Building the SNOC: How to Integrate SecOps and NetOps

  Presented by ExtraHop

As the IT environment becomes more complex and distributed, it is more important than ever that Security Operations and Network Operations teams work together. This presentation explains the opportunities for optimizing budgets, cross-training staff, accelerating threat response, and improving end-user experience that come with integrated security and network operations. Attendees will also learn practical steps they can take toward building an integrated Security and Network Operations Center (SNOC).

The Current Malware Threat Landscape & Best Practices for Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Architecting the New SD-WAN Edge for the Cloud-first Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

Active Directory Security: Early Stage Attack Activities to Watch For

  Presented by STEALTHbits Technologies

Attackers have demonstrated a consistent and ongoing ability to obtain access to workstations inside the network boundary through phishing and other web and email attacks. From here, attackers set their sights on gaining control of Active Directory as a means to an end; compromising Active Directory is an easy way to gain access to all critical corporate data and resources. Darin will discuss two early stage attack activities: LDAP reconnaissance and Password Spraying — that allow attackers to move laterally inside your AD environment. Detection strategies and mitigation steps will also be explained.

Micro-Segmentation 101

  Presented by Illumio

Companies of all sizes are struggling to ensure their networks are secure using aging firewall security systems. Micro-segmentation, when implemented correctly, can offer the additional security they need and provide tremendous application visibility in the process.

You’ll learn…

  • Why you need micro-segmentation
  • How micro-segmentation works
  • The 5 steps to implementing a micro-segmentation strategy for your data center and cloud

Welcome to the New Age of Converged Secondary and Primary Storage

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won’t be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

IT Modernization

  Moderated by INTERFACE Advisory Council

IT Modernization means different things to different organizations and their IT departments. Generally it is the process of upgrading the technical infrastructure, be it the hardware for the network, the servers or desktops, and increasingly the mobile devices in play. It is also the process of upgrading the business applications by upgrading and/or replacing the vendor supported application, or the AppDev stack for in house systems.

IT Modernization is often challenged by the business priorities, and the need to deliver new functionality to remain competitive or increase efficiency and customer service. Deferring and avoiding the updating and modernization in IT leads down the dark path of technical debt and bankruptcy.

Join a panel of senior IT managers to discuss how their IT organizations have led IT modernization efforts, and share pointers and best practices in this area.

Moderator:

  • Richard Appleyard • Deputy CIO for Oregon Secretary of State

Panelists:

  • Caesar Bernardo • IT Program Manager / Consultant
  • Stephen Fitton • Technical Solutions Manager at Salem Health

Predict Future Attacks with AI

  Presented by Cylance & Structured Communication Systems

Get a first-hand look at how cybercrime is conducted today, how to combat the most damaging attack strategies, and how to even prevent threats that have not been seen before. Take a journey with us as we explore the enemy, revealing tactics and tricks, so you don’t become the next cybercrime victim. Join us in the good fight against an ever-changing threat vector with the best weapons, knowledge, and powerful AI-based technology. /p>

Rearchitecting Security for Branch and Mobile Users

  Presented by Palo Alto Networks

Traditional back haul hub & spoke networking, such as MPLS and remote access VPN, is not suitable for today’s mix of cloud and internet applications. Join our session to learn what is needed for consistent security that provides the coverage for growing organization.

Modernize Your Business with Cloud-Ready Infrastructure

  Presented by Xiologix

Today’s IT infrastructure must manage our modern hyper-connected, and hyper-distributed digital realities. In this presentation, we will discuss the important relationship between on-premises hardware and cloud services, reality vs expectations when executing a new cloud strategy, and how to minimize cost while running in the cloud.