The Top 5 Challenges for Desktop and App Virtualization

  Presented by Bitdefender

Businesses with large office or task-based workforces are increasingly moving to application and desktop virtualization. This is because virtualization technologies, both applications and virtual desktop infrastructure (VDI), offer IT organizations and their end users an array of choices in accessing applications and desktops. And, as organizations adopt digital workspaces, they naturally expect a higher-quality user experience. Unfortunately, virtualization brings both new and unique security challenges with it.

This presentation will cover the top challenges that enterprises face and will cover suggestions to identify a security solution that complements your virtualization initiatives and makes both the Infosec team and users happy.

Are Your IT Trains Running on Time?

  Presented by Eric Ried • CTO, Presbyterian Healthcare Services

The details of this presentation will be available soon. Please check back for updates!

Real-World Impact of Security Risks in Industries Using IIoT 

  Presented by Trend Micro

This presentation will talk about research on radio remote controllers used in industrial settings, and how they can be used for attacks in this environment. This will shed light on how a cyberattack can inflict physical damage or harm. The goal is to inspire the audience to think outside the box in terms of what can be compromised and impose a sense of urgency in the IoT/IIoT security space.

Artificial Intelligence in Action: A Conversation About Practical AI

  Moderated by INTERFACE Advisory Council

Moderator:

  • Dr. Tobe Phelps • Chief Technology Innovation Officer; CNM

Panelists:

  • Lissa Moore • Research Scientist; Los Alamos National Laboratory
  • Luis Brown • Chief Information Security Officer, CNM
  • Dee Skinner • Director of IT Services, Haverland Carter LifeStyle Group

Using Packet Flow Based Measurements to Support IT Services

  Presented by Dennis B. Bateman • Network Engineer, Sandia National Laboratories

Can you see the IT Service that you are delivering to your customers? How well do you know the health and performance of your service? Do you know if networked issues are impacting your users? Let packet flow analysis help make operational decisions, set priorities, generate metrics, enable proactiveness, and much more.

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Mitigating Cybercrime in your Enterprise

  Presented by Fortinet

The attack surface that enterprises much protect is expanding dramatically. How do you maintain visibility and security of your traffic from IoT to the cloud. We’ll explore the threat vectors that cyber criminals use to penetrate your defenses and the security tools you can use to defend against those attacks.

Threats to Public Cloud Workloads

  Presented by Trend Micro

This presentation will revolve around the various threats workloads are susceptible to as more and more organizations shift from on-premise to the cloud. This will focus primarily on public cloud infrastructure but many of the concepts will apply directly to private cloud/on-prem data center infrastructure as well. The goal of the talk is to give the audience a better understanding of the vulnerabilities associated with cloud workloads and mitigation strategies.

Building a Security Program with the CIS Control

  Presented by CompuNet

Developing an effective security program is a complex undertaking. Let’s jumpstart the process! We’ll discuss leveraging the Center for Information Security’s Critical Security Control framework to identify and prioritize security controls based on efficacy and business impact. After a brief overview of the CIS CSC, we’ll discuss the ongoing measurement and reporting necessary to organize a diverse set of tools into a well-managed information security program. We’ll also demonstrate and share freely available tools to help organizations perform internal assessments and leverage benchmark configuration guides.

Controlling Application & Systems Access with Microsegmentation

  Presented by IVOXY Consulting

Being able to control access to systems & applications based on identity has been an ideal for many, many years. It’s only been recently that we’ve gotten the ability to control access to/from any system and/or any application. Microsegmentation technology can be deployed without downtime & without service interruption (well, if you do it right!). Anyone who has been through a pen test knows that our on-prem & cloud datacenters are largely wide-open: There’s nothing to stop malware from a PC or infected server from spreading.

Join IVOXY Consulting to learn how microsegmentation works & how your datacenter can benefit from one of the hottest trends in information security today.