Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2014


Orange County Tech-Security Conference

Date: Thursday, June 5, 2014
Location:

Doubletree Hotel Anaheim/Orange County
100 City Drive
Orange, California 92868
p: 714.634.4500

>>click here for directions

Overview

The Orange County Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Aruba Networks, Inc.

Grace Clark

Managing Access Policies for Mobile Users

Secure network access has never been more challenging.  First, the number of devices per person today makes it impossible to know who connects and with what device. Is it an employee or a guest? IT-managed device or BYOD?  The next challenge is to securely onboard and differentiate access by user role and/or device type.  This session outlines how dynamic role-based policy management for mobility and BYOD provides greater visibility, network security and IT workflow control.

9:15am-9:45am Session Two

Cyber-Ark Software, Ltd.

Bret Newman
SE Manager
Western Region

Who’s “Really” Accessing Your Privileged Accounts?

 

9:45am-10:15am Break/Vendor Booth Time
10:15am-10:45am Session Three

Sims Recycling Ltd.

Sean Magann
Vice President of Sales and MarketingSims Recycling Solutions

Data Destruction and the Impact on Recycling

The key to ensuring secure data destruction is utilizing a certified recycler that will protect and securely handle your retired electronic equipment. Methods of vetting service providers, asset management and secure data destruction are explained while minimizing your carbon footprint and determining the value of your retired assets.

  • Discover the benefits of using a certified recycler
  • Learn about certifications, asset management and secure data destruction methods
  • Understand the return value of your assets

>>click here for the presentation

10:45am-11:15am Session Four

GTB Technologies Inc.

Uzi Yair

Got Malware or an Insider sending out YOUR data?
Can YOU prevent it?
Depends
Do you have DLP or DLD?

With the growth of the Bring your own Cloud problem (BYOC) and remote users (BYOD); along with the apparent failure of IDS, network behavioral analysis, malware detection tools and stale market leading DLP systems, organizations must adopt new technologies faster than Hackers do.
Join GTB to discuss and see a new class of security solutions that are capable of inspecting and accurately detecting un-authorized transmissions (malware 'phoning home' your data), alerting administrators and preventing a breach, as soon as the violation occurs, even if the data is SSL encrypted, either online or offline.

>>click here for the presentation

11:15am-11:45am Break/Vendor Booth Time/Lunch
11:45am-12:15pm Session Five

 

Total Tech

 

Sophos PLC

Christian Marchesani, CISSP
Engineer

Malware Madness: Big Threats, Smarter Defense

Total Tech’s guest speaker and Sophos engineer Christian Marchesani, CISSP provides an interesting look at the new threats, how malware has evolved and how their award-winning Labs are pioneering important new approaches to detection and remediation, leveraging today’s most powerful cloud and big data technologies. Whether you’re a large or small business, a school or government agency, or an individual user, our shared battle against malware continues. And so does our commitment at Total Tech + Sophos to keeping you educated and protected.

12:15am-12:30pm Break/Vendor Booth Time
12:30am-1:00pm Session Six

VENAFI

Rod Parker
Account Manager

A Blueprint for the Perfect Attack: Addressing the Open Doors in your  APT Strategy


Targeted cyber-attacks are steadily increasing, and business  executives face challenges with trust exploits. While organizations adopt cloud  computing and allow employee-owned devices onto the network, the challenge of  securing company data everywhere increases exponentially.   When  it comes to advanced persistent threats (APTs), bad actors will take advantage  of any and every exploit that they can use to steal your data, and look for the  weakest link in your security systems. Common, well-known trust exploits like  digitally signed malware, poor key and certificate security, fraudulent  certificates and SSH keys and weak outdated cryptographic methods are all still  in place in many organizations.   Cybercriminals and nation-backed operators have  successfully used unsecured keys and certificates to breach trust on enterprise  and government agency systems on repeated occasion. Most global organizations  have no ability to detect anomalies or to respond to attacks on trust that  leverage compromised, stolen or fabricated keys and certificates.   Because  of these deficiencies, enterprises are “sitting ducks” according to a recent  Forrester Consulting report. Organizations need to gain control over trust and  plug the gap related to key and certificate-based exploits.
1:00pm-1:30pm Session Seven

CLEO

Steve Jordan
Director
Industry Solutions

Managed File Transfer: Moving from Chaos to Control

In this session, you will learn about the many aspects of managing the flood of data that threatens to overwhelm your enterprise

  • What is the data you are moving?
  • Where is it going?
  • How do you manage and secure the data?

Understand 3 key areas of secure file movement

  • Security
  • Big Data
  • File Sharing and Collaboration

Managing the Chaos

  • Creating architectures that provide confidentiality, integrity, and availability
  • Building a flexible platform that satisfies multiple types of data movement
  • Providing governance of file transfers through visibility and security
Creating a solution that is operationally efficient

>>Click here for the presentation

1:30pm-1:45pm Break/Vendor Booth Time
1:45pm-2:15pm Session Eight

paloalto Networks

Alton Omura
SE

Expose the Underground:  Detect and Prevent Advanced Persistent Threats

2:15pm-2:45pm Session Nine

Novell, Inc.

Novacoast

Jonathan Poon
Director of Development Services
Novacoast

FilePower

You can’t dodge the data explosion, but you can bring the chaos under control. Nowadays the sprawl of file storage in your enterprise is even moving outside your network as users turn to cloud-based apps to share and access corporate files. You can tame this sprawl if you have intelligent tools to help you. Join us to see how Novell can help keep your important corporate files secure and governed, with all the file-sharing ease and convenience users expect.

 


>>click here for the presentation

2:45pm-3:00pm Break/Vendor Booth Time
3:00pm-3:45pm Session Ten

Unisys 

Eric Steinberg
Director, Presales Engineering & Support

Assurance Data

The Changing Cybersecurity Landscape

As the cybersecurity landscape continues to evolve, CISO’s need to determine what challenges may exist and what considerations  to make in order to address these evolving security threats.  With the consumerization of IT for example, the organizational parameter can no longer be defined and current security methods are proving ineffective. In order to address these concerns, we need to examine  a different approach to protecting mission critical resources.

Please join us in discussing:

  • Changes and challenges within the cybersecurity landscape
  • Discovering an alternative approach to existing security solutions
  Prize Drawings For All in Attendance
3:45pm-4:15pm Session Eleven

Zix Corporation

Nigel Johnson
Vice President
Product Management

A Fresh Approach: RETHINKING BYOD SECURITY

BYOD is here to stay. The majority of your employees are bringing their own devices to work and inevitably exposing your corporate data. Many “first generation” solutions aren't fully protecting corporate data, and many are too invasive. Zix offers a new way of thinking – with no data ever residing on the device. Whether you’re just beginning to investigate BYOD or you have a solution that simply isn't working for you or your employees, join Zix at Data Connectors for fresh, new thinking around BYOD security.

  Prize Drawings For All in Attendance

Corero

 

Security On Demand™

**Corero was scheduled to speak today but due to conflicts they will not be speaking. Corero is however sharing a table with Security on Demand.  Please stop by and visit their table.**

Event Sponsors/Exhibitors

A10 Networks, Inc.
Accutive
ArcMail Technology
Aruba Networks, Inc.
Assurance Data
Beyond Security
BrightPlanIT Inc. 
The Broadleaf Group,
Celestix Networks, Inc.
Check Point Software Technologies Ltd.
CLEO
CMS Products
Corero
Cyber-Ark Software, Ltd.
Dyn
EVault, Inc.
FireMon
Fortinet, Inc.
Fujitsu
Gigamon
Global Data Vault, L.L.C.
Great Bay Software
GTB Technologies Inc.
Guidance Software Inc.
HID Global
Kaspersky Lab
LogRhythm
NE SYSTEMS INCORPORATED
Nitech
Novacoast
Novell, Inc.
paloalto Networks
SecureAuth
Security On Demand™
Silver Peak Systems, Inc.
Sims Recycling Ltd.
Software ONE, Inc.
Sophos PLC
STEALTHbits
Symantec Corporation
TIBCO Software Inc
Total Tech
TxSystems Inc
Unisys 
Varonis Systems
VENAFI
 WILDPACKETS, INC
XIRRUS
Zix Corporation
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy