Secure, Fast & Flexible: Improving Performance with Networking Standards

Presented by JT Tech/Extreme Networks

The digital business is here, and networking is fundamental to its success! The modern enterprise demands agility, scalable and resilient connectivity, and inherent network security – but without the complexity of traditional networking. Advances in networking technology – being driven through standards bodies such as the IEEE and IETF – have dramatically simplified the design, build and operation of the network; delivering automation while at the same time improving security and stability.

Learn from Jamie Eubank, Solutions Architect with over 20 years of experience in large scale, mission critical, campus and sporting event architectures. Specializing in Shortest Path Bridging 802.1aq, Wi-Fi technology (CWNE) and Security Architectures (CISSP/CEH) on new standard-based approaches to network design to help you:

  • Deliver new digital technology and applications to your users & customers faster
  • Avoid lengthy maintenance windows for network moves, adds and changes
  • Contain breaches and prevent lateral movements through end to end segmentation
  • Improve the performance and scale of your most demanding applications (video surveillance, video distribution, patient telemetry systems, etc.)
  • Improve stability and simplify troubleshooting

Administering Responsibly

Presented by One Identity

Managing elevated and shared access credentials is one of the biggest challenges facing complex heterogeneous organizations today. Administrators must be able to access the systems they manage with sufficient rights to do their jobs, but organizations must control that access to ensure security and regulatory compliance. The days of administrators sharing accounts and passwords and operating without auditing are gone (or they should be).

Large enterprises face unique challenges. They too must control the use of elevated privileges, but they need to find ways to enhance authentication for these accounts to meet mandates while still enabling administrators to administer. Even with multifactor authentication to “check out” a privileged account or session, we still need to take steps to mitigate potential account compromises–making sure the admin that authenticated today is still who they say they are. We’ve come to the point where we need to continuously analyze administration by watching normal behavior and comparing it to current behavior – with real-time in-line remediation to add a powerful layer of risk mitigation.

PCI and Your Organizational Liability

Presented by Structured

Payment card processing is a critical service many companies and organizations offer. But with this service comes the added responsibility to comply with PCI requirements, and the technical, administrative, and physical controls applicable to card processing environments. Failure to comply can result in costly fines. Plus, a breach of card holder information could have disastrous financial and public relations consequences for compromised merchants.

Want to know more? With compelling and engaging content delivered by Rob Wayt, a PCI Qualified Security Assessor (QSA), you will learn the intricacies of these requirements, proper scoping, and how to mitigate risks that merchants have while card processing.

Innovation and Evolution: BC/DR for Today’s Multi-Cloud Environments

Presented by Unitrends

We are living in a “Less is More” world. In a landscape that’s rapidly changing, IT professionals are managing more work, projects, and risk than ever before. While external threats such as malware and natural disasters cause significant downtime and data loss without proper BCDR implementation, organizations must also be prepared to safeguard from within. Data continues to grow at an exponential rate, and not only on-premises. As cloud-delivered solutions such as IaaS and SaaS are rapidly adopted by an increasing number of organizations, and the workforce itself is becoming increasingly dispersed and mobile, organizations must consider data protection strategies to address gaps in BC/DR outside the traditional data center. Join Adam Marget, Technical Specialist from Unitrends, as we explore the evolving landscape of data protection, cloud’s growing role, BC/DR strategies to safeguard local, remote, and cloud-based workloads, and best practices in planning your DR approach.

Fighting Cybercrime with Artificial Intelligence

Presented by Fortinet

In this session you will learn how we are using modern A.I. and machine learning to assist in threat research. Additionally we’ll discuss the evolution of threat research/methodology and how global collaboration leads to enhanced protection for everyone.

Vulnerability Management: Work Smarter Not Harder “The Data Problem”

Presented by Kenna Security

With an exponential increase in the volume and velocity of new vulnerabilities, it is no wonder that today’s InfoSec and operations teams find it difficult, if not impossible, to meet the increasing demands of remediation. This doesn’t even include internal corporate policies or politics which present significant barriers as well. It is not uncommon to discuss a prospective customer’s VM program with them, only to find out that they are using spreadsheets to manage the load. They then hand off their “prioritized” workload to a group of admins who are not bound to the same policies or procedures. The average enterprise today has 100’s of thousands to millions of vulnerabilities spread across tens of thousands of assets. A great many of these organizations continue to rely on CVSS scoring as the only benchmark. The latest research shows us that if you base your remediation strategy on fixing CVSS 7 or greater, your efforts will yield the same effectiveness as randomly choosing any set of active vulns in your environment to address. It is about 22% effective in either scenario. The purpose of this presentation is to discuss and explore more effective ways to address such challenges and roadblocks. In particular, how does a practitioner better prioritize and communicate with their various internal colleagues to improve their workflow and posture?

Transforming IT Ops and Network Experiences with A.I.

Presented by Juniper & Structured

Today’s networks and IT teams are challenged by the soaring numbers of mobile and IoT devices and apps. Learn how data science, AI and a modern microservices cloud architecture can deliver the agility, scale and reliability that businesses need to succeed. We are transforming user and IT experiences with an AI-Driven Enterprise through proactive automation and relevant insights while ultimately evolving towards a self-driving network. In this session, you’ll learn why three of the Fortune 10 companies, along with thousands of other organizations, are AI-driven wired and wireless networking customers, to deliver new services, assure network performance, and streamline help-desk operations.

The Current State of Ransomware and Proactive Ways to Combat It

Presented by Xiologix

In this presentation, we will do a quick review of the current state of ransomware and then jump right into proactive approaches utilizing the latest tools to prevent and combat this growing threat. We will include a discussion of identifying attack vectors, network defenses, storage defenses, asset management, SOC, incident response, and the benefits of each.

Achieving a Successful Security Segmentation

Presented by Illumio

You rely on the network to deliver applications. But as IT scales in size, connectivity, and environments outside the network to public cloud, we cannot rely solely on the network to secure applications. The answer is to decouple security segmentation from the network. This allows us to protect applications wherever they run –because they do not live exclusively on our networks anymore, and enforcement must go wherever they do.

During this informative session, we’ll discuss:

  • What is security segmentation?
  • Challenges of traditional network segmentation
  • Decoupling segmentation from network architecture
  • Principles of successful security segmentation
  • 5 steps to implement a strategy

Stay Ahead: Embracing New Technology

Presented by Tony North • President, Seattle HDI Chapter

Technology can be a hinderance if not well planned or deployed. With new tools like AI, IoT and Apps, it can be difficult for employees and employers to embrace it. Join the Seattle chapter of HDI, Help Desk Institute, for an interactive session. You will learn about the issues facing us all today while finding recommendations on how to improve adoption of technology in a very simple way.