Master the Edge: How to Achieve Context-Aware, Secure Access in a Mobile Era

  Presented by Aruba & Structured

In this session you will discover how to deploy an open, multi-vendor Enterprise security framework that gives security and IT teams an integrated way to gain visibility, control and advanced threat defense. Learn about security prioritization and machine learning that enable organizations to leverage their existing third-party solutions to better protect their investments and implement proactive risk controls.

Best Practices for Securing and Monitoring Microservices and Linux

  Presented by Sysdig

Containers and microservices are designed to provide a reliable and low-cost way for teams to build and ship distributed applications. However, they also add extra layers of abstraction and orchestration to your environment that hinder your ability to do performance monitoring and security enforcement. Many challenges companies face in this world are similar to that of the traditional Linux world; however, the microservices layer adds additional complexity.

We’ll discuss how to overcome this challenge and specifically discuss:

  • Benefits and drawbacks of different approaches to data collection in containers
  • How using metadata from orchestrators like Kubernetes helps optimize and secure your containers
  • Best practices for alerting and compliance in a distributed ephemeral infrastructure
  • How troubleshooting and forensics has changed in containerized environments

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Architecting the New SD-WAN Edge for the Cloud-first Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

Extreme IT Security: Where IoT and Security Collide

  Presented by Xiologix

The use of IoT devices is proliferating in every industry, and with this growth comes risk—reports of IoT attacks increased 600 percent from 2016 to 2017. You must take a zero-trust approach to network security. You must develop a strategy that only allows “good behavior” rather than just defending against bad behavior and yesterday’s threats. It is critical that your network security and zero-trust strategies encompass your IoT devices as well. Learn about the technology and practices that will help you sleep at night.

No Network Needed?!?!

  Presented by Zscaler

It seems every day, we are bombarded with news of yet another breach and our personal information being traded and sold on the dark web/Internet. We lose sleep wondering if we have the right controls and policies in place to prevent our companies and our names from appearing in the next morning’s headlines. Is it time for a different approach? What if we could get rid of our network so we no longer had to define complex boundaries and policies? Is it really possible to architect a system that removes all the traditional ingress and egress points? If we resign ourselves to the fact that it’s not IF but WHEN our network gets breached…then why do we still have a network?

The Data Hub: Aligning Data and Storage

  Presented by Pure Storage

The nature of compute itself is changing as analytics becomes a core capability in the enterprise data center. Technology providers must evolve the products they offer to meet the needs of this new world of data, and this is especially true in the world of storage. Data has become plentiful due to the promise of analytics coupled with new data sources such as edge computing. Enterprises struggle with finding a consistent view of their data to the various processing workflows that need that data. Traditional systems are not designed to deliver multiple streams of the same data with the varying levels of performance required by each of the workflows being deployed by successful and growing enterprises.

New storage and data architectures are needed to address the evolving needs of enterprise compute. We call this architecture a data hub. The data hub must deliver on a number of promises in order to fulfill the vision of a data driven enterprise. It must produce high throughput file and object storage and provide application-specific performance characteristics (e.g., latency, throughput, and input/output operations per second), while offering those application-specific capabilities to multiple clients simultaneously.

Transform Networking & Security

  Presented by GCSIT Solutions

In order to keep up with the increasingly dynamic, distributed nature of modern applications, security needs to be an intrinsic component of the infrastructure that applications and data live on, rather than a bolted-on afterthought.

We eplore how:

  • You can enable micro-segmentation on the network with VMware NSX to prevent the lateral spread of threats.
  • And how VMware vSphere and vSAN deliver at-rest data encryption.

Elevate Your Fruit: A Layered Security Approach

  Presented by Mark Merchant • CISO, Municipality of Anchorage

As we are all well-aware, the CIS top 20 Critical Security Controls are a highly effective set of best practices developed by leading security experts from around the globe. If you are serious about protecting the confidentiality and integrity of your systems and information, effective implementation of these controls can certainly aid in “elevating your fruit to higher branches” and help keep it safe against the rapidly growing threat that exists today. In this presentation, I will touch on key concepts from the CIS Controls and identify some real technical examples of things that you can do in your organization without having to spend hundreds of thousands of dollars to achieve.

The Value of a Reliable CMDB & Practical Steps to Get There

  Presented by ServiceNow

Why have a CMDB? What is needed to build one? How do I maintain one? Why do CMDB projects sometimes fail or end up incomplete? What are the major best practices? What pitfalls should I avoid? The concept of CMDBs has been around for over a decade now. Some CMDB projects are successful. Some fail, are abandoned, or never really get there. This presentation first revisits the value of spending the effort to establish a functional and reliable CMDB. We then discuss a road map, practical best practices, pitfalls and do’s and don’ts in order to successfully establish a reliable and maintainable CMDB.