SD-WAN Edge Transformation for the Cloud-First Enterprise

  Presented by Silver Peak

As cloud adoption and SD-WAN innovation hastens, global enterprises are transforming how they build and secure wide area networks. Leveraging automation, enterprises can deploy, connect and secure hundreds of sites per week, a feat not possible with a traditional device-centric approach.

During this session, we’ll discuss how the unification of SD-WAN, WAN optimization, routing and security in a single, centrally orchestrated platform:

  • Delivers superior application performance wherever apps are hosted
  • Increases the quality of experience for end users and for IT
  • Simplifies branch WAN edge architecture

The CCPA is Here: What’s Changed and What You Need to Know

  Presented by OneTrust

While the California Consumer Privacy Act (CCPA) is now law, many key amendments and details about the law only passed just before the law’s effective date – meaning privacy and security pros are still working to build CCPA-compliant programs. In this session, we’ll share all the latest news on the CCPA law, including which amendments passed and how that impacts your privacy program. We’ll share a 5-step plan for CCPA compliance and what to expect in the future for the CCPA.

I’m From the Feds: We’re Here to Help!

  Presented by Theresa Masse • Cybersecurity Advisor, US Department of Homeland Security

You know at some point you will experience a cyber incident, if you haven’t already! The extent of the impact may not always be immediately obvious, however being adequately prepared makes the difference between chaos and responding effectively. This presentation provides an overview of federal cyber security services to assist private and public sector entities in improving their cyber monitoring, controls, incident response, awareness, and overall security posture. There are a number of assessments that will help organizations better understand their risks and inform decisions on prioritizing resources and funding. Whether large or small, all organizations are potential targets, and all employees have an important role in information security. Bad actors, whether criminals or nation states, are using more sophisticated techniques and tactics to infiltrate systems. Organizations must be prepared to react quickly and effectively, no entity is an island or immune from a cyber-attack. The federal government is committed to helping through sharing intel in a timely manner and offering relevant programs that can make a significant difference. Cyber resources and assistance can be expensive, however, there are a variety of federal cyber services available and all are free of charge. Take advantage of them!

Ms. Masse is a Cyber Security Advisor in Region X (Alaska, Idaho, Oregon, Washington) for the US Dept. of Homeland Security. Prior to that, she served as the Chief Information Security Officer (CISO) for the Port of Portland for 5+ years. Theresa was the first CISO for the State of Oregon and served in that capacity for 10 years. Previous to that, she worked in the private sector as the Senior Director for Information & Corporate Security at Cummins Inc., an international Fortune 500 company.

Ms. Masse has a Top-Secret security clearance. She is a former member of the executive committee for the State, Local, Tribal and Territorial Government Coordinating Council and was chair of the Cyber Security subcommittee. Theresa also served on the Cyber Security Advisory Board at Mount Hood Community College. She is a past member of the executive committee of the Multi-State-Information Sharing and Analysis Center (MS-ISAC) and currently serves as a co-chair of the mentoring program. Theresa has a Masters degree with a major in Management.

Simplifying Container Orchestration

  Presented by IVOXY Consulting & NetApp

Public clouds set a high bar for IT expectations of agility, scale, and services. Regardless of location and infrastructure, teams’ consumption experience with public cloud providers is driving their decisions and spending on IT today. Along with the ability to consume services across a choice of public and private clouds, teams must consolidate enterprise workloads without performance impact, deploying from a private cloud platform with service catalogs. Public clouds automate management and lifecycle, and they simplify how users consume IT.

Attend this presentation to learn how to simplify container orchestration and automation across the hybrid multi-cloud.

Data Protection and Management

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won’t be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and data storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

Find Your Balance in the Cloud

  Presented by Quest Software

Feel like you’re performing a high-wire balancing act in your role as IT Manager or Infrastructure Admin? Performance monitoring and capacity planning can be a real challenge regardless of your infrastructure design. You’ve got to decide what compute and storage resources are needed and predict when they’ll be needed. You’ve also got to balance the competing priorities of staying within budget and providing acceptable service levels to users. But these days you’re no longer simply managing an on-premises data center, you’ve also got to figure out which workloads to move to the cloud, how best to get them there and how to manage them in the cloud for the long term.

With all this increased complexity, comes the need for more robust performance monitoring tools to help you manage your hybrid environment and give you the means to resolve issues quickly. Finding the right solution can even help simplify the planning and execution of your cloud migration. Come join Quest to learn more.

Cyber Resilience: Data Protection Strategy in the Age of Ransomware

  Presented by Zerto

Ransomware threats increased by 300% last year, and the industry is expecting it to get worse. Ransomware victims’ greatest pains are downtime and data loss. Current DR and Backup solutions aren’t equipped to help you manage it at the speed of business. Join us for this discussion on how to transform your data protection approach to ensure you can protect your data and resume operations almost instantly when facing a ransomware attack. See you there!

Transforming Traditional Infrastructure with Private IaaS and Private Cloud

  Presented by Insight

During this session you’ll learn how to provide enable scale and burstable infrastructure, use OPEX-based utility models to transform traditional infrastructure, and build the foundation for next generation IT services. We’ll also discuss how to facilitate demand and attributes of the cloud within private infrastructure.

Transforming Traditional Infrastructure with Private IaaS and Private Cloud

  Presented by Insight

During this session you’ll learn how to provide enable scale and burstable infrastructure, use OPEX-based utility models to transform traditional infrastructure, and build the foundation for next generation IT services. We’ll also discuss how to facilitate demand and attributes of the cloud within private infrastructure.