Transforming IT Ops and Network Experiences with AI

  Presented by Juniper Networks

Today’s networks and IT teams are challenged by the soaring numbers of mobile and IoT devices and apps. Learn how data science, AI, and a modern microservices cloud architecture can deliver the agility, scale, and reliability that businesses need to succeed. We are transforming user and IT experiences with an AI-Driven Enterprise through proactive automation and relevant insights while ultimately evolving towards a self-driving network.

In this session, you’ll learn why three of the Fortune 10 companies, along with thousands of other organizations, are AI-driven wired and wireless networking customers, to deliver new services, assure network performance, and streamline help-desk operations.

Testing Your Disaster Recovery/Business Continuity Plan – Are You Ready?

  Presented by INTERFACE Advisory Council

A panel of local senior IT Professionals will take questions from the audience to discuss their experiences with testing disaster recovery and business continuity plans. A wide range of topics will be discussed including specific lessons learned, specific tools used, and what methods need to be altered. Bring your questions so that you will be ready to take the plunge and test your plan!

How’s Your Cyber Hygiene?

  Presented by INTERFACE Advisory Council

Every company has become more dependent upon IT departments to run business operations. When it comes to a company’s Cyber profile, has enough thought been put into protecting the company? What is the process for managing social media accounts? Who has access and passwords? Do you have continuity of messaging and processes?

The hygiene of your Cyber profile has effects on many operations of business. Join us for an interactive conversation about the role IT needs to play in protecting intellectual property and more.

Identity Crisis: The Past, Present, and Future of Authentication

  Presented by Structured

This presentation reviews historical methods of verifying identity and integrity, as well as the current challenges we face around authentication and authorization. We will also examine lessons learned to see what the future might hold when it comes to Identity and Access Management (IAM).

An Appeal for Cybersecurity Consolidation

  Presented by Fortinet

Come participate in a discussion about the Cybersecurity counterculture of platform consolidation. Learn of the potential benefits like reduction of complexity, and greater visibility and control.

Building a Foundation for Defense in Depth: 10 Security Proficiencies

  Presented by Atmosera

Expectations for information security and data protection are increasing, and so is the complexity. The stakes are higher than ever before due to compliance requirements and potential consequences on a company’s reputation. This presentation is designed to demystify the process of developing a strong security framework by getting started with a Defense in Depth approach based on 10 basic proficiencies.

Join this session and gain key strategies to:

  • Evaluate your current information security profile
  • Implement a comprehensive Defense in Depth security framework with technology and people
  • Develop a roadmap to strengthen your organization’s security and compliance

Presenters:
Sean Ventura • CISO, Atmosera
Byron Anderson • InfoSec Engineer, Atmosera

The Human Element in Threat Detection: Endpoint Threats in 2020 and Beyond

  Presented by Malwarebytes

From ransomware to Mac threats, attacks are up this year. Join Malwarebytes Lab and your peers for an enlightening hour of discussion and interaction.

Pulling from our analysis of millions of attacks on endpoints each year, we’ll recap 2019 threats and outline emerging trends in 2020. Together we’ll cover:

  • Huge shifts from consumer attacks to organizations
  • Growth in mobile threats
  • Top attacks for PC, Mac, and Android
  • Global threats and detections
  • Top industries impacted
  • Rise in ransomware
  • 2020 cybersecurity prediction
  • Blending automation with human elements to keep endpoints operational

Asset Management in the World of IOT

  Presented by Quest Software

IOT is upon us all, like it or not. Gone are the days of just managing Windows Desktops and their respective software. Today we are responsible for managing the life-cycle of many types of devices. Anything from a Raspberry pi, to iPad, and anything in between must be managed and tracked during its life. With the exponential growth of network connected devices we are also seeing growth in the regulations surrounding those devices. Regulations means compliance audits which increases our need to manage and track out IT assets.

Innovation and Evolution: BC/DR for Today’s Multi-Cloud Environments

  Presented by Unitrends

We are living in a “Less is More” world. In a landscape that’s rapidly changing, IT professionals are managing more work, projects, and risk than ever before. While external threats such as malware and natural disasters cause significant downtime and data loss without proper BC/DR implementation, organizations must also be prepared to safeguard from within. Data continues to grow at an exponential rate, and not only on-premises. As cloud-delivered solutions such as IaaS and SaaS are rapidly adopted by an increasing number of organizations, and the workforce itself is becoming increasingly dispersed and mobile, organizations must consider data protection strategies to address gaps in BC/DR outside the traditional data center. Join Adam Marget, Technical Specialist from Unitrends, as we explore the evolving landscape of data protection, cloud’s growing role, BC/DR strategies to safeguard local, remote, and cloud-based workloads, and best practices in planning your DR approach.

Data Protection for the Cloud Era

  Presented by Druva

While more companies are now leveraging the cloud to increase their level of data protection and management, there are still many wondering “why?” The answer: the cloud actually brings substantial advancements to the data protection and management table that simply aren’t possible without it. The easiest advantage to envision? Unlimited scalability. If a data protection tool is properly designed, the capacity should automatically expand to meet any customer’s needs. The second advantage: the cloud is the simplest way to centralize the storage of all secondary data sources while also providing unlimited compute that can be used to gain additional insight and business value from that data. Finally, the ability to do automated Disaster Recovery (DR) without maintaining a DR facility is unquestionably a major value of the cloud, and simply isn’t possible otherwise.