Architecting the New SD-WAN Edge for the Cloud-First Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

High End Storage Innovation Without Compromise

  Presented by TechPower

Discover why businesses undergoing digital transformation need a new approach for high-end storage — one that frees IT resources to perform more innovative and strategic tasks. During this presentation, you will learn why organizations are looking for a more resilient, simpler, high-end storage experience for every mission-critical application and how they can address those challenges in their datacenter today.

Welcoming Our New Artificial Intelligence Overlords: AI Meets IT

  Presented by Nuvodia

We all knew this day would come. It’s time to start handing over some decision-making to the machines. We should have known once we started feeding them data that they would eventually insist on digesting it too! Let’s talk about how we got here, where the use of Artificial Intelligence and Machine Learning in IT and security is today, and how long we think it’s going to be before the machines inevitably turn on us. Or maybe we’ll be fine? We’ll explore a number of AI-infused products that are on the market now, how effective they are, and why if your IT footprint doesn’t include AI today–well, it might be time to start thinking about an upgrade.

A Behavioral Approach to Web Application Security

  Presented by CompuNet & F5 Networks

In an ideal world, security controls would be as loose as possible for well-behaved legitimate users and increasingly tightened around bad actors. Join us as we discuss a behavioral approach to identifying and thwarting attacks against your web applications from highly skilled threat actors.

Managing the Impact of Collaboration Technologies on Your Network

  Presented by Cerium Networks

Today’s collaboration technologies come with many exciting features and benefits–all of which impact the network in various ways. This session will help the audience understand those impacts and how to manage them. This session covers everything from inter-branch communications, survivability, collaboration beyond your walls, and ensuring your collaboration environment is secure.

Topics include:

  • Inter-Branch Communications
    • SD-WAN
  • QOS, Path Diversity, Low Latency
    • Network requirements based on whether on-prem, cloud, or hybrid
    • Cloud Transport Leg/Poke –3rd Party Connections
  • Survivability
    • WAN/LAN resiliency
    • Local Call Processing / Failover Call Processing
  • Collaboration Beyond your Walls
    • Remote Workers
    • BYOD
    • Video Conferencing
    • Teams-based collaboration tools that combine meetings, calls, and IM into one platform
  • Ensuring your Environment is Secure
  • SIP
  • Toll Fraud
  • TLS Encryption
  • Encrypting the media
  • Certificates
  • Trunk Protection TDM/SIP
  • BYOD Policy Enforcement/MDM

Emerging Trends in Collaboration Technologies

  Presented by Cerium Networks

The need for collaboration is ever-present and more important now than ever. This session provides an update on the current landscape of collaborative communications technologies and trends—both available now and emerging in today’s marketplace. Upon completion, participants should understand how the collaboration landscape is changing from technology, administration, and business impact perspectives.

Topics include:

  • Adoption strategy is key!
  • User personas and moving beyond feature maps
  • Licensing models (trends and realities)
  • The one-stack model – Moving collaboration beyond telephony (voice, meetings, messaging, video, content/file sharing, third party API & integrations, etc.)
  • Manufacturer adoption and challenges with blended solutions

Information Technology at Washington State University

  Presented by Sasi Pillay • VP and CIO at Washington State University

Information Technology management is all about serving the customer. IT is the enabling force for everything we do, whether it is about recruiting promising prospects, providing a sound education, improving retention and graduation rates, providing career counseling and managing the students after graduation as successful alumni. It addresses teaching, learning, research and outreach.

The foundation of IT management is built on three tenets: Mission Enablement, Enterprise Risk Reduction and Cost-effective Operations. This presentation focuses on how a portfolio of services can be created with these tenets. Making progress on IT services also requires an IT governance process. The talk will include an example of a working governance process at WSU and how it is used to create a portfolio of services for the university.

Dr. Sasi Pillay serves as the Vice President and Chief Information Officer at Washington State University. In this role he oversees the computing infrastructure of foundational technologies and research computing, working in collaboration with his constituents.

Earlier he served as the Chief Technology Officer for Information Technology (IT) at National Aeronautical and Space Administration (NASA). Dr. Pillay is the recipient of several awards including NASA’s Exceptional Service Medal and the Outstanding Leadership Medal. Additionally, the Presidential Rank Award recognizing him as a Meritorious Executive in the U.S. federal government.

Dr. Pillay received his B.S. in Mechanical Engineering from Pennsylvania State University, M.S. and Ph.D. degrees in Computer Engineering from Case Western Reserve University. He also has a master’s degree in Management of Technology from the Sloan School of Management at the Massachusetts Institute of Technology.

Simplifying Security: Training for The Non-IT Professionals

  Presented by Community Security Coalition

With thousands of cyber security solutions out today in the market, simplifying your company’s security strategy has become more complicated than ever. Taking the holistic approach of enabling all members of your organization has never been more important or difficult. Join the CSC as they discuss the need for security education in todays every changing cyber landscape and how you can enable all employees of varying levels of technical expertise with the latest best-practices for their cyber defense.

AI Comes of Age

  Presented by BlackBerry Cylance & target=”_blank”>Structured

Today, artificial intelligence seems to be everywhere and it’s still gaining momentum – especially in cybersecurity applications. International Data Corporation predicts organizations will invest $35.8 billion in AI systems in 2019, up 44% from the previous year. But it’s important to understand that not all machine learning algorithms or artificial intelligence solutions are created equally. What are the most prevalent challenges in and concerns of leveraging AI in securing corporate information? What are the questions to ask when evaluating an AI-based cybersecurity solution?