The Current Malware Threat Landscape & Enterprise Grade Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

IT Transformation: Building your Foundation for Innovation

  Presented by Dell EMC

In this session, we will share Dell Technologies’ point-of-view regarding the key elements involved with transforming IT from a traditional siloed infrastructure organization to a market-oriented broker of services to the business. More specifically, topics discussed will include…The modernization of the data center (with a focus on converged systems, as well as the ‘five core attributes of a modern architecture’). Automation of service delivery (with a focus on IaaS, Paas, Hybrid Cloud Platform and off premise offerings). Also, transformation of IT operations (with a focus on people, process and agility).

Cybersecurity Is All About Protecting the “Seams”

  Presented by AT&T

The evolution of cybercrime coupled with digitalization has transformed our concepts of business assets and customer interaction. An organization’s data and online presence is more important than ever. In cybersecurity terms, this increases the attack surface and increases the impact of a breach, making it a business level problem.

Digitalization continues to drive rapid changes in business models and network architectures. On the other hand, it also drives change in how cybercriminals operate by harvesting data and launching automated attacks at scale. However, security approaches have largely stayed the same, relying on reactive policy management, disparate technologies, point solutions and complex workflows. This is apparent as organizations continue to suffer data breaches as they struggle to integrate data, point solutions, security operations teams and processes.

Dispersed networks, an explosion of data, disparate technologies and complex security operations present cybercriminals with gaps or “seams” in organizations’ security postures. Fighting this requires a coordinated and collaborative approach that seamlessly orchestrates best-of-breed people, process and technology. This must utilize industry standard best practices and be powered by visibility across the threat landscape as well as actionable threat intelligence across all threat vectors.

In this session, we will talk about some security best practices to address modern security challenges and provide an overview of some technology as well as process approaches.

PCI and Your Organizational Liability

  Presented by Structured Communication Systems

Payment card processing is a critical service many companies and organizations offer. But with this service comes the added responsibility to comply with PCI requirements, and the technical, administrative, and physical controls applicable to card processing environments. Failure to comply can result in costly fines. Plus, a breach of card holder information could have disastrous financial and public relations consequences for compromised merchants. Want to know more? With compelling and engaging content delivered by Rob Wayt, a PCI Qualified Security Assessor (QSA), you will learn the intricacies of these requirements, proper scoping, and how to mitigate risks that merchants have while card processing.

Mitigate Cyber Risks: Visibility & Response

  Presented by RSA, the Security Division of Dell EMC

Cyber-attack risks are more prominent and widespread in today’s digital environment. Organizations struggle to respond to the evolving threat landscape—a challenge compounded by visibility and process gaps created by functional silos. This results in uncoordinated responses to cyber incidents that magnify financial, operational, reputational and compliance risks for businesses. This session will cover recommended steps to gain visibility and mitigate ongoing risk.

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Mitigating Cybercrime Through Automated Response and Integration

  Presented by Fortinet

Come join our talk on mitigating cybercrime and learn about best practices to help your company maintain a strong security posture through the digital transformation and beyond. The bad guys are using automated tactics to try to find a foothold in your network. Isn’t it time to leverage an integrated security approach to automate your response?

Micro-Segmentation 101

  Presented by Illumio

Companies of all sizes are struggling to ensure their networks are secure using aging firewall security systems. Micro-segmentation, when implemented correctly, can offer the additional security they need and provide tremendous application visibility in the process.

You’ll learn…

  • Why you need micro-segmentation
  • How micro-segmentation works
  • The 5 steps to implementing a micro-segmentation strategy for your data center and cloud

Cloud Security: Top Use Cases for Modern Cloud Protection

  Presented by Xiologix

With enterprises embracing multiple cloud environments, the attack surface is growing immensely—but security visibility and coordination are shrinking. In this presentation, we will discuss why and how to bring the cloud conversation into hardware purchase conversations and who is responsible for securing the different types of cloud resources. We will also walk through the six most common use cases for cloud protection.