Staying Secure While Working from Home

  Presented by Trend Micro

Working from home has become almost ubiquitous in these times of COVID-19. Quarantining your devices while away from the office is not an acceptable solution to the many risks that exist outside of your corporate network. Please join Trend Micro to discuss the many ways you can help ensure that working from home does not compromise the security posture of your organization.

Own Your Data

  Presented by Commvault

Take ownership of data that already belongs to you.

Today organizations are storing their corporate data across multiple locations and platforms. On prem data centers, co-lo facilities, hybrid/multi cloud, SaaS and endpoint devices. With company data being so widely dispersed it’s difficult to know if you have full visibility, access and the flexibility to move data and workloads across locations and platforms. Protecting your data is only one component to maintaining ownership of your data. Along with having a robust data protection platform for on prem data you would also need the same level of control/protection of data assets that live outside the data center.

To truly own your data you must:

  • Protect and secure your data regardless of location or platform
  • Have access to it all
  • Have the tools to move your data/workloads where it makes sense for the business today and the flexibility adjust as business circumstances change.
    (On-Prem, hybrid/multi cloud, SaaS)
  • Have insight into your data, not only to understand the “what and where” but to provide governance and compliance

We will discuss what this all means and why you should rethink your approach to data management.

2020 Aftermath and Beyond: Top Focus Areas on Cybersecurity, Privacy and Business Risk

  Presented by INTERFACE Advisory Council

2020 has been a transformational year. The COVID-19 pandemic certainly has made a big impact and expedited our business-IT efforts in different areas within our organizations. Cybersecurity, privacy, business risk received more attention from leadership. So, what happened and what is next? Join to our highly distinguished panel for an engaging discussion and walk away with valuable insight on top focus areas that every business executive needs to know and be prepared for in this coming year.

Moderated by:

Tolgay Kizilelma PhD. • Chief Information Security Officer, UC Merced

Panelists:

Jack Freund PhD. • Head of Cyber Risk Methodology, VisibleRisk

Jimmy Sanders • Head of Information Security, Netflix

Melissa Bendana • Information Security, Governance and Risk Management, Blue Shield of CA

Rand Morimoto PhD. • CISSP, Convergent Computing

Read more
about our Moderator and Panelists >>

IT Interrupted: Best Practices in Disaster Recovery Planning

  Presented by Zerto

As IT application availability requirements continue to evolve, technology continues change to meet the new requirements. Join us as we discuss planning considerations for bringing your virtualized workloads into the next generation of IT resilience. You will learn about data center options to consider as part of your recovery strategy, business and technical trade-offs that will have to be made, capacity planning considerations, and testing approaches to that are possible that will optimize application up-time.

Responsible Administration: The Admin Insider (Threat)

  Presented by One Identity

System Administrators are critical people to every organization. They design, build, and maintain all the parts and pieces that enable business, whether that’s retail, healthcare, or even a government agency. Ensuring sysadmin tasks are performed as securely as possible without hampering their ability to keep our business running is a delicate balance. These “insiders” not only know how the systems operate but have the credentials and privileges to operate them.

In this session, we will demonstrate an Active Directory breach using pass-the-hash and discuss ways to enable the System Administrators to operate in a way that not only protects the business from threats but also enables them to perform the intricate tasks they accomplish daily to keep business flowing under the covers.

Automating the Analyst

  Presented by Darktrace

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks is rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms.

DRaaS for Everyone

  Presented by StorageCraft

All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.

Enduring from Home: COVID-19’s Impact on Business Security

  Presented by Malwarebytes

All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.

Architecting for the Agentless

  Presented by Gigamon

Today’s networks are swarming with IoT, OT, and virtual devices of every size and shape. As they have proliferated, and the security attack surface has likewise increased, the market has responded with a wide variety of technologies to help understand, manage, and secure just what is on your network. This is the rise of the technologies classified as “agentless” and there is a good chance you will be looking, now or in the future, at a project that comprises such technologies. While much of what is fundamentally required to enable these technologies is not new, organizations struggle with trying to implement these on an “ad hoc” basis, with little thought to future considerations or scale. This presentation will take about a more strategic approach to handling these implementations, what a visibility fabric is, and how today’s organizations can architect their environments for their future needs.