Infrastructure Modernization: A Framework for Digital Transformation

  Presented by World Wide Technology

As IT operational models evolve, it is becoming increasingly important to align with lines of business on speed to deployment, simplifying management, and creating visibility on metrics.

In this talk we will explore how IT Operations and lines of business are converging efforts and creating brand value by enabling next gen technology through automation, digital strategy, and analytics tools at scale.

Architecting the New SD-WAN Edge for the Cloud-first Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

Active Directory Security: Early Stage Attack Activities to Watch For

  Presented by STEALTHbits Technologies

Attackers have demonstrated a consistent and ongoing ability to obtain access to workstations inside the network boundary through phishing and other web and email attacks. From here, attackers set their sights on gaining control of Active Directory as a means to an end; compromising Active Directory is an easy way to gain access to all critical corporate data and resources. Darin will discuss two early stage attack activities: LDAP reconnaissance and Password Spraying — that allow attackers to move laterally inside your AD environment. Detection strategies and mitigation steps will also be explained.

Mitigating Cybercrime Through Automated Response and Integration

  Presented by Fortinet

Come join our talk on mitigating cybercrime and learn about best practices to help your company maintain a strong security posture through the digital transformation and beyond. The bad guys are using automated tactics to try to find a foothold in your network. Isn’t it time to leverage an integrated security approach to automate your response?

Modernize Your Business with Cloud-Ready Infrastructure

  Presented by Xiologix

Today’s IT infrastructure must manage our modern hyper-connected, and hyper-distributed digital realities. In this presentation, we will discuss the important relationship between on-premises hardware and cloud services, reality vs expectations when executing a new cloud strategy, and how to minimize cost while running in the cloud.

Rearchitecting Security for Branch and Mobile Users

  Presented by Palo Alto Networks

Traditional back haul hub & spoke networking, such as MPLS and remote access VPN, is not suitable for today’s mix of cloud and internet applications. Join our session to learn what is needed for consistent security that provides the coverage for growing organization.