[1 CPE] Shifting Your Workforce Strategy to Support Your Growing Organization

  Presented by IP Pathways

The technology landscape continues to evolve. Finding cloud talent to architect & build a custom solution continues to be challenging and even harder to retain. Lead times for hardware continue to increase making it hard to support growing businesses. During this session, we will outline the trends being used to supplement your workforce strategy.

[1 CPE] Open-Source Developers Are Security’s New Front Line

  Presented by Sonatype

Bad actors have recognized the power of open source and are now beginning to create their own attack opportunities. This new form of assault, where OSS project credentials are compromised and malicious code is intentionally injected into open-source libraries, allows hackers to poison the well. In this session, Sonatype will explain how both security and developers must work together to stop this trend or risk losing the entire open-source ecosystem.

[1 CPE] Scaling Network Infrastructure: From the Remote Employee to The Corporate Office

  Presented by Pine Cove Consulting

In the world we live in, employees are now working from home. However, that does not mean they do not need adequate network infrastructure, so their workday runs smoothly. During this presentation, we will talk about how to implement network devices like servers, on a very small scale like a home office, and how networking technology changes when scaling up to fit a larger space and more employees, like the corporate office.

[1 CPE] Navigating Today’s Threat Landscape: A Current State of Cybersecurity

  Presented by Fortinet

Join Fortinet for comprehensive look at the current state of cybersecurity. Today’s ever-evolving threat landscape requires an integrated, automated approach to security. Learn how you can mitigate risk in your organization, optimize your security team’s operations, and gain best practices to integrate and consolidate your security tools; whether you’ve taken a multi-vendor or single-vendor approach.

After leaving our session, you will understand:

  • More about the current state of cybersecurity and how it relates to your business
  • How to scale company growth while securing against constantly evolving threat vectors
  • How your security tools should ideally be integrating with each other and automating security functions
  • Best practices to optimize security
  • How to consolidate security controls to improve your security posture

[1 CPE] Secure Device Onboarding with Cloudpath

  Presented by Pine Cove & Ruckus

Cloudpath provisions digital certificates to your users’ devices, providing the highest level of wireless security. You gain visibility and control over which devices are on the network and can define and manage policies so every user sees only the network resources they should see. Company-issued devices can be automatically connected to the network, and Cloudpath also provides an intuitive self-service portal for BYOD. It associates every device with a user, and you can easily revoke access at any time—for example, when a BYOD user leaves the organization. The service supports any Wi-Fi enabled device, including headless and IoT devices. Cloudpath supports all major wireless vendors, and white glove service is available for a turn-key solution.

[1 CPE] Securing Layer 8

  Presented by Synack

One of the most difficult challenges globally is securing the human element and as such, it tends to be neglected. The current solution of training with “gotcha” emails is not successful and tends to cause unintended negative consequences. We will investigate a more global approach to securing businesses by taking on the “business of hacking.” We’ll show how we can harden the human element and expand our footprint by using a better way to learn and widening our defenses. The key is to ensure we also harden society to help drive the ROI for attackers up enough that business is no longer profitable, forcing them into the technology fight in which, as an industry, security professionals have much more secure footing.

[1 CPE] Aruba User Experience Insight (UXI)

  Presented by Structured & Aruba Networks

Aruba User Experience Insight (UXI) is a cloud-based application performance monitoring solution that validates network health and troubleshoots problems that affect day-to-day user experience. Ideal for campus and branch environments alike, UXI assumes the role of an end-user, evaluating the performance, connectivity, and responsiveness of network infrastructure and applications.

[1 CPE] SOC Transformation

  Presented by Structured & Palo Alto Networks

Ransomware is on the rise and cyberattacks are getting more sophisticated. Despite investments in infrastructure security tools, cybercriminals are still getting through to the data. And when they take the data down, they take down the entire organization—and hold it for ransom or exfiltration. As the importance of data grows, we need to trust our data is safe and resilient, no matter where it resides. It’s time for a new approach.

[1 CPE] How AI Can Think Like an Attacker

  Presented by Darktrace

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen and to recover if compromised. In this session, we’ll unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.