Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Predict Future Attacks with AI

  Presented by Cylance & Structured Communication Systems

Get a first-hand look at how cybercrime is conducted today, how to combat the most damaging attack strategies, and how to even prevent threats that have not been seen before. Take a journey with us as we explore the enemy, revealing tactics and tricks, so you don’t become the next cybercrime victim. Join us in the good fight against an ever-changing threat vector with the best weapons, knowledge, and powerful AI-based technology. /p>

The Current Malware Threat Landscape & Best Practices for Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Building the SNOC: How to Integrate SecOps and NetOps

  Presented by ExtraHop

As the IT environment becomes more complex and distributed, it is more important than ever that Security Operations and Network Operations teams work together. This presentation explains the opportunities for optimizing budgets, cross-training staff, accelerating threat response, and improving end-user experience that come with integrated security and network operations. Attendees will also learn practical steps they can take toward building an integrated Security and Network Operations Center (SNOC).

Mitigating Cybercrime Through Automated Response and Integration

  Presented by Fortinet

Come join our talk on mitigating cybercrime and learn about best practices to help your company maintain a strong security posture through the digital transformation and beyond. The bad guys are using automated tactics to try to find a foothold in your network. Isn’t it time to leverage an integrated security approach to automate your response?

Micro-Segmentation 101

  Presented by Illumio

Companies of all sizes are struggling to ensure their networks are secure using aging firewall security systems. Micro-segmentation, when implemented correctly, can offer the additional security they need and provide tremendous application visibility in the process.

You’ll learn…

  • Why you need micro-segmentation
  • How micro-segmentation works
  • The 5 steps to implementing a micro-segmentation strategy for your data center and cloud

SecOps: Importance of Config. Mgmt. for Reducing Business Risk in Hybrid IT

  Presented by Micro Focus

In today’s IT world, hybrid and multi-cloud environments are the new reality and becoming increasingly more complex. Most organizations manage different technologies with vendor-provided solutions, but the reality is that using disparate solutions for hybrid environments can lead to inefficiencies and even gaps in security. The more vendors involved, the complex this becomes.

Cloud Security: Top Use Cases for Modern Cloud Protection

  Presented by Xiologix

With enterprises embracing multiple cloud environments, the attack surface is growing immensely—but security visibility and coordination are shrinking. In this presentation, we will discuss why and how to bring the cloud conversation into hardware purchase conversations and who is responsible for securing the different types of cloud resources. We will also walk through the six most common use cases for cloud protection.

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Architecting the New SD-WAN Edge for the Cloud-first Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.