Presented by Fortinet
Come participate in a discussion about the Cybersecurity counterculture of platform consolidation. Learn of the potential benefits like reduction of complexity, and greater visibility and control.
Presented by Fortinet
Come participate in a discussion about the Cybersecurity counterculture of platform consolidation. Learn of the potential benefits like reduction of complexity, and greater visibility and control.
Presented by Atmosera
Expectations for information security and data protection are increasing, and so is the complexity. The stakes are higher than ever before due to compliance requirements and potential consequences on a company’s reputation. This presentation is designed to demystify the process of developing a strong security framework by getting started with a Defense in Depth approach based on 10 basic proficiencies.
Join this session and gain key strategies to:
Presenters:
Sean Ventura • CISO, Atmosera
Byron Anderson • InfoSec Engineer, Atmosera
Presented by Malwarebytes
From ransomware to Mac threats, attacks are up this year. Join Malwarebytes Lab and your peers for an enlightening hour of discussion and interaction.
Pulling from our analysis of millions of attacks on endpoints each year, we’ll recap 2019 threats and outline emerging trends in 2020. Together we’ll cover:
Presented by Quest Software
IOT is upon us all, like it or not. Gone are the days of just managing Windows Desktops and their respective software. Today we are responsible for managing the life-cycle of many types of devices. Anything from a Raspberry pi, to iPad, and anything in between must be managed and tracked during its life. With the exponential growth of network connected devices we are also seeing growth in the regulations surrounding those devices. Regulations means compliance audits which increases our need to manage and track out IT assets.
Presented by Unitrends
We are living in a “Less is More” world. In a landscape that’s rapidly changing, IT professionals are managing more work, projects, and risk than ever before. While external threats such as malware and natural disasters cause significant downtime and data loss without proper BC/DR implementation, organizations must also be prepared to safeguard from within. Data continues to grow at an exponential rate, and not only on-premises. As cloud-delivered solutions such as IaaS and SaaS are rapidly adopted by an increasing number of organizations, and the workforce itself is becoming increasingly dispersed and mobile, organizations must consider data protection strategies to address gaps in BC/DR outside the traditional data center. Join Adam Marget, Technical Specialist from Unitrends, as we explore the evolving landscape of data protection, cloud’s growing role, BC/DR strategies to safeguard local, remote, and cloud-based workloads, and best practices in planning your DR approach.
Presented by Druva
While more companies are now leveraging the cloud to increase their level of data protection and management, there are still many wondering “why?” The answer: the cloud actually brings substantial advancements to the data protection and management table that simply aren’t possible without it. The easiest advantage to envision? Unlimited scalability. If a data protection tool is properly designed, the capacity should automatically expand to meet any customer’s needs. The second advantage: the cloud is the simplest way to centralize the storage of all secondary data sources while also providing unlimited compute that can be used to gain additional insight and business value from that data. Finally, the ability to do automated Disaster Recovery (DR) without maintaining a DR facility is unquestionably a major value of the cloud, and simply isn’t possible otherwise.
Presented by Silver Peak
As cloud adoption and SD-WAN innovation hastens, global enterprises are transforming how they build and secure wide area networks. Leveraging automation, enterprises can deploy, connect and secure hundreds of sites per week, a feat not possible with a traditional device-centric approach.
During this session, we’ll discuss how the unification of SD-WAN, WAN optimization, routing and security in a single, centrally orchestrated platform:
Presented by OneTrust
While the California Consumer Privacy Act (CCPA) is now law, many key amendments and details about the law only passed just before the law’s effective date – meaning privacy and security pros are still working to build CCPA-compliant programs. In this session, we’ll share all the latest news on the CCPA law, including which amendments passed and how that impacts your privacy program. We’ll share a 5-step plan for CCPA compliance and what to expect in the future for the CCPA.
Presented by Theresa Masse • Cybersecurity Advisor, US Department of Homeland Security
You know at some point you will experience a cyber incident, if you haven’t already! The extent of the impact may not always be immediately obvious, however being adequately prepared makes the difference between chaos and responding effectively. This presentation provides an overview of federal cyber security services to assist private and public sector entities in improving their cyber monitoring, controls, incident response, awareness, and overall security posture. There are a number of assessments that will help organizations better understand their risks and inform decisions on prioritizing resources and funding. Whether large or small, all organizations are potential targets, and all employees have an important role in information security. Bad actors, whether criminals or nation states, are using more sophisticated techniques and tactics to infiltrate systems. Organizations must be prepared to react quickly and effectively, no entity is an island or immune from a cyber-attack. The federal government is committed to helping through sharing intel in a timely manner and offering relevant programs that can make a significant difference. Cyber resources and assistance can be expensive, however, there are a variety of federal cyber services available and all are free of charge. Take advantage of them!
Ms. Masse is a Cyber Security Advisor in Region X (Alaska, Idaho, Oregon, Washington) for the US Dept. of Homeland Security. Prior to that, she served as the Chief Information Security Officer (CISO) for the Port of Portland for 5+ years. Theresa was the first CISO for the State of Oregon and served in that capacity for 10 years. Previous to that, she worked in the private sector as the Senior Director for Information & Corporate Security at Cummins Inc., an international Fortune 500 company.
Ms. Masse has a Top-Secret security clearance. She is a former member of the executive committee for the State, Local, Tribal and Territorial Government Coordinating Council and was chair of the Cyber Security subcommittee. Theresa also served on the Cyber Security Advisory Board at Mount Hood Community College. She is a past member of the executive committee of the Multi-State-Information Sharing and Analysis Center (MS-ISAC) and currently serves as a co-chair of the mentoring program. Theresa has a Masters degree with a major in Management.
Presented by IVOXY Consulting & NetApp
Public clouds set a high bar for IT expectations of agility, scale, and services. Regardless of location and infrastructure, teams’ consumption experience with public cloud providers is driving their decisions and spending on IT today. Along with the ability to consume services across a choice of public and private clouds, teams must consolidate enterprise workloads without performance impact, deploying from a private cloud platform with service catalogs. Public clouds automate management and lifecycle, and they simplify how users consume IT.
Attend this presentation to learn how to simplify container orchestration and automation across the hybrid multi-cloud.