SecOps: Importance of Config. Mgmt. for Reducing Business Risk in Hybrid IT

  Presented by Micro Focus

In today’s IT world, hybrid and multi-cloud environments are the new reality and becoming increasingly more complex. Most organizations manage different technologies with vendor-provided solutions, but the reality is that using disparate solutions for hybrid environments can lead to inefficiencies and even gaps in security. The more vendors involved, the complex this becomes.

Architecting the New SD-WAN Edge for the Cloud-first Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

PCI and Your Organizational Liability

  Presented by Structured Communication Systems

Payment card processing is a critical service many companies and organizations offer. But with this service comes the added responsibility to comply with PCI requirements, and the technical, administrative, and physical controls applicable to card processing environments. Failure to comply can result in costly fines. Plus, a breach of card holder information could have disastrous financial and public relations consequences for compromised merchants. Want to know more? With compelling and engaging content delivered by Rob Wayt, a PCI Qualified Security Assessor (QSA), you will learn the intricacies of these requirements, proper scoping, and how to mitigate risks that merchants have while card processing.

Why Encryption Is More Important Than Ever in Deterring Cybercrime

  Presented by Micro Focus

With the advancement in capabilities such as Artificial Intelligence, predictive learning analytics and data warehousing, cyber criminals Tactics, Techniques, and Procedures (TTP) have reached levels of sophistication that enables them to gain an edge over traditional Information Security methods used to secure the enterprise. In this presentation, we will show how using Format Preserving Encryption can protect an organization’s data, with minimal impact to business and reduce the capabilities of cyber criminals to compromise sensitive data, including from previous hacks.

During this presentation, we will cover:

  • Historical notes of compromised data and why it affects you.
  • An overview of tools used by cyber criminals
  • Strategies that can be used to protect your environment
  • A Live Demo of Format Preserving Encryption

The Monsters We Build: Apps from Pieces and Parts

  Presented by F5 Networks

The way we build applications today differs greatly from how they were built just a few years ago. The rise of architectural approaches to development like microservices, function-as-a-service, and injectable components have simplified some aspects of application development but has made our applications into lumbering Frankenstein’s monsters in other ways. Learn how to properly map out your monster’s anatomy and identify hidden, critical weaknesses in delivery, security, and operability…before they come after you with torches.