The Monsters We Build: Apps from Pieces and Parts

  Presented by F5 Networks

The way we build applications today differs greatly from how they were built just a few years ago. The rise of architectural approaches to development like microservices, function-as-a-service, and injectable components have simplified some aspects of application development but has made our applications into lumbering Frankenstein’s monsters in other ways. Learn how to properly map out your monster’s anatomy and identify hidden, critical weaknesses in delivery, security, and operability…before they come after you with torches.

SecOps: Importance of Config. Mgmt. for Reducing Business Risk in Hybrid IT

  Presented by Micro Focus

In today’s IT world, hybrid and multi-cloud environments are the new reality and becoming increasingly more complex. Most organizations manage different technologies with vendor-provided solutions, but the reality is that using disparate solutions for hybrid environments can lead to inefficiencies and even gaps in security. The more vendors involved, the complex this becomes.

Predict Future Attacks with AI

  Presented by Cylance & Structured Communication Systems

Get a first-hand look at how cybercrime is conducted today, how to combat the most damaging attack strategies, and how to even prevent threats that have not been seen before. Take a journey with us as we explore the enemy, revealing tactics and tricks, so you don’t become the next cybercrime victim. Join us in the good fight against an ever-changing threat vector with the best weapons, knowledge, and powerful AI-based technology. /p>

Architecting the New SD-WAN Edge for the Cloud-first Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

Why Encryption Is More Important Than Ever in Deterring Cybercrime

  Presented by Micro Focus

With the advancement in capabilities such as Artificial Intelligence, predictive learning analytics and data warehousing, cyber criminals Tactics, Techniques, and Procedures (TTP) have reached levels of sophistication that enables them to gain an edge over traditional Information Security methods used to secure the enterprise. In this presentation, we will show how using Format Preserving Encryption can protect an organization’s data, with minimal impact to business and reduce the capabilities of cyber criminals to compromise sensitive data, including from previous hacks.

During this presentation, we will cover:

  • Historical notes of compromised data and why it affects you.
  • An overview of tools used by cyber criminals
  • Strategies that can be used to protect your environment
  • A Live Demo of Format Preserving Encryption

The Current Malware Threat Landscape & Best Practices for Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Building the SNOC: How to Integrate SecOps and NetOps

  Presented by ExtraHop

As the IT environment becomes more complex and distributed, it is more important than ever that Security Operations and Network Operations teams work together. This presentation explains the opportunities for optimizing budgets, cross-training staff, accelerating threat response, and improving end-user experience that come with integrated security and network operations. Attendees will also learn practical steps they can take toward building an integrated Security and Network Operations Center (SNOC).