What We Do
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2014

Chicago Tech-Security Conference

Date: Thursday, March 20, 2014

Hyatt Regency McCormick Place
2233 South Martin L. King Drive
Chicago, IL 60616-9985
p: 312.567.1234

>>click here for directions


The Chicago Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Utopic Software - Utopic Software, LLC.

Bob Whirley


Most compliance tools simply scan and red-flag, when the true measure of a secure and stable environment is enforcing corrective action in real-time and returning assets to a prescribed ideal state. This next-generation, “self-healing” recovery technology consistently keeps monitored systems in compliance without costly and time-draining manual intervention.

Utopic Software’s cornerstone solution, Persystent Suite, applies an innovative and compliance-forward technology that automatically responds to unauthorized changes to registry, processes, services, files that might put a system at risk.

>>click here for the presentation

9:15am-9:45am Session Two

Aruba Networks, Inc.

Fred Anderson

Managing Access Policies for Mobile Users

Secure network access has never been more challenging.  First, the number of devices per person today makes it impossible to know who connects and with what device. Is it an employee or a guest? IT-managed device or BYOD?  The next challenge is to securely onboard and differentiate access by user role and/or device type.  This session outlines how dynamic role-based policy management for mobility and BYOD provides greater visibility, network security and IT workflow control.

9:45am-10:15am Break/Vendor Booth Time
10:15am-10:45am Session Three

Sims Recycling Ltd.

Marty Knight
National Account  Manager

Data Destruction and the Impact on Recycling - Sean Magann, VP of Sales and Marketing, Sims Recycling Solutions 
The key to ensuring secure data destruction is utilizing a certified recycler that will protect and securely handle your retired electronic equipment.   Methods of vetting service providers, asset management and secure data destruction are explained while minimizing your carbon footprint and determining the value of your retired assets.

  • Discover the benefits of using a certified recycler
  • Learn about certifications, asset management and secure data destruction methods
  • Understand the return value of your assets

>>click here for the presentation

10:45pm-11:15pm Session Four


Stephen Gates

10 Key Steps for a Sustained DDoS Protection Plan

Today’s breed of DDoS Attacks and Cyber Threats are not only incredibly sophisticated and designed to wreak havoc on your business, they are challenging to identify, and defend against. Without the proper technology in place to detect, analyze mitigate, any online business is vulnerable to effects of a DDoS attack. This session examines key steps to consider in your DDoS protection plan to enhance your existing defense in depth security strategy and the Corero approach to helping customers respond to the wide variety of attacks we see today.
11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:15pm Session Five

ArcMail Technology

Rory Welch
President and CEO

Enterprise Information Archiving – What Every IT Manager Needs to Know

Information governance for the changing landscape keeps IT leaders up at night presenting a constant array of challenges. Can you locate that email attachment or other important data from a year ago? Are you prepared for an e-Discovery order? Are you in compliance with regulations related to information retention? We’ll look at all of these questions as well as what it takes to protect your most critical digital assets.

>>click here for the presentation

12:15pm-12:30pm Break/Vendor Booth Time
12:30pm-1:00pm Session Six


Perry Correll

Wi-Fi Optimization: Every day, another 4 million devices are activated. Are you ready?

The mobile enterprise challenges are mounting: enabling users simple and secure access to the network, ensuring applications run smoothly, and building sufficient capacity to handle unpredictable usage and future growth. A superior level of Wi-Fi design is now required—something shown to be lacking by a recent Gartner report: “By 2015, 80% of newly installed wireless networks will be obsolete because of a lack of proper planning.”  A clear indication of the problem is that a typical wireless user is provisioned with less than 5% of the bandwidth of a typical wired user. Wi-Fi Optimization includes designing for: the user, device, application, spectrum and capacity. This session will examine critical design components to ensure predictable performance, even under heavy loads.

1:00pm-1:30pm Session Seven

Varonis Systems

David Braun

Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

1:30pm-1:45pm Break/Vendor Booth Time
1:45pm-2:30pm Session Eight

WatchGuard Technologies, Inc.

Michael Pearson

Next Dimension - Security Visibility

Today’s threats present ongoing issues for security professionals. In addition, the need to monitor an ocean of data for business intelligence, network monitoring, and security analysis. This is the “big data” challenges in many of the old disparate security solutions. WatchGuard presents on how Unified Threat Management (UTM) and network visibility tools can help address these challenges. The consolidation of perimeter security services with Unified Threat Management (UTM) and comprehensive logging and reporting with Dimension can take you beyond the next generation.

2:30pm-3:15pm Session Nine

Check Point Software Technologies Ltd.

Kellman Meghu

How Not To Do Security: Lessons Learned From The Galactic Empire.

Join me for a critique of the LucasFilm epic, from the perspective of a security audit. Let’s review the security procedures and practices of the Galactic Empire, and see what they did well, but more importantly, learn from the mistakes they made. Prepare for a discussion on security policies and procedures, applied during the
events that lead to the catastrophic business impact the Galactic Empire suffered as the result of data loss. This data was then turned against the Empire, with an advanced persistent threat that targeted, and eventually destroyed critical infrastructure. Then let us re-examine
the situation with a proper security policy in place to understand how even the most basic policy approach, could have saved the Empires business, employee lives, and ultimately billions of dollars.

>>click here for the presentation

3:15pm-3:30pm Break/Vendor Booth Time
  Prize Drawings For All In Attendance
3:30pm-4:00pm Session Ten

Zix Corporation

Craig Gariepy
Sr. Sales Representative
Corporate Sales


BYOD is here to stay. The majority of your employees are bringing their own devices to work and inevitably exposing your corporate data. Many “first generation” solutions aren't fully protecting corporate data, and many are too invasive. Zix offers a new way of thinking – with no data ever residing on the device. Whether you’re just beginning to investigate BYOD or you have a solution that simply isn't working for you or your employees, join Zix at Data Connectors for fresh, new thinking around BYOD security.

>>click here for the presentation

  Prize Drawings For All In Attendance
4:00pm-4:45pm Session Eleven

Trend Micro Incorporated

Steve Woodward

Next Gen Security:  Changing Threats and New Responses

Pervasive always-on computing from smart phones to tablets to cloud-based services has brought increased productivity but also new challenges. Cloud computing also offers benefits as businesses of all sizes embrace the Cloud.  But is your data and intellectual property safe with BYOD and the Cloud?  The bad guys are more subtle than ever. Highly targeted attacks are increasingly in the news.  This so-called cyber-warfare is a real and increasing threat to organizations and government entities.  Join Steve Woodward Senior SE at global network security firm Trend Micro for insight into real-world threats and solutions to mitigate risk.  

  Prize Drawings For All In Attendance

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accuvant, Inc.
ArcMail Technology
Aruba Networks, Inc.
Beyond Security
BeyondTrust Software, Inc.
BrightPlanIT Inc. 
BT Partners
Check Point Software Technologies Ltd.
Dynamic Technology Solutions
Fiberlink Communications
Fortinet, Inc.
Fox Technologies
Great Bay Software
HOB Inc.
Kaspersky Lab
LANDesk Software
Project Management Institute, Chicagoland Chapter
Radware Ltd.
SAINT Corporation
Sayers40, Inc.
Shavlik Technologies, LLC
Sims Recycling Ltd.
Solutionary, Inc.
Sophos PLC
STC Chicago
STEALTHbits Technologies, Inc.
Structured Communication Systems, Inc.
SynerComm, Inc.
 The Hacker Academy & MAD Security, LLC. 
Trend Micro Incorporated
Utopic Software - Utopic Software, LLC.
Varonis Systems
WatchGuard Technologies, Inc.
Zix Corporation
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy