SD-WAN Edge Transformation for the Cloud-First Enterprise

  Presented by Silver Peak

As cloud adoption and SD-WAN innovation hastens, global enterprises are transforming how they build and secure wide area networks. Leveraging automation, enterprises can deploy, connect and secure hundreds of sites per week, a feat not possible with a traditional device-centric approach.

During this session, we’ll discuss how the unification of SD-WAN, WAN optimization, routing and security in a single, centrally orchestrated platform:

  • Delivers superior application performance wherever apps are hosted
  • Increases the quality of experience for end users and for IT
  • Simplifies branch WAN edge architecture

One Company’s Journey to a Modern Data Center Environment

  Presented by Structured

When the facilities team at a healthcare organization in the Pacific Northwest announced to the IT team that they were undertaking a campus remodel project and they needed the on-prem data center for office space, the IT team quickly sprang into action to find a new home for their DR environment. From learning of this management decision, to performing a due diligence assessment of their ability to use a DRaaS solution, into an RFI and RFP process, and coming to agreement on a contract, this was one of the most rigorous evaluation projects the company has undertaken. This presentation will describe that journey of evaluation and discovery, including the rest of the story which describes the onboarding process and challenges faced along the way. Craig Rhodes is an experienced professional actively engaged with various clients providing Data Center and Program Management consulting services.

Zero-Trust Network Access

  Presented by Fortinet

Controlling users and devices on today’s networks is challenging. Many types of users requiring different levels of access need an automated solution. Devices are sneaking onto networks without approval and require visibility and control. Learn how Zero-Trust Network Access solution addresses the issue of knowing who, what, where and when and controlling everyone and everything on and off the network.

IT Interrupted: Best Practices in Disaster Recovery Planning

  Presented by Zerto

As IT application availability requirements continue to evolve, technology continues change to meet the new requirements. Join us as we discuss planning considerations for bringing your virtualized workloads into the next generation of IT resilience. You will learn about data center options to consider as part of your recovery strategy, business and technical trade-offs that will have to be made, capacity planning considerations, and testing approaches to that are possible that will optimize application up-time.

Why Every Business Needs a Business Continuity & Disaster Recovery Strategy

  Presented by Veeam

Today’s applications and data sets are larger, more complex, distributed and interdependent than ever. While many have a disaster recovery plan in place, executing, testing and documenting these plans is often complex and cumbersome.

We’ll also discuss:

  • State of BCDR today and what hinders DR planning for most companies
  • Why backup strategy is not DR strategy
  • Democratized DR of today (how tedious, manual procedures can be completely automated, and at accessible cost)

It Ain’t Done ‘Til It’s Automated: Security at the Speed of DevOps

  Presented by Check Point

Companies are rapidly migrating applications and workloads to the cloud. For many this is a Software as a Service for a first option, with migration to public cloud second, and only if necessary will workloads be deployed inside of the legacy data center. This is further complicated by the desire to accelerate the development lifecycle allowing devops to drive the IT migration. InfoSec is playing catchup to the business and devops constant acceleration.

In this session, you will learn strategies and best practices for allowing SecOps to keep up with the Speed of DevOps, as well as fundamental security knowledge applicable for any workload migration to any cloud provider.

Your Complete Business Communications Solution in the Cloud

  Presented by Mitel & Structured

Are you ready to move communication and collaboration to the cloud with confidence? If so, attend this session to learn how. MiCloud Connect is a full-featured communications and collaboration solution that is easy to deploy and manage. Blend traditional phone system features such as call transferring, extension dialing and more with instant messaging, conferencing, video and screen sharing. This allows you and your team to save time, reduce travel and efficiently collaborate with others. Plus, with the ability to make changes in real time, you can change your call routing or presence on the fly.

You’ve Got Mail

  Presented by LGIT

Cyber threats in email are still a useful tool from malicious groups. In this session, we will discuss how to forensically analyze emails from head to foot and everything in between. You will learn how to spot suspicious email and confidently determine if it is malicious. Join the LGIT group for a practical discussion on dealing with threats.

Speakers:
Zach Tielking • Information Security Analyst, State of Montana
Trever Hass • Information Security Analyst, State of Montana

Cyber-Threats in Montana and Worldwide

  Presented by Pine Cove Consulting

In this presentation we will share our findings on the current outlook of cyber-attacks in Montana including the number of organizations that have suffered a data breach that has affected Montanans, the number of Montanans that have been affected by data breaches, and the average length of data breaches. We will also analyze the three-year trend for each of these statistics. Sophos Security will join us and give us a nation and worldwide state of affairs for cyber-threats and ransomware.

You can’t protect your organization if you aren’t educated on the threats. Join our presentation to get a better view of the current threat landscape to organizations in Montana, the United States, and worldwide. We will also share tips and best practices for securing your organization against these threats.

Office 365 Security Best Practices: At the Office, at Home, and on the Road

  Presented by Mimecast

Cyber-hygiene has become a source of great concern of late. And while the Office 365 suite has helped communication and collaboration from multiple location points (at the office, at home, and on the road) there are still security concerns that must be mitigated. In this presentation, we will hear best practice suggestions for remaining safe while using Office 365. First, we’ll talk about security attitudes, then review CISA concerns with Office 365, and finally offer best practice suggestions and thought leadership. This presentation will be driven by J. Peter Bruzzese… cyber-security advisor and 8x awarded Microsoft MVP (Exchange/Office 365).