Cookies and Alphabet Soup: What are the real consequences?

  Presented by cStor

The new era of data privacy regulations is here. With the alphabet soup of regulation names, like GDPR, CCPA, and newer state laws HB or SB, it’s more than just cookies consent on a website. There are real consequences around non-compliance. In this session, we’ll explore what you need to know about these regulations, if there is real meat around non-compliance with penalties, and the data security controls you need to put in place to keep data private.

Addressing Infrastructure Security Across Hybrid Environments

  Presented by Trend Micro

Security requirements do not go away when you move part of your data center workloads to the cloud. Although most security controls can be easily applied to systems in the cloud, the weight of those controls and what constitutes an immediate concern versus a lower priority alert, can be different. We will discuss the need for advanced visibility to differentiate your cloud systems versus your internal data center with central visibility. With the dynamic nature of the cloud, and the flexibility of the modern data center, it is important to apply the same security controls but view the alerts differently depending on their origin.

Welcome to the New Age of Converged Secondary and Primary Storage

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won’t be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

Addressing Infrastructure Security Across Hybrid Environments

  Presented by Trend Micro

Security requirements do not go away when you move part of your data center workloads to the cloud. Although most security controls can be easily applied to systems in the cloud, the weight of those controls and what constitutes an immediate concern versus a lower priority alert, can be different. We will discuss the need for advanced visibility to differentiate your cloud systems versus your internal data center with central visibility. With the dynamic nature of the cloud, and the flexibility of the modern data center, it is important to apply the same security controls but view the alerts differently depending on their origin.

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization’s boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization’s core business strategy.

Evolving Your BC/DR Strategy to Protect Today’s Multi-Cloud Environments

  Presented by Unitrends

We are living in a “Less is More” world. IT Professionals are facing more work, projects, and risks than ever before, while having less time, money, and a shrinking tolerance of downtime. External threats such as malware and natural disasters present significant risk to organizations without the proper BCDR strategies, but they are far from the only causes of data loss. Data continues to grow at an exponential rate and not only on-premises. As organizations are rapidly adopting cloud-based solutions in the form of IaaS, SaaS, and PaaS, they must also consider data protection strategies to address native gaps within these platforms. Join Adam Marget, Technical Solutions Specialist, Unitrends, as we explore the evolving landscape of data protection, cloud’s growing role, BC/DR strategies to safeguard all workloads, and best practices in planning your DR approach.

How to Control the Uncontrollable: Real Strategies for Securing Remote Access

  Moderated by INTERFACE Advisory Council

Join our panel of experts as they discuss what is working and what is working today and on the horizon for security and remote working.

Moderator:

  • Frank Grimmelman • President and CEO, ACTRA

Panelists:

  • Dan Shuler • Director of IT Security, Phoenix Children’s Hospital
  • Mike Manrod • CISO, Grand Canyon University/Grand Canyon Education
  • Anthony Dezilva • CISO, Clever Dome

How Do You Lead in the Smart/Safe/Connected City Revolution

  Presented by Steve Surfaro • Chairman, Public Safety Working Group, Security Industry Association

There are millions of devices already deployed in cities, and billions more coming, that can make a city “smarter” by collecting data on traffic, weather, energy, and water usage. Learn how to form a Smart/Safe/Connected City Strike Force, have a positive impact on your business and contain public safety threats.

  • 5G will provide us with unprecedented insights and abilities that will change what we do and how we do it in safe, smart and connected cities.
  • Learn how AI analytics fuel firearms detection, face matching, traffic automation, congestion reduction, and citizen experience.
  • Technologies like LiDAR are reducing outdoor facility security costs by at least 30%

We’ll review the International City/County Management Association survey on top priorities and learn how a smart city gets funded.

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Mitigating Cybercrime Through Automated Response and Integration

  Presented by Fortinet

Come join our talk on mitigating cybercrime and learn about best practices to help your company maintain a strong security posture through the digital transformation and beyond. The bad guys are using automated tactics to try to find a foothold in your network. Isn’t it time to leverage an integrated security approach to automate your response?