry data.  We will discuss a solution set that can address these threat profiles in a simple and non-intrusive way by not just focusing on the tap/aggregation elements, but also combining a rich set of solutions from the best technology solutions partners in the industry.

1:15pm-1:30pm Break/Vendor Booth Time
1:30pm-2:00pm Session Seven

Meru Networks

Mike Ruiz
Consulting Systems Engineer

Running Out of Air: The Evolution of WiFi and Preventing the Capacity Crunch

Even with the the latest Gigabit WiFi standard, 802.11ac, WiFi Networks are running out of air.   Join Mike Ruiz, Consulting Engineer from Meru Networks, to learn about this capacity crunch and how Meru is helping the most demanding customers in the world avoid it.  After the presentation, learn how to solve the capacity problems caused by technologies like Bonjour, or the latest guidance for medical devices, by joining Mike and the Meru team at our booth.

2:00pm-2:30pm Session Eight

XIRRUS

Louis Gencarelli
Systems Engineer

Wi-Fi Optimization: Every day, another 4 million devices are activated. Are you ready?

The mobile enterprise challenges are mounting: enabling users simple and secure access to the network, ensuring applications run smoothly, and building sufficient capacity to handle unpredictable usage and future growth. A superior level of Wi-Fi design is now required—something shown to be lacking by a recent Gartner report: “By 2015, 80% of newly installed wireless networks will be obsolete because of a lack of proper planning.”  A clear indication of the problem is that a typical wireless user is provisioned with less than 5% of the bandwidth of a typical wired user. Wi-Fi Optimization includes designing for: the user, device, application, spectrum and capacity. This session will examine critical design components to ensure predictable performance, even under heavy loads.

2:30pm-2:45pm Break/Vendor Booth Time
2:45pm-3:15pm Session Nine

Varonis Systems

Jason Diesel

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

3:15pm-3:45pm Session Ten

Bradford Networks

Tom Murphy
Chief Marketing Officer  

Rapid Threat Response: Reduce Critical Containment Time from 7 Days to 7 Seconds

Today’s threats are targeted, difficult to detect, and require significant manual intervention and expertise to contain.   They traverse different domains of IT management making it a cross-functional challenge to trace and find the threat’s electronic foothold.   Silos of security information require manual correlation to bridge between rogue network traffic alerts (threats in motion) and endpoints infected with malware (threats at rest).  And, in addition, there are just more security events to triage and it is no longer practical or responsible to try and respond to threats manually.

Join this session to understand how to reduce threat response time from 7 days to 7 seconds. Leveraging integration with leading security solutions (FireEye, Fortinet, Palo Alto Networks, and Sourcefire …) and automation, Bradford networks correlates high fidelity security alerts to contain threats in real-time.   Bradford Networks unique real-time visibility and control over every network connection, provides the perfect complement to instantly block, restrict, or remediate risky or compromised users, devices, or applications that triggered the security alert.

Key Topics Covered:

  • Get 100% visibility into the users, devices, and applications accessing your wired, wireless, and VPN network
  • Automatically correlate high fidelity network security alerts from leading solutions such as FireEye, Palo Alto Networks, and Fortinet to risk or compromised users, devices and applications
  • Automatically block,  restrict, or remediate non-compliant or infected trying to gain access to the network
  • Dynamically control every user and device’s level of network access based on security profile and business-criticality
  • Minimize risk to assets, intellectual property, and brand while reducing the time and cost of responding to cyber threats

>>click here for the presentation

  Prize Drawings For All In Attendance
3:45pm-4:15pm Session Eleven

Trend Micro Incorporated

Ken Donze
Senior Sales Engineer

Next Gen Security:  Changing Threats and New Responses

Pervasive always-on computing from smart phones to tablets to cloud-based services has brought increased productivity but also new challenges. Cloud computing also offers benefits as businesses of all sizes embrace the Cloud.  But is your data and intellectual property safe with BYOD and the Cloud?  The bad guys are more subtle than ever. Highly targeted attacks are increasingly in the news.  This so-called cyber-warfare is a real and increasing threat to organizations and government entities.  Join David Thibadeau Senior SE Manager at global network security firm Trend Micro for insight into real-world threats and solutions to mitigate risk.

  Prize Drawings For All In Attendance
   

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
ArcMail Technology
Arista Networks, Inc.
Aruba Networks, Inc.
 Belkin International,Inc
Beyond Security
BeyondTrust Software, Inc.
Bradford Networks
BrightPlanIT Inc. 
Centrify Corporation
CLEO
Corero
Cyber-Ark Software, Ltd.
Dyn
Dynamic Technology Solutions
Eos Systems, Inc.
ESET, LLC
EVault, Inc.
F5 Networks, Inc.
Fiberlink Communications
ForeScout Technologies
Fox Technologies
Fujitsu
Fuze Networks
Gigamon
Great Bay Software
Guidance Software Inc.
Impulse Point
Invincea, Inc.
`Kaspersky Lab
LANDesk Software
LogRhythm
McAfee, Inc.
Meru Networks
Novell, Inc.
Network Security Group, Inc.
Pwnie Express
Risk Masters, Inc.
SAINT Corporation
http://www.silver-peak.com/
Sims Recycling Ltd.
Solutionary, Inc.
Sophos PLC
STEALTHbits Technologies, Inc.
Symplified, Inc
Stratum Security 2012
Trend Micro Incorporated
Varonis Systems
XIRRUS
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy