Welcoming Our New Artificial Intelligence Overlords: AI Meets IT

  Presented by Nuvodia

We all knew this day would come. It’s time to start handing over some decision-making to the machines. We should have known once we started feeding them data that they would eventually insist on digesting it too! Let’s talk about how we got here, where the use of Artificial Intelligence and Machine Learning in IT and security is today, and how long we think it’s going to be before the machines inevitably turn on us. Or maybe we’ll be fine? We’ll explore a number of AI-infused products that are on the market now, how effective they are, and why if your IT footprint doesn’t include AI today–well, it might be time to start thinking about an upgrade.

Prepare for a Secure Automated Multi-cloud World with an Onsite Data Center

  Presented by Juniper Networks & Kudelski Security

In order to have the best success building a data center network that is ready for multi-cloud, it must have three critical components; Automation, Security, and Open Standards. Transformation to a multi-cloud environment is a complex task, as security is critical. This talk will discuss the key areas you need to be aware of when creating your strategies around data center buildouts, upgrades, and migrations in a multi-cloud world.

The Modern Datacenter

  Presented by Trend Micro

The Datacenter is the heart of the organization. So why would you treat it any different than the Data that is crucial to the survival of your organization’s reputation? Security requirements do not go away when you move part of your data center workloads to the cloud. Although most security controls can be easily applied to systems in the cloud, the weight of those controls and what constitutes an immediate concern versus a lower priority alert, can be different. We will discuss the need for advanced visibility to differentiate your cloud systems versus your internal data center with central visibility. With the dynamic nature of the cloud, and the flexibility of the modern data center, it is important to apply the same security controls but view the alerts differently depending on their origin.

Hyperconverged Infrastructure: Do More with Less

  Presented by Scale Computing

Learn how organizations are doing more IT with less infrastructure and less complexity using hyperconverged infrastructure (HCI). The hyperconverged experts will discuss why virtualization doesn’t need to be complex, inefficient, or costly when you adopt a modern, innovative architecture. The simplicity, scalability, and high availability of a turn-key infrastructure doesn’t just lower costs, it frees up your own IT experts to work on new projects they haven’t had time for in the past.

Addressing Infrastructure Security Across Hybrid Environments

  Presented by Trend Micro

Security requirements do not go away when you move part of your data center workloads to the cloud. Although most security controls can be easily applied to systems in the cloud, the weight of those controls and what constitutes an immediate concern versus a lower priority alert, can be different. We will discuss the need for advanced visibility to differentiate your cloud systems versus your internal data center with central visibility. With the dynamic nature of the cloud, and the flexibility of the modern data center, it is important to apply the same security controls but view the alerts differently depending on their origin.

Addressing Infrastructure Security Across Hybrid Environments

  Presented by Trend Micro

Security requirements do not go away when you move part of your data center workloads to the cloud. Although most security controls can be easily applied to systems in the cloud, the weight of those controls and what constitutes an immediate concern versus a lower priority alert, can be different. We will discuss the need for advanced visibility to differentiate your cloud systems versus your internal data center with central visibility. With the dynamic nature of the cloud, and the flexibility of the modern data center, it is important to apply the same security controls but view the alerts differently depending on their origin.

Digital Extortion & Trend Micro Security Predictions for 2019

  Presented by Trend Micro

Digital extortion has increasingly become cybercriminals’ first and foremost money-making modus operandi. It’s mostly due to ransomware —cybercriminals’ currently most popular weapon of choice, helping them in extorting cash from users all over the world and in hitting big businesses and organizations. This session provides insight from Trend Micro Research’s 2019 Security Predictions on the current threat landscape.

The Value of a Reliable CMDB & Practical Steps to Get There

  Presented by ServiceNow

Why have a CMDB? What is needed to build one? How do I maintain one? Why do CMDB projects sometimes fail or end up incomplete? What are the major best practices? What pitfalls should I avoid? The concept of CMDBs has been around for over a decade now. Some CMDB projects are successful. Some fail, are abandoned, or never really get there. This presentation first revisits the value of spending the effort to establish a functional and reliable CMDB. We then discuss a road map, practical best practices, pitfalls and do’s and don’ts in order to successfully establish a reliable and maintainable CMDB.

SD-WAN: Delivering a WOW Customer Experience for Every Application

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

Choosing the Right Cloud Environment: Public, Private, or Hybrid

  Presented by Atmosera

In pursuit of enhanced connectivity, scalability, and efficiency, cloud migration is hastening across all industry sectors. In order to unlock the cloud’s benefits, these environments—public, private, and hybrid–must be explicitly architected and engineered to suit the respective applications they will host, while also meeting security and compliance requirements. How do businesses determine their ideal cloud environment and optimize it post-migration?

In this presentation, we will review and compare:

  • The physical and virtual components of public, private, and hybrid cloud environments
  • The business considerations that differentiate each environment, including storage space, workloads, compliance, internal staff, and other business requirements
  • The relationship between organizations, cloud providers, and MSPs
  • The best practices organizations should consider keeping their cloud environment secure, compliant, and optimized post-migration