Architecting the New SD-WAN Edge for the Cloud-first Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

Breaking Security Silos: How Better Integration Mitigates Cybercrime Expos

  Presented by Fortinet

Many solutions exist to solve particular security and technical issues in your network. But as solutions are added, complexity is increased as ‘Silos’ are created and visibility suffers. By breaking down these ‘Security Silos,’ you can get a better overall picture of what’s transpiring on your network as well as reducing your overall attack surface. Key topics of Malware propagation, common threat vectors, encryption complications, and pragmatic approaches to defense will be presented to the attendee.

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Active Directory Security: Early Stage Attack Activities to Watch For

  Presented by STEALTHbits Technologies

Attackers have demonstrated a consistent and ongoing ability to obtain access to workstations inside the network boundary through phishing and other web and email attacks. From here, attackers set their sights on gaining control of Active Directory as a means to an end; compromising Active Directory is an easy way to gain access to all critical corporate data and resources. Darin will discuss two early stage attack activities: LDAP reconnaissance and Password Spraying—that allow attackers to move laterally inside your AD environment. Detection strategies and mitigation steps will also be explained.

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Best Practices for Securing and Monitoring Microservices and Linux

  Presented by Sysdig

Containers and microservices are designed to provide a reliable and low-cost way for teams to build and ship distributed applications. However, they also add extra layers of abstraction and orchestration to your environment that hinder your ability to do performance monitoring and security enforcement. Many challenges companies face in this world are similar to that of the traditional Linux world; however, the microservices layer adds additional complexity.

We’ll discuss how to overcome this challenge and specifically discuss:

  • Benefits and drawbacks of different approaches to data collection in containers
  • How using metadata from orchestrators like Kubernetes helps optimize and secure your containers
  • Best practices for alerting and compliance in a distributed ephemeral infrastructure
  • How troubleshooting and forensics has changed in containerized environments

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Extreme IT Security: Where IoT and Security Collide

  Presented by Xiologix

The use of IoT devices is proliferating in every industry, and with this growth comes risk—reports of IoT attacks increased 600 percent from 2016 to 2017. You must take a zero-trust approach to network security. You must develop a strategy that only allows “good behavior” rather than just defending against bad behavior and yesterday’s threats. It is critical that your network security and zero-trust strategies encompass your IoT devices as well. Learn about the technology and practices that will help you sleep at night.

No Network Needed?!?!

  Presented by Zscaler

It seems every day, we are bombarded with news of yet another breach and our personal information being traded and sold on the dark web/Internet. We lose sleep wondering if we have the right controls and policies in place to prevent our companies and our names from appearing in the next morning’s headlines. Is it time for a different approach? What if we could get rid of our network so we no longer had to define complex boundaries and policies? Is it really possible to architect a system that removes all the traditional ingress and egress points? If we resign ourselves to the fact that it’s not IF but WHEN our network gets breached…then why do we still have a network?

Transform Networking & Security

  Presented by GCSIT Solutions

In order to keep up with the increasingly dynamic, distributed nature of modern applications, security needs to be an intrinsic component of the infrastructure that applications and data live on, rather than a bolted-on afterthought.

We eplore how:

  • You can enable micro-segmentation on the network with VMware NSX to prevent the lateral spread of threats.
  • And how VMware vSphere and vSAN deliver at-rest data encryption.