Zero Trust with Micro-Segmentation: Doing It the Right Way

  Presented by Guardicore

In the modern, hyper-connected and threat-laden enterprise landscape, organizations face increasing pressure to protect their systems and data.

Originally conceived in 2010, the zero-trust security concept has recently gained new ground and is now seen as a vital element of enterprise information security. It is a model that aids user and device verification, strengthens authentication processes and ensures encryption.

However, zero trust is not without its challenges, and mastering the art of zero trust takes strategic management and forethought.

In this session, we will explore the concept of zero trust, assess why it is needed in the modern enterprise and outline how micro-segmentation can help win the zero trust race for organizations.

Key takeaways:

  • Why there is a need for zero trust
  • The challenges of implementing zero trust
  • The four high-level principles of zero trust
  • How micro-segmentation can help you prepare for, implement and manage zero trust in your organization

High End Storage Innovation Without Compromise

  Presented by TechPower

Discover why businesses undergoing digital transformation need a new approach for high-end storage — one that frees IT resources to perform more innovative and strategic tasks. During this presentation, you will learn why organizations are looking for a more resilient, simpler, high-end storage experience for every mission-critical application and how they can address those challenges in their datacenter today.

Welcoming Our New Artificial Intelligence Overlords: AI Meets IT

  Presented by Nuvodia

We all knew this day would come. It’s time to start handing over some decision-making to the machines. We should have known once we started feeding them data that they would eventually insist on digesting it too! Let’s talk about how we got here, where the use of Artificial Intelligence and Machine Learning in IT and security is today, and how long we think it’s going to be before the machines inevitably turn on us. Or maybe we’ll be fine? We’ll explore a number of AI-infused products that are on the market now, how effective they are, and why if your IT footprint doesn’t include AI today–well, it might be time to start thinking about an upgrade.

Prepare for a Secure Automated Multi-cloud World with an Onsite Data Center

  Presented by Juniper Networks & Kudelski Security

In order to have the best success building a data center network that is ready for multi-cloud, it must have three critical components; Automation, Security, and Open Standards. Transformation to a multi-cloud environment is a complex task, as security is critical. This talk will discuss the key areas you need to be aware of when creating your strategies around data center buildouts, upgrades, and migrations in a multi-cloud world.

The Modern Datacenter

  Presented by Trend Micro

The Datacenter is the heart of the organization. So why would you treat it any different than the Data that is crucial to the survival of your organization’s reputation? Security requirements do not go away when you move part of your data center workloads to the cloud. Although most security controls can be easily applied to systems in the cloud, the weight of those controls and what constitutes an immediate concern versus a lower priority alert, can be different. We will discuss the need for advanced visibility to differentiate your cloud systems versus your internal data center with central visibility. With the dynamic nature of the cloud, and the flexibility of the modern data center, it is important to apply the same security controls but view the alerts differently depending on their origin.

Hyperconverged Infrastructure: Do More with Less

  Presented by Scale Computing

Learn how organizations are doing more IT with less infrastructure and less complexity using hyperconverged infrastructure (HCI). The hyperconverged experts will discuss why virtualization doesn’t need to be complex, inefficient, or costly when you adopt a modern, innovative architecture. The simplicity, scalability, and high availability of a turn-key infrastructure doesn’t just lower costs, it frees up your own IT experts to work on new projects they haven’t had time for in the past.

Addressing Infrastructure Security Across Hybrid Environments

  Presented by Trend Micro

Security requirements do not go away when you move part of your data center workloads to the cloud. Although most security controls can be easily applied to systems in the cloud, the weight of those controls and what constitutes an immediate concern versus a lower priority alert, can be different. We will discuss the need for advanced visibility to differentiate your cloud systems versus your internal data center with central visibility. With the dynamic nature of the cloud, and the flexibility of the modern data center, it is important to apply the same security controls but view the alerts differently depending on their origin.

Addressing Infrastructure Security Across Hybrid Environments

  Presented by Trend Micro

Security requirements do not go away when you move part of your data center workloads to the cloud. Although most security controls can be easily applied to systems in the cloud, the weight of those controls and what constitutes an immediate concern versus a lower priority alert, can be different. We will discuss the need for advanced visibility to differentiate your cloud systems versus your internal data center with central visibility. With the dynamic nature of the cloud, and the flexibility of the modern data center, it is important to apply the same security controls but view the alerts differently depending on their origin.

Digital Extortion & Trend Micro Security Predictions for 2019

  Presented by Trend Micro

Digital extortion has increasingly become cybercriminals’ first and foremost money-making modus operandi. It’s mostly due to ransomware —cybercriminals’ currently most popular weapon of choice, helping them in extorting cash from users all over the world and in hitting big businesses and organizations. This session provides insight from Trend Micro Research’s 2019 Security Predictions on the current threat landscape.