Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization’s boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization’s core business strategy.

Active Directory Security: Early Stage Attack Activities to Watch For

  Presented by STEALTHbits Technologies

Attackers have demonstrated a consistent and ongoing ability to obtain access to workstations inside the network boundary through phishing and other web and email attacks. From here, attackers set their sights on gaining control of Active Directory as a means to an end; compromising Active Directory is an easy way to gain access to all critical corporate data and resources. Darin will discuss two early stage attack activities: LDAP reconnaissance and Password Spraying – that allow attackers to move laterally inside your AD environment. Detection strategies and mitigation steps will also be explained.

IT vs IS: How to Make Pineapples Work on a Pizza

  Presented by INTERFACE Kansas City Advisory Council

As technology becomes increasingly important to an organization’s success, the number of roles in the field have increased, often creating blurry distinctions between responsibilities. These gray lines can cause conflict within the company when they aren’t properly managed. Join the Advisory Council as we discuss the relationship between IT and IS (Info Sec), where they overlap, where they differ and how to get the most out of working together without stepping on people’s toes.

Moderator:

  • Keith Shaw • President; ISC2

Panelists:

  • Rich Graham • Senior Manager, Cybersecurity & Privacy; PwC
  • Eric Baer • Chief, Information Technology Operations; USDA Risk Management Agency
  • Rick Derks • Chief Security Officer; FCS Financial
  • Britney Hommertzheim • Director of Information Security; AMC Theaters

Hyperconverged Infrastructure: Do More with Less

  Presented by Scale Computing

Learn how organizations are doing more IT with less infrastructure and less complexity using hyperconverged infrastructure (HCI). The hyperconverged experts will discuss why virtualization doesn’t need to be complex, inefficient, or costly when you adopt a modern, innovative architecture. The simplicity, scalability, and high availability of a turn-key infrastructure doesn’t just lower costs, it frees up your own IT experts to work on new projects they haven’t had time for in the past.

How Security Leaders Gain Trust in the Boardroom

  Presented by Kudelski Security

Security Leaders need a solid and comprehensive approach in communicating their cybersecurity programs. Kudelski Security surveyed CISOs, CSOs, and CIOs about communicating their cybersecurity program with their Board of Directors. The collective responses provide insight into what interests boards the most, suggested strategies and metrics that resonate when answering the board’s most challenging questions. A summary of the research will be provided to all participants in hardcopy booklet format.

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization’s boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization’s core business strategy.

Welcome to the New Age of Converged Secondary and Primary Storage

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won’t be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

Active Directory Security: Early Stage Attack Activities to Watch For

  Presented by STEALTHbits Technologies 

Attackers have demonstrated a consistent and ongoing ability to obtain access to workstations inside the network boundary through phishing and other web and email attacks. From here, attackers set their sights on gaining control of Active Directory as a means to an end; compromising Active Directory is an easy way to gain access to all critical corporate data and resources. Darin will discuss two early stage attack activities: LDAP reconnaissance and Password Spraying – that allow attackers to move laterally inside your AD environment. Detection strategies and mitigation steps will also be explained.

Security Automation in the Cloud

  Presented by Trend Micro

Cloud Computing brings greater simplicity around provisioning and deployment. The challenge is how to properly apply security without creating complexity.

With automation, one can use traditional technical controls to provide comprehensive coverage. This approach is not simply paying “lip service” to compliance requirements.

In this session we will discuss the drivers for such automation and look at what is traditionally considered detective controls in a preventative way.

Achieving “Always On” IT Resilience

  Presented by Zerto

It’s time to revolutionize your data protection strategy. Protecting and transforming your digital business for exceptional customer experiences requires an “always on” platform for disaster recovery, backup and cloud mobility. In this presentation, we’ll discuss how to cost-effectively and swiftly manage both unplanned disruptions, including outages, ransomware attacks, and natural disasters, as well as planned events, such as moving to the cloud or data center consolidations.