Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2014


Tampa Tech-Security Conference

Date: Thursday, June 19, 2014
Location:

DoubleTree by Hilton Hotel Tampa Airport - Westshore
4500 West Cypress Street
Tampa, FL 33607
p: 813.879.4800

>>click here for directions

Overview

The Tampa Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


Agenda:

This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:30am Session One

Centrify Corporation

Michael Szymczak
Systems Engineer

Evolving Enterprise Identity: From the Data Center to Cloud and Mobile

User-driven computing models are generating a need for identity services that sit at the intersection of data center, mobile and SaaS resources. How can you give users the single login they want and IT the single identity infrastructure they need?
Learn how — Join Centrify for a discussion of the architectural, security and operational considerations for adopting a single, unified approach to managing mission-critical servers, SaaS resources and mobile devices.

Overcome enterprise identity challenges:

  • Discover the benefits of centralized authentication, authorization, policy, and auditing for IT resources across the data center, cloud and mobile
  • Learn about approaches for managing privileged user access to Windows, UNIX and Linux servers – both on-premise and in the cloud – as well as apps.
  • Find out how to address password sprawl with secure, controlled access to Software-as-a-Service (SaaS) apps and other cloud services across PCs, iOS and Android devices.

>>click here for the presentation

9:30am-10:00am Break/Vendor Booth Time
10:00am-10:30am Session Two

Cyber-Ark Software, Ltd.

Andy Givens

Protecting The Privileged Pathway – Defeating the Insider and Advanced External Threat

Not a day goes by when we don’t read about another serious breach … and in almost every single instance, privileged accounts are exploited by an attacker.  The SANS Top 20, Verizon Data Breach Summary, and Microsoft’s recommendations to protect against “pass the  hash” attacks … they all state that privileged accounts need to be protected and monitored.

Four critical steps to stopping advanced threats:

  • Discover all privileged accounts
  • Protect and manage privileged account credentials
  • Control, isolate, and monitor privileged access and activity on servers and databases
  • Use real-time privileged account analytics to detect and respond to in-progress attacks
10:30am-11:00am Session Three

Check Point Software Technologies Ltd.

Bill Dunbar
Security Engineer

Threat Cloud Intelligence
Comprehensive Cloud based Security
Inside and Outside the network

Check Point utilizes the industry’s most comprehensive indicators as well as Check Point’s Threat Cloud IntelliStore to identify and mitigate Cyber threats. Learn how to protect the network with a layered security approach from known and unknown threats. Prevent Zero Day exploits in real time with Check Point Threat Emulation technology. Protect roaming users from malicious sites and exploits outside the network with the same security as the internal network.

11:00am-11:30am Break/Vendor Booth Time/Lunch
11:30am-12:00pm Session Four

Aruba Networks, Inc.

Zach Thompson

Managing Access Policies for Mobile Users

Secure network access has never been more challenging.  First, the number of devices per person today makes it impossible to know who connects and with what device. Is it an employee or a guest? IT-managed device or BYOD?  The next challenge is to securely onboard and differentiate access by user role and/or device type.  This session outlines how dynamic role-based policy management for mobility and BYOD provides greater visibility, network security and IT workflow control.

12:00pm-12:15pm Break/Vendor Booth Time
12:15pm-12:45pm Session Five

Sims Recycling Ltd.

Albert Hacker

 

Data Destruction and the Impact on Recycling

The key to ensuring secure data destruction is utilizing a certified recycler that will protect and securely handle your retired electronic equipment.   Methods of vetting service providers, asset management and secure data destruction are explained while minimizing your carbon footprint and determining the value of your retired assets.

  • Discover the benefits of using a certified recycler
  • Learn about certifications, asset management and secure data destruction methods
  • Understand the return value of your assets

>>click here for the presentation

12:45pm-1:15pm Session Six

Arista Networks, Inc.

Eric Schuller
Systems Engineer

Network Visibility and Telemetry - the problem too big to ignore!

This presentation will focus on the need within the data center to provide real-time visibility with solutions that are both cost effective and scale at an unprecedented rate.  We will discuss the current threat profile of the network and evaluate how different visibility mechanisms provide the necessary network telemetry data.  We will discuss a solution set that can address these threat profiles in a simple and non-intrusive way by not just focusing on the tap/aggregation elements, but also combining a rich set of solutions from the best technology solutions partners in the industry.

1:15pm-1:30pm Break/Vendor Booth Time
1:30pm-2:00pm Session Seven

Gigamon

Martin Langer

It’s What You Can’t See That Will Sink You, Enhance Network Security and Increase Visibility

2:00pm-2:30pm Session Eight

LabTech Software

Bill Morgan
Technical Sales Manager

Three Ways to Increase Automation in Your Business

2:30pm-2:45pm Break/Vendor Booth Time
2:45pm-3:15pm Session Nine

paloalto Networks

Don Moose

A practical approach to advanced threat detection and prevention

Securing the network has never been more challenging with the continued proliferation of advanced threats that are increasingly targeted, fast-moving and evasive.  Join us for a presentation that covers a holistic approach to preventing security breaches.  We will cover how organizations can limit their risk of exposure to threats by safely enabling applications, can leverage cloud infrastructure to prevent advanced threats, and can integrate their network security with mobile device and endpoint security to properly secure every endpoint in the enterprise.

>>click here for the presentation

3:15pm-4:00pm Session Ten

Unisys 

Joe Clarke
Sr. Solution Architect
Unisys

Assurance Data

The Changing Cybersecurity Landscape

As the cybersecurity landscape continues to evolve, CISO’s need to determine what challenges may exist and what considerations  to make in order to address these evolving security threats.  With the consumerization of IT for example, the organizational parameter can no longer be defined and current security methods are proving ineffective. In order to address these concerns, we need to examine  a different approach to protecting mission critical resources.

Please join us in discussing:

  • Changes and challenges within the cybersecurity landscape
  • Discovering an alternative approach to existing security solutions
4:00pm-4:45pm Session Eleven

Xceedium, Inc.

Shawn Hank
Manager of Systems Engineering Group

Privileged Identity – The Core of the Kill Chain

In the past 12 months, 110 million Americans have been impacted and 432 million accounts compromised in data breaches. We see the same thing in breach after breach – the compromise and exploit of privileged user credentials. It's not surprising, then, that gaining access to those credentials is a critical element of successful attacks. 

In this session, you'll learn:

  • The central role privileged identity and credentials play in the intrusion kill chain.
  • How privileged identity was compromised in several well known breaches, and the results that followed.
  • How to protect privileged identities with technology and best practices.
  Prize Drawings for All in Attendance
4:45pm-5:15pm Session Twelve

Aerohive Networks, Inc.

Rich Korb
Principal Systems Engineer

Preparing Your Network for 802.11ac

Mobility is rapidly transforming the workforce, as organizations are deploying more and more smartphones and tablet devices onto their corporate networks, making Wi-Fi increasingly presumed as the primary access method to the network. And with so many mobile devices now competing for bandwidth, it’s only natural that the infrastructure has to evolve.  The session will discuss 802.11ac, Application Visibility and Control, as well as other solutions that Aerohive offers to assist with this evolution.

  Prize Drawings for All in Attendance
5:00pm-7:00 Happy Hour

GuidePoint Security

Kaspersky Lab

FireMon

Solutionary, Inc.

Will be hosting Happy Hour at the Cypress Cove - Main Level, located inside the hotel.

 

Event Sponsors/Exhibitors

Accuvant, Inc.
Aerohive Networks, Inc.
ArcMail Technology
Arista Networks, Inc.
Aruba Networks, Inc.
Assurance Data
Blue Door Networks, LLC
BrightPlanIT Inc. 
Bromium
Centrify Corporation
Check Point Software Technologies Ltd.
Cisco
CLEO
Code 42
CDN Partners
Cyber-Ark Software, Ltd.
DG Technology Consulting, LLC
DigitalEra Business Technology Solutions LLC
EVault, Inc.
Exinda
Fiberlink Communications
FireMon
FishNet Security, Inc.
Fortinet, Inc.
Fujitsu
Gigamon
Great Bay Software
IIBA West Central Florida
Infoblox Inc.
JDL Technologies
Kaspersky Lab
KEMP Technologies, Inc.
LabTech Software
LANDesk Software
LogRhythm
Maxis 360
Meru Networks
Milestone Systems, Inc.
NIKSUN Incorporated
Viper Network Systems, LLC.  
paloalto Networks
ReliaQuest 
SafeNet
Sims Recycling Ltd.
Sinnott Wolach Technology Group, Inc
Software ONE, Inc.
Solutionary, Inc.
Sophos PLC
STEALTHbits
Symantec Corporation
Tenable Network Security
 ThreatTrack Security, Inc
Unisys 
Varonis Systems
http://www.watchdox.com/
Websense, Inc.
WESTONINFOSEC.COM
WinMagic Inc.
Xceedium, Inc.
XIRRUS
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy