AI: Demystifying the Dark Arts to Combat Threats  

  Presented by Vanguard Infrastructures & HPE

To combat the latest threats, cyber security vendors have no choice but to use one of the most powerful tools to emerge in decades – Artificial Intelligence. But critics are right in their concerns over the interpretability of AI solutions. How do we learn to trust the magic black boxes when even the experts can’t explain the answers produced by AI? What is AI, and how is it different than data science and machine learning? What does it mean when a cyber-security solution is AI-enabled? What are the important things to know about the different AI implementations as they relate to cyber security products? How do I trust the output / results of AI? Join us as we provide an AI primer through the lens of cyber security and dissipate the cloudiness caused by buzzwords.

Moderator:

  • Troy Cooper • Vanguard Infrastructures CEO Co-Founder

Panel Experts:

  • Vijay Richard • Vanguard Infrastructures Exec VP Co-Founder
  • Chris Kauffman • Vanguard Infrastructures Chief AI Strategist
  • Ann Hinkle • Vanguard Infrastructures Chief of Security Services
  • Dan Roessner • Vanguard Infrastructures Facility Security Officer

Time to Get Re-Married: Privacy and Cybersecurity Are Still in Love!

  Presented by Mary N. Chaney, Esq. • CISSP, Attorney, The Cyber Security Law Firm of Texas

Cybersecurity and privacy have been divorced for some time now. With organizations splitting responsibilities, cyber/information security responsibilities lie with the technical teams and privacy generally residing with the legal teams. Unfortunately, this split has been disastrous, mostly for the general public. In this session we will discuss how forward-thinking companies are re-marrying their cybersecurity and privacy programs to create a more holistic plan for data security and privacy. Hopefully, to live happily ever after.

The Current Malware Threat Landscape & Enterprise Grade Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Prepare for a Secure Automated Multi-cloud World with an Onsite Data Center

  Presented by Juniper Networks & Kudelski Security

In order to have the best success building a data center network that is ready for multi-cloud, it must have three critical components; Automation, Security, and Open Standards. Transformation to a multi-cloud environment is a complex task, as security is critical. This talk will discuss the key areas you need to be aware of when creating your strategies around data center buildouts, upgrades, and migrations in a multi-cloud world.

Leveraging AI to Defend Against Insider Threats in Your Digital Landscape

  Presented by Vanguard Infrastructures & HPE

The single largest vulnerability to a company’s intellectual property (IP) is their employee or the trusted insider; the person with the keys to the kingdom. However, recent media and government disclosures have expanded this threat to include machine compromises installed during manufacturing. So, the threat could come from the trusted insider or the machine an unwitting employee is utilizing. Too few companies have a strategy to adequately combat these vulnerabilities, mainly due to a lack of knowledge the events are taking place. Vanguard Infrastructures presents a strategy that marries observed human behaviors, demeanors, actions, etc., with artificial intelligence and machine learning to assist companies by providing data and creating visibility into network events that might be a threat to the company. This presentation’s goal is to put more power into the hands of the company to protect their IP, identify potential problem behaviors of trusted employees and machines, and assist the company in ensuring their future.

Moderator:

  • Troy Cooper • Vanguard Infrastructures CEO Co-Founder

Panel Experts:

  • Vijay Richard • Vanguard Infrastructures Exec VP Co-Founder
  • Chris Kaufman • Vanguard Infrastructures Chief AI Strategist
  • Ann Hinkle • Vanguard Infrastructure Chief of Security Services
  • Scott Olsen • HPE Enterprise Architect

How to Solve the Toughest Challenges in Cloud Security

  Presented by Sophos & Pine Cove Consulting

In an ever-changing, auto-scaling environment, continuous visibility of your public cloud infrastructure is vital. Join Pine Cove Consulting and Sophos Security as we discuss how you can use the power of AI and automation to simplify compliance, governance and security monitoring in the cloud.

Visibility is the foundation on which all public cloud security policies and activities are built. We will discuss how to monitor multiple cloud provider environments including Amazon Web Services (AWS) accounts, Microsoft Azure subscriptions, Google Cloud Platform (GCP) projects, Kubernetes clusters, and development code repositories. With superior visibility, layered with compliance and DevSecOps policies controls and alerts, teams can take control and build on their cloud security strategy with confidence.

Join us to learn how building a complete picture of architecture, including a full inventory and real-time network topology visualization including hosts, networks, user accounts, storage services, containers, and serverless functions, can help you improve your cloud security challenges.

Welcome to the New Age of Converged Data Protection

  Presented by Storage Craft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won’t be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

Bridging the Gap in CISO/Board Communications

  Presented by Michael Lines • Principal-Heuristic Security

A discussion of the challenges that exist in achieving effective communications and partnership with the board & executive management by the CISO. All too often CISOs are accused (rightly) of not speaking the language of the board. Understanding the board’s priorities, and how to align the security program and communications about it to that, are key to effective board/CISO relationships.

The Top 5 Challenges for Desktop and App Virtualization

  Presented by Bitdefender

Businesses with large office or task-based workforces are increasingly moving to application and desktop virtualization. This is because virtualization technologies, both applications and virtual desktop infrastructure (VDI), offer IT organizations and their end users an array of choices in accessing applications and desktops. And, as organizations adopt digital workspaces, they naturally expect a higher-quality user experience. Unfortunately, virtualization brings both new and unique security challenges with it.

This presentation will cover the top challenges that enterprises face and will cover suggestions to identify a security solution that complements your virtualization initiatives and makes both the Infosec team and users happy.

Finally Eliminate Outlook PSTs with Office365

  Presented by PST Migrator

Once the solution to small Microsoft Exchange mailbox limits, Outlook PSTs have now become the epitome of technical debt. PSTs increase costs when stored on enterprise storage and backup systems. They are constant headaches to end users and support staff. In addition, they are legal and recovery risks. Thanks to Office365, and large mailbox limits, they are no longer needed. This session will help participants with a “how to guide” for finally eliminating PSTs. From building the business case to implementation, including common snares.