You Are Never Alone: How to Humanize Tech and Work in Your Organization and in Life

Presented by Dan Gaul • CTO, Digital Trends

As one of the world’s largest technology curators, Digital Trends’ co-founder Dan Gaul explores what it takes to balance technology inside and outside of the organization while challenging traditional Silicon Valley ideas about what it takes to thrive.

Dan Gaul is the co-founder and Chief Technical Officer (CTO) for Digital Trends, a Portland, Oregon-based publisher of consumer-targeted websites. In his role, Dan is charged with oversight of tech operations for Digital Trends’ suite of platforms including: Digital Trends, the popular site for news, information and reviews on personal tech (which reaches over 30 million viewers each month); its Spanish-language companion, DT Español, and The Manual, an aspirational-living site.

The Current State of Ransomware and Proactive Ways to Combat It

Presented by Xiologix

In this presentation, we will do a quick review of the current state of ransomware and then jump right into proactive approaches utilizing the latest tools to prevent and combat this growing threat. We will include a discussion of identifying attack vectors, network defenses, storage defenses, asset management, SOC, incident response, and the benefits of each.

Achieving a Successful Security Segmentation

Presented by Illumio

You rely on the network to deliver applications. But as IT scales in size, connectivity, and environments outside the network to public cloud, we cannot rely solely on the network to secure applications. The answer is to decouple security segmentation from the network. This allows us to protect applications wherever they run –because they do not live exclusively on our networks anymore, and enforcement must go wherever they do.

During this informative session, we’ll discuss:

  • What is security segmentation?
  • Challenges of traditional network segmentation
  • Decoupling segmentation from network architecture
  • Principles of successful security segmentation
  • 5 steps to implement a strategy

Administering Responsibly

Presented by One Identity

Managing elevated and shared access credentials is one of the biggest challenges facing complex heterogeneous organizations today. Administrators must be able to access the systems they manage with sufficient rights to do their jobs, but organizations must control that access to ensure security and regulatory compliance. The days of administrators sharing accounts and passwords and operating without auditing are gone (or they should be).

Large enterprises face unique challenges. They too must control the use of elevated privileges, but they need to find ways to enhance authentication for these accounts to meet mandates while still enabling administrators to administer. Even with multifactor authentication to “check out” a privileged account or session, we still need to take steps to mitigate potential account compromises–making sure the admin that authenticated today is still who they say they are. We’ve come to the point where we need to continuously analyze administration by watching normal behavior and comparing it to current behavior – with real-time in-line remediation to add a powerful layer of risk mitigation.

What I Wish I Knew BEFORE I Moved to the Cloud

Presented by INTERFACE Advisory Council

As more companies have to interact with cloud to drive their business forward, more do so without truly understanding security and the long-term ramifications in doing so. Join our experts for an in-depth discussion. This session will talk about what things we wish we knew before moving to the cloud. Bring your questions for this interactive discussion!

Mitigating Cybercrime Through Automated Response and Integration

  Presented by Fortinet

Come join our talk on mitigating cybercrime and learn about best practices to help your company maintain a strong security posture through the digital transformation and beyond. The bad guys are using automated tactics to try to find a foothold in your network. Isn’t it time to leverage an integrated security approach to automate your response?

Managing the Impact of Collaboration Technologies on Your Network

  Presented by Cerium Networks

Today’s collaboration technologies come with many exciting features and benefits–all of which impact the network in various ways. This session will help the audience understand those impacts and how to manage them. This session covers everything from inter-branch communications, survivability, collaboration beyond your walls, and ensuring your collaboration environment is secure.

Topics include:

  • Inter-Branch Communications
    • SD-WAN
  • QOS, Path Diversity, Low Latency
    • Network requirements based on whether on-prem, cloud, or hybrid
    • Cloud Transport Leg/Poke –3rd Party Connections
  • Survivability
    • WAN/LAN resiliency
    • Local Call Processing / Failover Call Processing
  • Collaboration Beyond your Walls
    • Remote Workers
    • BYOD
    • Video Conferencing
    • Teams-based collaboration tools that combine meetings, calls, and IM into one platform
  • Ensuring your Environment is Secure
  • SIP
  • Toll Fraud
  • TLS Encryption
  • Encrypting the media
  • Certificates
  • Trunk Protection TDM/SIP
  • BYOD Policy Enforcement/MDM

Architecting the New SD-WAN Edge for the Cloud-First Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.