Transforming IT Ops and Network Experiences with A.I.

Presented by Juniper & Structured

Today’s networks and IT teams are challenged by the soaring numbers of mobile and IoT devices and apps. Learn how data science, AI and a modern microservices cloud architecture can deliver the agility, scale and reliability that businesses need to succeed. We are transforming user and IT experiences with an AI-Driven Enterprise through proactive automation and relevant insights while ultimately evolving towards a self-driving network. In this session, you’ll learn why three of the Fortune 10 companies, along with thousands of other organizations, are AI-driven wired and wireless networking customers, to deliver new services, assure network performance, and streamline help-desk operations.

Stay Ahead: Embracing New Technology

Presented by Tony North • President, Seattle HDI Chapter

Technology can be a hinderance if not well planned or deployed. With new tools like AI, IoT and Apps, it can be difficult for employees and employers to embrace it. Join the Seattle chapter of HDI, Help Desk Institute, for an interactive session. You will learn about the issues facing us all today while finding recommendations on how to improve adoption of technology in a very simple way.

You Are Never Alone: How to Humanize Tech and Work in Your Organization and in Life

Presented by Dan Gaul • CTO, Digital Trends

As one of the world’s largest technology curators, Digital Trends’ co-founder Dan Gaul explores what it takes to balance technology inside and outside of the organization while challenging traditional Silicon Valley ideas about what it takes to thrive.

Dan Gaul is the co-founder and Chief Technical Officer (CTO) for Digital Trends, a Portland, Oregon-based publisher of consumer-targeted websites. In his role, Dan is charged with oversight of tech operations for Digital Trends’ suite of platforms including: Digital Trends, the popular site for news, information and reviews on personal tech (which reaches over 30 million viewers each month); its Spanish-language companion, DT Español, and The Manual, an aspirational-living site.

The Current State of Ransomware and Proactive Ways to Combat It

Presented by Xiologix

In this presentation, we will do a quick review of the current state of ransomware and then jump right into proactive approaches utilizing the latest tools to prevent and combat this growing threat. We will include a discussion of identifying attack vectors, network defenses, storage defenses, asset management, SOC, incident response, and the benefits of each.

Achieving a Successful Security Segmentation

Presented by Illumio

You rely on the network to deliver applications. But as IT scales in size, connectivity, and environments outside the network to public cloud, we cannot rely solely on the network to secure applications. The answer is to decouple security segmentation from the network. This allows us to protect applications wherever they run –because they do not live exclusively on our networks anymore, and enforcement must go wherever they do.

During this informative session, we’ll discuss:

  • What is security segmentation?
  • Challenges of traditional network segmentation
  • Decoupling segmentation from network architecture
  • Principles of successful security segmentation
  • 5 steps to implement a strategy

Administering Responsibly

Presented by One Identity

Managing elevated and shared access credentials is one of the biggest challenges facing complex heterogeneous organizations today. Administrators must be able to access the systems they manage with sufficient rights to do their jobs, but organizations must control that access to ensure security and regulatory compliance. The days of administrators sharing accounts and passwords and operating without auditing are gone (or they should be).

Large enterprises face unique challenges. They too must control the use of elevated privileges, but they need to find ways to enhance authentication for these accounts to meet mandates while still enabling administrators to administer. Even with multifactor authentication to “check out” a privileged account or session, we still need to take steps to mitigate potential account compromises–making sure the admin that authenticated today is still who they say they are. We’ve come to the point where we need to continuously analyze administration by watching normal behavior and comparing it to current behavior – with real-time in-line remediation to add a powerful layer of risk mitigation.

What I Wish I Knew BEFORE I Moved to the Cloud

Presented by INTERFACE Advisory Council

As more companies have to interact with cloud to drive their business forward, more do so without truly understanding security and the long-term ramifications in doing so. Join our experts for an in-depth discussion. This session will talk about what things we wish we knew before moving to the cloud. Bring your questions for this interactive discussion!

Mitigating Cybercrime Through Automated Response and Integration

  Presented by Fortinet

Come join our talk on mitigating cybercrime and learn about best practices to help your company maintain a strong security posture through the digital transformation and beyond. The bad guys are using automated tactics to try to find a foothold in your network. Isn’t it time to leverage an integrated security approach to automate your response?

Managing the Impact of Collaboration Technologies on Your Network

  Presented by Cerium Networks

Today’s collaboration technologies come with many exciting features and benefits–all of which impact the network in various ways. This session will help the audience understand those impacts and how to manage them. This session covers everything from inter-branch communications, survivability, collaboration beyond your walls, and ensuring your collaboration environment is secure.

Topics include:

  • Inter-Branch Communications
    • SD-WAN
  • QOS, Path Diversity, Low Latency
    • Network requirements based on whether on-prem, cloud, or hybrid
    • Cloud Transport Leg/Poke –3rd Party Connections
  • Survivability
    • WAN/LAN resiliency
    • Local Call Processing / Failover Call Processing
  • Collaboration Beyond your Walls
    • Remote Workers
    • BYOD
    • Video Conferencing
    • Teams-based collaboration tools that combine meetings, calls, and IM into one platform
  • Ensuring your Environment is Secure
  • SIP
  • Toll Fraud
  • TLS Encryption
  • Encrypting the media
  • Certificates
  • Trunk Protection TDM/SIP
  • BYOD Policy Enforcement/MDM