The Security Professional in the Workplace

  Presented by Walt Swanson • IT Systems Engineer, St. Louis County

Learn tips and insights from a 20 plus year Information Security professional who has held positions from entry-level technology to executive leadership. Learn what’s really important in a successful Information Security program and how to achieve it. We will look at the following: what to look for in Security tools; the pitfalls to avoid when asking for funds; when to say “no” and why; how to work with direct reports, peers, executives and the Board, plus what to look out for; Policies and how to manage them; Vendor Management and why it’s important; the need to identify Stakeholders correctly; Communications Plan should be a before thought, not an afterthought; and finally how to approach bringing change to your workplace, and getting it to happen.

Zero Trust with Micro-Segmentation: Doing It the Right Way

  Presented by Guardicore

In the modern, hyper-connected and threat-laden enterprise landscape, organizations face increasing pressure to protect their systems and data.

Originally conceived in 2010, the zero-trust security concept has recently gained new ground and is now seen as a vital element of enterprise information security. It is a model that aids user and device verification, strengthens authentication processes and ensures encryption.

However, zero trust is not without its challenges, and mastering the art of zero trust takes strategic management and forethought.

In this session, we will explore the concept of zero trust, assess why it is needed in the modern enterprise and outline how micro-segmentation can help win the zero trust race for organizations.

Key takeaways:

  • Why there is a need for zero trust
  • The challenges of implementing zero trust
  • The four high-level principles of zero trust
  • How micro-segmentation can help you prepare for, implement and manage zero trust in your organization

Data Protection for the Cloud Era

  Presented by Druva

More and more enterprises are now leveraging the cloud to increase their level of data protection and management for their applications. The ability to keep secondary, or backup data in cloud storage; eliminates traditional data centers, reduces operational complexity associated with legacy on-premise backup solutions, allows unlimited scalability, centralizes storage of all secondary data sources, provides unlimited compute, allows for additional insight and business value from that data. and finally, and finally, the ability to do automated Disaster Recovery (DR) without maintaining a DR facility.

Architecting the New SD-WAN Edge for the Cloud-First Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

High End Storage Innovation Without Compromise

  Presented by TechPower

Discover why businesses undergoing digital transformation need a new approach for high-end storage — one that frees IT resources to perform more innovative and strategic tasks. During this presentation, you will learn why organizations are looking for a more resilient, simpler, high-end storage experience for every mission-critical application and how they can address those challenges in their datacenter today.

Welcoming Our New Artificial Intelligence Overlords: AI Meets IT

  Presented by Nuvodia

We all knew this day would come. It’s time to start handing over some decision-making to the machines. We should have known once we started feeding them data that they would eventually insist on digesting it too! Let’s talk about how we got here, where the use of Artificial Intelligence and Machine Learning in IT and security is today, and how long we think it’s going to be before the machines inevitably turn on us. Or maybe we’ll be fine? We’ll explore a number of AI-infused products that are on the market now, how effective they are, and why if your IT footprint doesn’t include AI today–well, it might be time to start thinking about an upgrade.

A Behavioral Approach to Web Application Security

  Presented by CompuNet & F5 Networks

In an ideal world, security controls would be as loose as possible for well-behaved legitimate users and increasingly tightened around bad actors. Join us as we discuss a behavioral approach to identifying and thwarting attacks against your web applications from highly skilled threat actors.

Managing the Impact of Collaboration Technologies on Your Network

  Presented by Cerium Networks

Today’s collaboration technologies come with many exciting features and benefits–all of which impact the network in various ways. This session will help the audience understand those impacts and how to manage them. This session covers everything from inter-branch communications, survivability, collaboration beyond your walls, and ensuring your collaboration environment is secure.

Topics include:

  • Inter-Branch Communications
    • SD-WAN
  • QOS, Path Diversity, Low Latency
    • Network requirements based on whether on-prem, cloud, or hybrid
    • Cloud Transport Leg/Poke –3rd Party Connections
  • Survivability
    • WAN/LAN resiliency
    • Local Call Processing / Failover Call Processing
  • Collaboration Beyond your Walls
    • Remote Workers
    • BYOD
    • Video Conferencing
    • Teams-based collaboration tools that combine meetings, calls, and IM into one platform
  • Ensuring your Environment is Secure
  • SIP
  • Toll Fraud
  • TLS Encryption
  • Encrypting the media
  • Certificates
  • Trunk Protection TDM/SIP
  • BYOD Policy Enforcement/MDM