Presented by Check Point Software Technologies
Our speaker will cover current threats and trends in IT security, identify vectors and provide a layered defense to protect as you move your data beyond the perimeter.
Presented by Check Point Software Technologies
Our speaker will cover current threats and trends in IT security, identify vectors and provide a layered defense to protect as you move your data beyond the perimeter.
Presented by Check Point Software Technologies
Securing owned and BYOD assets has become a challenge for IT professionals. We will discuss how to create a proper layered and protected Mobile Device security strategy.
Presented by Check Point Software Technologies
As companies migrate to Cloud services, security often becomes an afterthought. Stop by and learn how Check Point can help keep you from getting burnt.
Presented by LogRhythm
In a perfect world, your organization would staff a 24×7 Security Operation Center, and have no trouble finding the budget or talent to do so. But the truth is, most organizations can’t afford a 24×7 SOC. The cost of having well-trained analysts onsite at all times outweighs the benefits.
If your organization is making do with an informal Security Operation Center, you may be facing delays in responding to incidents. You may even fear that incidents are going unnoticed. It’s a dangerous situation.
Organizations need to think of security operations as a critical business process. Effective security operations are the first line of defense when it comes to preventing cyberattacks. To accomplish this, organizations need mature programs that leverage people, processes, and technology to rapidly detect and respond to sophisticated attacks.
The purpose of this presentation is to provide you guidance and a framework that you can apply to building, assessing, and maintaining your security operations center to ensure its success throughout the business lifecycle.
Presented by Symantec
Today’s modern operating systems, like iOS and Android, are designed for ubiquitous and wireless access from anywhere in the world and have very different use cases and security requirements compared with traditional PCs and servers. Mobile devices are on and connected 24/7, and often owned and managed by individuals, dramatically increasing the attack surface relative to PCs. Malicious hackers have shifted much of their attention to these new operating systems that may provide a direct link into large companies with valuable assets worth stealing. Today, their methods are less focused on broad and annoying attacks on consumers and more on targeted attacks on specific individuals in specific organizations who have the right access levels to high-value assets. Well-researched social engineering exploits, combined with system vulnerabilities, make these attacks highly effective, even against smart and educated individuals. Solutions exist that protect companies from mobile cyber-attacks by securing mobile devices, whether owned by the company or the individual, from the entire landscape of mobile threats-including malware, network-based threats, vulnerability exploits and other targeted attacks, without changing the mobile user experience, compromising user privacy or adding extra burden to IT. Today we will discuss the Mobile Threat Landscape, show an example of what a Mobile Threat looks like, and discuss best practices to protect your Mobile Data.
Presented by RSA, the Security Division of Dell EMC
Cyber-attack risks are more prominent and widespread in today’s digital environment. Organizations struggle to respond to the evolving threat landscape—a challenge compounded by visibility and process gaps created by functional silos. This results in uncoordinated responses to cyber incidents that magnify financial, operational, reputational and compliance risks for businesses. This session will cover recommended steps to gain visibility and mitigate ongoing risk.
Presented by World Wide Technology
As IT operational models evolve, it is becoming increasingly important to align with lines of business on speed to deployment, simplifying management, and creating visibility on metrics.
In this talk we will explore how IT Operations and lines of business are converging efforts and creating brand value by enabling next gen technology through automation, digital strategy, and analytics tools at scale.
Presented by CTG
All organizations have assets — the valuable resources needed to function as an effective business. And Although it might not appear on your balance sheet, data is one of the most valuable assets an organization owns and, like all assets, must be identified, created and maintained.
“Information assets” should take advantage of clearly defined goals, roles and responsibilities, business processes and ownership. In this presentation, we will outline the three concrete steps your organization can follow to realize the tangible benefits of this highly valuable corporate asset and discuss how to derive value from your data at multiple points in the journey to becoming a data-centric organization.
Presented by Zerto
In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!
In this presentation we will address the challenges, needs, strategies, and solutions.
Presented by Unitrends
We are living in a “Less is More” world. IT Professionals are facing more work, projects, and risks than ever before, while having less time and money, and a rapidly decreasing tolerance of downtime. While external threats such as malware and natural disasters are prevalent and may cause significant downtime and data loss without the proper BCDR strategies, organizations must also be prepared to safeguard from within. Data continues to grow at an exponential rate, and not only on-premises. As cloud-delivered solutions such as IaaS and SaaS are rapidly adopted by an increasing number of organizations, these organizations must also consider their data protection strategies to address native gaps within these platforms. Join Adam Marget, Technical Demand Generation Specialist, Unitrends, as we’ll explore the evolving landscape of data protection, cloud’s growing role, BC/DR strategies to safeguard local and cloud-based workloads, and best practices in planning your DR approach.