Remote Working: How to Control the Uncontrollable 

  Moderated by INTERFACE Advisory Council

Join our panel of IT experts as they discuss what is working and what is on the horizon for Security and Remote Working.

Panalists:

  • Ryan Sinnwell • Senior IT Manager, Infrastructure, The Weitz Group
  • Robert Nitz • Director of Information Security, Multi-State Lottery Association
  • Mike Badeaux •VP, Information Security, American Equity Investment Life Insurance Company

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

SD-WAN: Delivering a WOW Customer Experience for Every Application

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

MFA in the Enterprise

  Presented by John Schroeder

Multifactor Authentication (MFA) is an old technology solution with new life in protecting users and organizations from credential theft. Major platforms including Microsoft 365 and Google now offer MFA through smartphone apps and cloud accessibility.

Successful implementation of MFA adds layers of security to reduce risk of credential attacks, password re-use, privileged accounts, third-party access, and remote work.

This presentation will focus on use cases for the technology and practical considerations of implementing an enterprise solution for all types of users.

SecOps: Importance of Config. Mgmt. for Reducing Business Risk in Hybrid IT

  Presented by Micro Focus

In today’s IT world, hybrid and multi-cloud environments are the new reality and becoming increasingly more complex. Most organizations manage different technologies with vendor-provided solutions, but the reality is that using disparate solutions for hybrid environments can lead to inefficiencies and even gaps in security. The more vendors involved, the complex this becomes.

Why Encryption Is More Important Than Ever in Deterring Cybercrime

  Presented by Micro Focus

With the advancement in capabilities such as Artificial Intelligence, predictive learning analytics and data warehousing, cyber criminals Tactics, Techniques, and Procedures (TTP) have reached levels of sophistication that enables them to gain an edge over traditional Information Security methods used to secure the enterprise. In this presentation, we will show how using Format Preserving Encryption can protect an organization’s data, with minimal impact to business and reduce the capabilities of cyber criminals to compromise sensitive data, including from previous hacks.

During this presentation, we will cover:

  • Historical notes of compromised data and why it affects you.
  • An overview of tools used by cyber criminals
  • Strategies that can be used to protect your environment
  • A Live Demo of Format Preserving Encryption

How to Build a SOC with Limited Resources

  Presented by LogRhythm

In a perfect world, your organization would staff a 24×7 Security Operation Center, and have no trouble finding the budget or talent to do so. But the truth is, most organizations can’t afford a 24×7 SOC. The cost of having well-trained analysts onsite at all times outweighs the benefits.

If your organization is making do with an informal Security Operation Center, you may be facing delays in responding to incidents. You may even fear that incidents are going unnoticed. It’s a dangerous situation.

Organizations need to think of security operations as a critical business process. Effective security operations are the first line of defense when it comes to preventing cyberattacks. To accomplish this, organizations need mature programs that leverage people, processes, and technology to rapidly detect and respond to sophisticated attacks.

The purpose of this presentation is to provide you guidance and a framework that you can apply to building, assessing, and maintaining your security operations center to ensure its success throughout the business lifecycle.