What We Do
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Contact Us
DC on facebookDC on Twitter
Tech-Security Conference 2014

Montreal Tech-Security Conference

Date: Thursday, September 25, 2014

Hyatt Regency Montreal
1255 Jeanne-Mance
Montreal, Quebec, Canada, H5B 1E5
p: 514.982.1234

>>click here for directions


The Montreal Tech-Security Conference features 25-30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more. There will be lots of give a ways and prizes such as iPods, $25, $50 and $100 gift cards, as well as cash prizes and lots more! This unique conference format will provide educational speaker sessions as well as tremendous networking opportunities. You'll come away with advice and knowledge you can start applying to your environment immediately. To register for this conference, click on the link in the left column. Your registration will include your breakfast, lunch, conference materials and entrance into the conference sessions and exhibit area. Scroll down to view the full conference agenda.

For information on participating as a vendor: sales@dataconnectors.com


This Conference Qualifies For
CPE Credits.

8:15am-8:45am Check-In and Opening Introductions
Data Connectors Data Connectors is proud to host the Tech-Security Strategies Conference.
8:45am-9:15am Session One

Aruba Networks, Inc.

Roland Pintal

Managing Access Policies for Mobile Users

Secure network access has never been more challenging.  First, the number of devices per person today makes it impossible to know who connects and with what device. Is it an employee or a guest? IT-managed device or BYOD?  The next challenge is to securely onboard and differentiate access by user role and/or device type.  This session outlines how dynamic role-based policy management for mobility and BYOD provides greater visibility, network security and IT workflow control.

9:15am-9:45am Session Two

EVault, Inc.

Dan Bowman
Channel Relationship Manager

5 Security Questions to Ask When Choosing a Cloud Service Provider



>>click here for the presentation

9:45am-10:15am Break/Vendor Booth Time
10:15am-10:45am Session Three

Websense, Inc.

Luigi Avino
Sr. Sales Engineer

Recognizing the 7 Stages of Advanced Threats & Data Theft

Hackers today are organized, sophisticated and committed. Their targeted attacks can easily bypass URL and AV defenses, and traditional security systems do little to prevent data theft and cybercrime call-home communications. Add to this the continued growth in SSL traffic due to Cloud apps, increased mobility and remote users, and you have the potential for "blind spots" in your defenses that hackers use to their advantage.  Join us to learn more about these increased risks and sophisticated threats. It will help you understand the signs of advanced attacks and provide insight on how you should respond—which is the first stage in stopping hackers in their tracks.
10:45am-11:30am Session Four

WatchGuard Technologies, Inc.

Jean-Pier Talbot
Sales Engineer

 Images et technologie, Inc.

UTM Firewall Challenges

The UTM/Next generation firewall market is growing very quickly as companies are seeing the value in the benefits.  Next generation firewalls provide control over websites and applications and block viruses, spam and more.  They perform many unique tasks – much like a SmartPhone.  SmartPhones are not just phones; they are calendars, alarm clocks, cameras, gps and so much more.  The old saying ‘Jack of all trades but master of none’ doesn’t work with SmartPhones – they do everything well…it’s the same with UTM/Next generation firewalls.  Learn how UTM firewalls are really a ‘Smart’ firewall.

>>click here for the presentation

11:30am-12:00pm Break/Vendor Booth Time/Lunch
12:00pm-12:30pm Session Five


Stephen Gates

10 Key Steps for a Sustained DDoS Protection Plan

Today's breed of DDoS Attacks and Cyber Threats are not only incredibly sophisticated and designed to wreak havoc on your business, they are challenging to identify, and defend against. Without the proper technology in place to detect, analyze and mitigate, any online business is vulnerable to effects of a DDoS attack.

This session examines key steps to consider in your DDoS protection plan to enhance your existing defense in depth security strategy and the Corero approach to helping customers respond to the wide variety of attacks we see today.

12:30pm-12:45pm Break/Vendor Booth Time
12:45pm-1:30pm Session Six

Fortinet, Inc.

Mathieu Nantel
Solution Engineer

Bringing Next-Gen Visibility to the Next-Gen Firewall

Next Generation Firewalls and analyzers provide deep insights into an organization's internal/external traffic.  Join Fortinet to learn how combining industry leading performance with best of breed security inspection capabilities is vital in the modern information security threat landscape.

1:30pm-2:00pm Session Seven


Lid Tadesse
Channel Sales Engineer

Francis Legault
Account Manager



New World, New Realities: Endpoint Threat Detection, Response and Prevention for DUMMIES

Traditional, signature-based endpoint protection solutions are ineffective against today’s advanced threats, including zero-day and targeted attacks, which don’t have known malware signatures. Advanced attackers do everything they can to evade detection. To combat them, enterprises need endpoint threat detection, response and prevention tools that will enable them to see and understand the full attack lifecycle. During this presentation you’ll learn:  

  • Who’s a target and Why
  • Why traditional endpoint security solutions are failing to protect your environment from advanced threats
  • The definition of Endpoint Threat Detection & Response and foundational capabilities
  • What you can do right now to assess your endpoint security posture and reduce your organizations attack surface
2:00pm-2:15pm Break/Vendor Booth Time
2:15pm-2:45pm Session Eight

FireEye, Inc.

Elie Nasrallah, CISSP
Consulting Systems Engineer

The Herjavec Group.

Cyber Attacks are Among us

The most secure environments are falling victim to the latest breed of cyber attacks. The attacks are more sophisticated than ever and are penetrating through many layers of defense. Advanced malware, a.k.a Advanced Persistent Threat (APT) or zero-days have become sophisticated enough to bypass traditional, signature-based defenses. This session will demonstrate how advanced threats work and will explain how to detect, respond and stop the advanced attacks. 

2:45pm-3:15pm Session Nine

Radware Ltd.

Dominique Clement

War Stories From the Trenches – Information Security Survival

A new breed of carefully orchestrated, multi-vector assaults are overwhelming the security infrastructure - and overpowering typical network security measures - of enterprises worldwide. Traditional countermeasures have failed and will continue to fail in future incidents. Hear how leading enterprises are deploying integrated Attack Mitigation Systems (AMS) and successfully defending against high-profile attacks through real-time experience and knowledge of Radware’s Emergency Response Team (ERT).

Attaques DDOS sur l'infrastructure de votre réseau, comment réagir?

Nous vous invitons à cette conférence pour en apprendre davantage sur les techniques d’attaques DDOS. Cette nouvelle réalité apporte de grands changements au niveau de la stratégie que les spécialistes en sécurité doivent prendre pour protéger adéquatement le périmètre du réseau et l’information qui y réside.  La conférence inclus des exemples d’attaques, une présentation des statistiques concernant les attaques DDOS et les conclusions de l’étude « Radware’s Global Application and Network Security Report on DDOS »

3:15pm-3:30pm Break/Vendor Booth Time
3:30pm-4:00pm Session Ten

Veeam® Software

Alex Pélissier
Systems Engineer 

Defining Availability for the Modern Data Center



>>click here for the presentation

4:00pm-4:30pm Session Eleven

Novell, Inc.

Richard Cabana



You can’t dodge the data explosion, but you can bring the chaos under control. Nowadays the sprawl of file storage in your enterprise is even moving outside your network as users turn to cloud-based apps to share and access corporate files. You can tame this sprawl if you have intelligent tools to help you. Join us to see how Novell can help keep your important corporate files secure and governed, with all the file-sharing ease and convenience users expect.

  Prize Drawings For All in Attendance
4:30pm-5:15pm Session Twelve


Beverly Golchuk
Area Director - Software Channel


The Changing Cybersecurity Landscape
As the cybersecurity landscape continues to evolve, CISO’s need to determine what challenges may exist and what considerations  to make in order to address these evolving security threats.  With the consumerization of IT for example, the organizational parameter can no longer be defined and current security methods are proving ineffective. In order to address these concerns, we need to examine  a different approach to protecting mission critical resources.

Please join us in discussing:

  • Changes and challenges within the cybersecurity landscape
  • Discovering an alternative approach to existing security solutions
  Prize Drawings For All in Attendance

Event Sponsors/Exhibitors

A10 Networks, Inc.
AccessData Group, Inc.
Aerohive Networks, Inc.
Aruba Networks, Inc.
Centrify Corporation
Core Security Technologies
Dell Software
DeviceLock, Inc.
Empowered Networks
FireEye, Inc.
Fortinet, Inc.
Hexis Cyber Solutions a KEYW company
ISACA - Montreal
 Images et technologie, Inc.
Kaspersky Lab
McAfee, Inc.
Narus, Inc.
Novell, Inc.
Radware Ltd.
Secure Sense
EVault, Inc.
Silver Peak Systems, Inc.
Solantus Inc.
Sophos PLC
Storageflex Inc
testworX Inc.
The Herjavec Group.
Trend Micro Canada Technologies, Inc
Varonis Systems
Veeam® Software
Vormetric, Inc.
WatchGuard Technologies, Inc.
Websense, Inc.
Zero Spam
   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy