What We Do
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2014

Hartford Tech-Security Conference

Date: Thursday, June 12, 2014
Location: HillsPoint Hotel and Conferences
383 South Center Street
Windsor Locks, CT 06096
p: 860.623.4400

>>click here for directions


The Hartford Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Infoblox Inc.

Charles Griffin
Sr. Systems Engineer

Are you Fully Prepared to Withstand DNS Attacks?

DNS attacks have risen by 200% over the last year alone. Attacks against DNS infrastructure can have disastrous results, including lost revenue due to downtime, diminished customer satisfaction and lost productivity because of denial of service, and privacy breaches due to data hijacking. Unfortunately, traditional security measures are ineffective in protecting against DNS-based attacks and malware that exploit DNS.  Join us for an overview on the DNS attack landscape and how Infoblox has the solutions to protect your network from DNS-based attacks.

>>click here for the presentation

9:15am-9:45am Break/Vendor Booth Time
9:45am-10:30am Session Two

Centrify Corporation

John Kimberly
Systems Engineer

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?
Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting a single, unified approach to managing mission-critical servers, SaaS resources and mobile devices.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile
  • Learn about approaches for managing privileged user access to Windows, UNIX and Linux servers – both on-premise and in the cloud – as well as apps.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.

>>click here for the presentation

10:30am-11:00am Session Three

EVault, Inc.

Jon Farmer
Sr. Territory Account Manager

Back Up Industry Trends and Solutions

11:00am-11:30am Break/Vendor Booth Time/Lunch
11:30am-12:00pm Session Four


Stephen Gates

10 Key Steps for a Sustained DDoS Protection Plan

Today's breed of DDoS Attacks and Cyber Threats are not only incredibly sophisticated and designed to wreak havoc on your business, they are challenging to identify, and defend against. Without the proper technology in place to detect, analyze and mitigate, any online business is vulnerable to effects of a DDoS attack.
This session examines key steps to consider in your DDoS protection plan to enhance your existing defense in depth security strategy and the Corero approach to helping customers respond to the wide variety of attacks we see today.

12:00pm-12:15pm Break/Vendor Booth Time
12:15pm-12:45pm Session Five

Aruba Networks, Inc.

Scott Childs

Managing Access Policies for Mobile Users

Secure network access has never been more challenging.  First, the number of devices per person today makes it impossible to know who connects and with what device. Is it an employee or a guest? IT-managed device or BYOD?  The next challenge is to securely onboard and differentiate access by user role and/or device type.  This session outlines how dynamic role-based policy management for mobility and BYOD provides greater visibility, network security and IT workflow control.

12:45pm-1:15pm Session Six

Varonis Systems

Paul Chaffers


Bring Your Own Service - The Effects of Cloud Services on Compliance and Data Protection

Recent research has revealed that organizations struggle to offer collaboration technologies that compete with free, cloud-based, consumer services in terms of functionality. However, these free services offer few of the security measures that have become standard in the corporate data center, and offer little or no guarantee for organizations that data stored in these services will be protected in accordance with organizational standards.

As a result, 80% of organizations do not currently allow their users to use cloud file sync services, and only 31% plan to do so in the future. As only 59% of organizations report to actively block these services from their networks, and as many workers now have access to their own mobile internet services and devices, it is a logical conclusion that considerable amounts of organizational data are now being created and transmitted entirely outside of the organizational perimeter, and outside of its control.
This presentation will review the findings of our research, discuss techniques for how organizations may assess whether they are protecting themselves from cloud data exodus or running the risk of losing control over their information assets.

>>click here for the presentation

1:15pm-1:30pm Break/Vendor Booth Time
1:30pm-2:00pm Session Seven


George Muldoon
Account Executive

A Blueprint for the Perfect Attack: Addressing the Open Doors in your  APT Strategy

Targeted cyber-attacks are steadily increasing, and business  executives face challenges with trust exploits. While organizations adopt cloud  computing and allow employee-owned devices onto the network, the challenge of  securing company data everywhere increases exponentially.   When  it comes to advanced persistent threats (APTs), bad actors will take advantage  of any and every exploit that they can use to steal your data, and look for the  weakest link in your security systems. Common, well-known trust exploits like  digitally signed malware, poor key and certificate security, fraudulent  certificates and SSH keys and weak outdated cryptographic methods are all still  in place in many organizations.   Cybercriminals and nation-backed operators have  successfully used unsecured keys and certificates to breach trust on enterprise  and government agency systems on repeated occasion. Most global organizations  have no ability to detect anomalies or to respond to attacks on trust that  leverage compromised, stolen or fabricated keys and certificates.   Because  of these deficiencies, enterprises are “sitting ducks” according to a recent  Forrester Consulting report. Organizations need to gain control over trust and  plug the gap related to key and certificate-based exploits.
2:00pm-2:45pm Session Eight

Blue Coat Systems.

Mel Bertram

A Complete Lifecycle Approach to Advanced Threat Protection

Due to the inevitability of advanced targeted attacks that fly under the radar of traditional, preventative-based security technologies, there is a shift toward a more modern defense-in-depth strategy—one that provides the intelligence, context, and real-time situational awareness needed to detect today's advanced threats. This defense is the first to integrate a business process view that aligns with how your security team operationalizes new intelligence and technologies to fortify your security infrastructure against future attacks. Find out how  this approach will empower your organization, enabling you to adopt the best new technologies that drive your business.

2:45pm-3:00pm Break/Vendor Booth Time
3:00pm-3:30pm Session Nine


Jen McCoy

Innovative Information Solutions

The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Entire Kill Chain

Over the past decade, the volume of malware produced and potentially infecting organizations, has multiplied by orders of magnitude. The scope of the threat, in conjunction with little to no innovation by traditional security vendors has left organizations like yours vulnerable. The time is NOW to expand security infrastructures to include detection and response capabilities that allow you to fully scope, contain and remediate each threat in real-time on your endpoints and servers. Join Bit9 to discuss the emergence of endpoint malware and the new class of security solutions that can detect threats early and across more points in the kill chain.

3:30pm-4:00pm Session Ten

FireEye, Inc.

Joshua Senzer, CISSP
Sr. Systems Engineer – North East Channels


Dyntek Services, Inc.

Full Spectrum Kill-chain Visibility









4:00pm-4:30pm Session Eleven

Trend Micro Incorporated

Kazbek “Kaz” Khumush
Senior Customer Engineer


Target Stores has invested millions in "next gen" cyber security and had received PCI certification. And yet hackers compromised its systems and credit card data during the busy retail holiday season. Over 70 million people were impacted. Join Trend Micro as they outline the breach, how people and processes were impacted, and how warnings and false positives were overlooked. As more and more firms consolidate data centers and invest in new solutions, how can human error and social engineering be mitigated and risks managed? How can organizations balance risk and security investment? What Best Practices and controls are recommended?

  Prize Drawings For All in Attendance
4:30pm-5:00pm Session Twelve

paloalto Networks

Integration Partners

Peter Southwick
Senior Solutions Atchitect

Next Generation Firewalls are More Human Friendly by Peter Southwick from Integration Partners

Face it, employees are using any application they want, despite the potential business and security risks. These applications are pervasive and often times evasive, finding creative ways to bypass your firewall such as masquerading as legitimate traffic, hopping ports or hiding within SSL tunnels. The traditional security response is to lock everything down based on ports and IP addresses, but this reaction may hinder the business. Allowing all applications introduces significant business and security risk. The right approach is to safely enable applications – striking a balance between deny all and allow all.

  Prize Drawings For All in Attendance

Event Sponsors/Exhibitors

ArcMail Technology
Aruba Networks, Inc.
Ash Creek Enterprises, Inc.
Beyond Security
Blue Coat Systems.
BrightPlanIT Inc. 
Centrify Corporation
Datto Backup
Dell Software
Dyntek Services, Inc.
EVault, Inc.
Fiberlink Communications
FireEye, Inc.
Impulse Point
Infoblox Inc.
Innovative Information Solutions
Integration Partners
Invincea, Inc.
Kaspersky Lab
LANDesk Software
Novell, Inc.
Viper Network Systems, LLC.  
paloalto Networks
Sims Recycling Ltd.
Solutionary, Inc.
Sophos PLC
Trend Micro Incorporated
Varonis Systems
Vormetric, Inc.
WinMagic Inc.
Xceedium, Inc.
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy