The Case for Automation: Why Every Business Needs It

  Presented by Aruba Networks

As networks evolved from delivering basic connectivity (wired and wireless) to more sophisticated needs, enterprise security has moved from a strong, wall methodology to untrusted connections for every user. Join us to learn how network automation can reduce the burden on IT staff to keep up with the latest networking requirements while safely connecting workers, customers, and citizens to critical services.

Disasters Happen. Cloud Will Help You Recover.

  Presented by iland

Malicious ransomware attacks. Unplanned outages. Devastating natural disasters. It’s obvious why Disaster Recovery (DR) is no longer a luxury for your organization. It’s a necessity! It could also be the one thing keeping your business up and running no matter what. What do you need to become truly IT resilient? In this presentation, you will:

  • Learn how organizations are successfully using cloud-based DR
  • Hear why cloud changes the cost model to make DR finally reachable
  • See how the iland Secure Cloud Console can automate, orchestrate, and test with successful, repeatable results
  • Understand why full visibility, management, reporting, and documentation make the transition to cloud resources seamless
    • Join Gartner DR Magic Quadrant Leader iland and Veeam, with trusted IT guidance from Structured, to learn how we can help you create the right disaster recovery solution.

The Importance of a Risk-Aware Culture

  Presented by Code42

As companies double down on time to innovation, time to market, time to revenue, they are inherently introducing more risk from the inside. The more cloud-based, collaborative, and fast an organization becomes, the greater the Insider Risks posed to its people, technology, and data. The upside is that cloud collaboration tools make employees more productive. The downside is that these same tools make it easier to exfiltrate data. Add the complexities of working from home and off the corporate network; more employees are routinely using unauthorized devices, tools, and cloud-based applications to share files and ideas with colleagues.

Join us to discuss the growing insider risk problem and how the right data protection methods can set security teams up for success, without slowing down company productivity.

CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

Meaningful Insights from Unstructured Data & Why One Financial Model Doesn’t Work

  Presented by Hitachi Vantara and Converge Technology Solutions

Join us for this double presentation on Unstructured Data and why one financial model does not work.

Unstructured Data has become the future of business operations. Learn how to leverage your data and generate meaningful insights that will help you grow and expand.

We are complex organizations; therefore, one financial model does not work. Businesses of all sizes are only becoming more complex and diversified. Examine this current situation and why it is important to leverage multiple financial models to achieve success.

First Line of Defense in Assessing your Organizations Cybersecurity Risks

  Presented by Fortinet

Assessing the resilience of your network can dramatically improve your ability to fend off prospective breaches. New applications and services introduce new avenues of attack. Without knowing the potential weaknesses within your network, you cannot successfully defend it.

Join us to hear about:

  • how assessments give you the visibility you need to make more informed, data-driven decisions
  • how you can prioritize strategic initiatives and obtain budgeting more easily by running assessments
  • how certain verticals (education, healthcare, et al.) can benefit from understanding their specific threat landscapes and common industry-wide threats.

During this session we will also cover:

  • a firsthand demonstration on how data is collected and processed, and logs are analyzed from your network during an assessment
  • contents of a sample findings report and how recommendations can help prioritize your security strategy

Assessment offering:
Schedule an assessment, and you will receive a complimentary Fortinet branded Basecamp Rapids Wireless Speaker. Once the assessment has been completed, will receive a pair of FortiVans (limit 50). Note that SLED customers may not be eligible for giveaway items.

Not all AI is Created Equal: Understand the Differences of AI/ML/DL

  Presented by Deep Instinct

Machine learning is a big step forward in combatting cyberattacks but is still no silver bullet. Many traditional cybersecurity solutions available today are causing huge operational challenges as they are not adequately fighting against today’s complex and sophisticated threats. Detection and response-based solutions are no longer sufficient as damage can already be done while waiting for the execution of an attack. Executives and security leaders need to start adopting a preventative approach to cybersecurity, which is made possible through Deep Learning.

Fortunately, AI technologies are advancing, and deep learning is proven to be the most effective cybersecurity solution, resulting in unmatched prevention rates with proven lowest false positive rates. As you evaluate new technologies for your organization, understand the differences and benefits of AI/ML/DL.

Hacking Exposed: A Look Inside Hafnium

  Presented by BlackBerry

In this session, we will discuss the latest updates in the Hafnium/ProxyLogon exploits that target on-premises Microsoft Exchange servers. We will also help you understand the threat and potential impact on your organization. In true Hacking Exposed style, we will give a first-hand look at how the exploit works with Brian Robison, Sr. Director Product Marketing & Chief Evangelist, as he walks through and shows what can be done by attackers to a vulnerable server.