Home
   What We Do
   Events
   Past Events
   Register for
   an Event

   Sponsorship    Information

   In the News
   Photos
   Contact Us
DC on facebookDC on Twitter
In the News

News Links from our Partner Companies

Axway

AEP Networks

Celestix

Wave

M86 Securities

Edgewave

Alliance and Sophos at Data Connectors Security Conference on March 10th

- from Alliance Technologies webpage

link:
http://www.alliancetechnologies.net/news/alliance-and-sophos-data-connectors-security-conference-march-10th

Posted on February 18, 2011

Please join Alliance Technologies and Sophos at the Data Connectors Tech-Security Conference in Des Moines on Thursday March 10th 2011.

Alliance Technologies and Sophos, the security experts, team up to provide customers with added value and security for their IT budgets.

Sophos protects against known and unknown threats transmitted via email, the web, and removable storage devices. We control the use of unwanted applications such as file sharing, instant messaging and VoIP; and prevent data leakage with easy-to-use file encryption technology to protect confidential and sensitive data.

The Des Moines Tech-Security Conference will feature 30 vendor exhibits and several industry experts discussing current tech-security issues such as email security, VoIP, LAN security, wireless security, USB drives security & more.

Tech-Security Conference Dramatizes Problem of Data Leakage
Security News - Solutions/Issues
Written by Dennis Fletcher, Fletcher Marketing
Friday, 01 February 2008

Thousands of laptops are reported stolen annually, but industry is doing little to protect the data that may be compromised after the loss.

For the seventh time in as many years, the Tech-Security Conference returned this week to Southern California as part of a cross-country tour in which attendees heard both technical presentations and saw the latest in Internet security products. Those who attended were there because they needed to keep their employers’ or clients’ networks safe from threats, external as well as internal.

Topics at the conference, held at the Marriott Hotel in Woodland Hills, covered ways to strengthen incident response, email security, threats and countermeasures, secure business solutions, end-point security solutions, LAN security, the security landscape, and data loss and leakage. A final indicator of how interested an attendee was in the overall conference might have been measured by whether she stayed until the day's final talk by IBM’s Will Irace describing the holistic approach that IBM is taking in addressing security threats.

IBM's presentation introduced a new data protection model to guard against data loss. It employs roadblocks, password protected ZIP files, visible monitoring, just-in-time education, full disk encryption, network forensics, and network appliances.

Among the sobering statistics to emerge from the conference were:
· Some 673,000 laptops were lost in 2005
· An estimated 11,000 were left behind in taxis.
· The eventual whereabouts of all the laptop data is anyone's guess!

IBM’s ISS division claims that stopping data leakage requires a comprehensive suite of security software and services that begins with an assessment/discovery process and includes security training prior to installation of the solutions required.
Others at the conference concerned with data leakage prevention (DLP) included Carlos Sanz of Lumension Security (www.lumension.com) who said DLP is a huge issue today and noted that in California, a loss of data in the financial services industry requires immediate public disclosure.

Sarah Jacks of Sendio (www.sendio.com) was there to show how the company's anti-spam appliance does battle with the world's purveyors of malware. Like many other point solutions, the Sendio ICE Box is a separate server that houses the software products and provides a safe and stable environment from which to fight malware flooding the Internet and nosing into companies' email servers.

Dyntek’s Clancy Barham (www.dyntek.com) was demonstrating how unique each person's keyboarding style is. Think we all type alike? The company's Bio Password software can detect the difference between your entering your ID and password and someone else typing in the exact same phrases.

Chris Bramhall at TippingPoint (www.tippingpoint.com) spoke about the firm's Intrusion Prevention System (IPS), saying that compliance is driving many activities in network security today and that California has a record for stronger compliance measures than most.

Pete Elliot and Sandy Nannini of Key Information Systems (www.keyinfo.com) demonstrated the breadth of IBM/ISS’ network security solutions and stressed the importance of Key’s assessment process as a critical first step in initiating an analysis of an enterprise’s network security needs.

Finally, Don Wisdom of Datalink Networks (www.datalinknetworks.net), a reseller of security, network, server and storage solutions, identified what he believes today's preeminent security issues are as the following:
1. What are effective ways to secure wireless networks?
2. The convergence of data, wireless, and VOIP networks
3. The trend toward security point-products being absorbed by larger end-to-end solution providers
4. The emergence of network forensics

What did this reporter leave with from the conference? First, I concluded that the little guys (single product point solutions) are being gobbled up by those offering bigger end-to-end solutions. Second, many of the point-solution ISVs prefer to offer their software in an appliance.

Among the miscellaneous bits of trivia from the show that suggest malware is a problem growing costlier by the day are the following:
· It costs $113 per employee per year to find email erroneously stopped by spam filters (Source: Sendio).
· Some 36 percent of firms in one study lost business because email went astray.
· One law firm was fined by a district court because a critical message was lost in a spam filter.

The Data Connectors-sponsored conference moves on to Nashville Feb. 6, then San Jose on Feb. 20. For the full schedule, visit http://www.dataconnectors.com/.

Last Updated ( Friday, 01 February 2008 )

NEWS RELEASE

February 28, 2003
FOR IMMEDIATE RELEASE

2003 Chicago HIPAA Security and Privacy Conference

National Conference features Workshop designed to help meet HIPAA requirements

CHICAGO, IL - Industry leading presenters will explore the impact and compliance strategies of the Health Insurance Portability and Accountability Act (HIPAA) at a half-day conference and workshop on Thursday, March 20. Attendees will also have their choice to participate in two of the three Breakout Sessions offered.� The presenters, each selected for their in-depth knowledge of the HIPAA regulations and IT security include:

Joe Brisson - Healthcare Practice Leader, PSC Group, Overland Park, KS � HIPAA Transaction Compliance: Keeping the Checks Coming

Mike Reagan - Senior Vice President, Vericept Corporation, Englewood, CO - Health Information Privacy. Discovering Your Points of Exposure and What You Can Do To Address Them

Bill Kamarak - Channel Account Manager, SonicWALL, Sunnyvale, CA � Internet Security Solutions for HIPAA Compliance

Mark Diodati - Area Principal � Technical Architecture, RSA Security, Bedford, MA � Strategies for Identity Management and HIPAA Compliance

Rich Baich - Sr Director for Network Associates Expert Services, Network Associates, Santa Clara, CA � Dispelling the Myths of HIPAA Security

The Health Care Financing Administration (HCFA), which enacted HIPAA in 1996, and expanded the act with the HIPAA Privacy Rule in 2000, is the umbrella agency for Medicare and Medicaid healthcare coverage. The combined regulations have dramatically challenged the information technology, administration and legal departments at hospitals, medical clinics, nursing facilities and other health-related agencies across America. HIPAA closely defines the security of patient information to ensure the confidentiality among physicians, patients and health plans.

The conference and workshop is designed to provide answers to common problems facing Information security professionals, healthcare administrators, risk management and compliance officers and internal and external legal advisors. It will be held at the Sears Tower Conference Center, Suite 3350, Sears Tower, 233 South Wacker Drive, Chicago, Ill. Registration is $85.00 per attendee and available online at www.dataconnectors.com.

The conference is presented by Data Connectors, a St. Louis-based company that specializes in producing executive seminars in the technology and healthcare fields. The sponsors for this event are Authenex, Courion Corporation, Entercept Security Technologies, Lansa, McAfee Security, Network Associates, Pest Patrol, PSC Group, RSA Security, Secure Pipe, Shred-Co, Sonic Wall, SPI Dynamics, Check Point and Vericept Corporation.

###


Press Releases

Network Associates Press Release

Chicago Press Release

   Copyright © 2009-2014. Data Connectors, LLC. All rights reserved. Send comments to webmaster@dataconnectors.com
Data Connectors Privacy Policy