Learn. Discuss. Network. Earn CPE Credits.
Theme:
Digital Transformation initiatives driven by the Pandemic
Topics:
Panelists:
Theme:
Preparing for Emerging Technologies & Regulations - Business Impact and Security Risks
Panelists:
In this moderated session the panel will discuss the following:
Enabling New Business Models
Enabling Technology Paradigm Shifts
Building & Maintaining Company Culture in the New Normal Workforce/Workplace
In this follow-up session, building on the Thought Leadership Customer Panel, we will discuss the following:
Enabling New Business Models
Enabling Technology Paradigm Shifts
Building & Maintaining Company Culture in the New Normal Workforce/Workplace
* This session is reserved for qualified attendees only.
In this moderated session the panel will discuss the impact of emerging technologies and risks:
Our AssureIT pentesters would be happy to help you build and test drive your new pi-hole. Join our AssureIT pentesters in this fun and informative hands-on DNS sinkhole workshop. We'll configure Raspberry Pi minicomputers to block internet ads and telemetry data leakage using basic DNS services. The first 20 registrants (max 2 per company) will receive a complimentary Raspberry Pi to keep.
MISSION:
Identify security issues and misconfigurations in a public cloud environment using Palo Alto Networks Prisma Cloud to identify as many of these issues as possible in the time limit.
OBJECTIVES:
Travel around the world in this 90-minute interactive virtual Capture The Flag session using Palo Alto Networks Prisma Cloud as your weapon to solve the most challenges and achieve the highest score.
WIN:
Score the most points and claim the prize!
Cloud security is changing quickly, and organizations around the world struggle to implement and integrate the shifting pieces of the puzzle – threat detection, visibility, misconfiguration management and risk remediation – all while complying with industry standards.
With all these things to consider, how can you be sure you have what you need to keep your organization secure in the public cloud? Join cloud cybersecurity peers and experts for our Capture The Flag event to hone your skills and knowledge to help you combat future cloud threats.
We are looking for partner engineers of all experience levels to accept the mission and solve the most challenges.
The winning team/player is the one that solved the most challenges thus having scored highest!
Limited seats available. Claim your spot when registering for IT Summit before they're gone!
Given the increasing sophistication of today's cyber attacks, Threat Hunting is an absolute necessity, yet few organizations are able to make time for it. In this presentation, Joe will start with some exciting stories from threat hunting over the past few years to illustrate why so many tools fail to detect advanced threats, and then elaborate on how to make time each week for Threat Hunting. A preliminary step is to analyze the Signal-to-Noise Ratio (SNR) of your current tools to tune or replace those that cause you to 1) waste time on high-rates of false positives, 2) suffer the devastating effects of false negatives, and 3) erode at the morale of your security team due to alert fatigue. The next step is to identify methods to facilitate faster, more effective hunts, including how to automate everything from enhanced device identification to more advanced threat detections. The final step is to leverage integrations across your toolset for remediation and response.
Joe Malinka manages the pre-sales engineering team for Arista's security division. He's a veteran infosec engineer with a penchant for cybersecurity startups, innovation, and rapid adoption of new technologies. He has provided engineering, consultative, and architectural expertise in many different security domains, working extensively with organizations of all sizes and verticals. He has received numerous industry and security certifications, and has a degree in Applied Physics.
Today’s organizations face unprecedented challenges in battling cyber threats. Between increasingly sophisticated cybercriminals, rapidly expanding digital assets and attack surfaces, and a legal landscape that threatens to punish those companies that fail to adequately protect their customers’ privacy rights, it’s not hard to see why cybersecurity professionals are buckling under the mounting pressure. Within this complex new cyber threat battleground, organizations cannot afford to continue relying on passive, reactive defense, and instead, must leverage the tools and methodologies to facilitate a truly proactive and preemptive cyber defensive program.
Threat hunting is a powerful tool enabling companies to take a proactive approach to build organizational cyber resilience. By seeking out the highest-priority potential cyber threats rather than waiting for evidence of them to appear, threat hunting provides a proven, systematic way for an organization to defend itself from the most concerning risks, reducing dwell times and accelerating remediation and response.
In this session, Michael-Angelo Zummo, Senior Threat Intel Specialist at Cybersixgill, will discuss the best practices for performing an effective threat hunt.
Attendees will learn and understand:
QR codes were all but dead until smartphone companies started incorporating QR code scanners into their mobile phones back in 2017. Enter the COVID19 pandemic and the rise of the contactless economy, and the QR code is making a massive comeback. From advertising and restaurant menus to healthcare and agriculture – the use cases for QR codes are infinite.
QR Code Scanners: Beware
QR codes are accessible, easy to produce and seemingly, here to stay. They’re also a perfect way for cyber criminals to snag your employee’s personal information.
Join Len Noe, CyberArk White Hat/BioHacker in this live webinar as he shares his latest research on QR code attacks and the risks facing enterprises. Attendees of this session will walk away with
Is EDR enough today, or do you need XDR? Can you manage your own security solutions, or do you need MDR—or MXDR? When is MDR technically XDR, and does it need to incorporate ITDR? When is a SIEM a SOAR—and vice versa? Do you have the SaaS you need to protect AD, or are you SOL? The cybersecurity landscape is growing increasingly complex, and the never-ending sea of solutions, categories, and corresponding acronyms isn’t helping. Let’s break down a few of the most confusing terms that pervade today’s cybersecurity landscape and try to make sense of what organizations actually need to combat today’s threats.
Digital Transformation was a challenging undertaking prior to the pandemic accelerating the need and simultaneously exacerbating the obstacles associated with this move. The interdependent nature of society and markets create dependencies for businesses that exist outside of their sphere of control. Moving past these obstacles and accomplishing these goals will require two things of leaders: a willingness to “drop their tools” and a new perspective on the role partnership plays in decision making.
Organizations of all kinds are experiencing problems with manual network management. On the one hand, they lack enough network experts on their teams and on the other hand, they are seeing an increase in infrastructure complexity due to adoption of SD-WAN, SD-Networks(like Cisco ACI and VMware), and adoption of the public cloud. They are battling more complex problems- with less people, which is a “perfect storm”. SynerComm leverages NetBrain to transform customers burdened with manual network management into customers benefiting from network automation. This not only saves time and money- it opens up possibilities only limited by... imagination.
In this session we will discuss the most common authentication types, their common use cases and potential pitfalls:
Daily life has recently changed for millions across the globe and entire industries have been upended. To meet today’s business needs, networking infrastructure must deliver effortless, flexible, always-on, and secure network connectivity, coupled with a robust, automated centralized management solution. Join us for a live presentation to learn about the benefits of Extreme’s secure, end-to-end, cloud-driven Wired/Wireless portfolio, and understand how businesses can take the lead in the new world of the Infinite Enterprise in order to gain a competitive advantage.
Jarrod Washington is a passionate, technical, & experienced Cloud Executive who leverages distributed Wired & Wireless Networking in tandem with 4th Gen Cloud Management, ML, and AI to radically simplify and secure the Access Network for Customers and Prospects across the nation. A recent President’s Club Winner, Jarrod came to Extreme via the Aerohive Acquisition, and is going on his 5th Year here between two companies. He has also recently been certified as an AWS Cloud Practitioner. Jarrod loves spending all the time he can with his 2 Boys - Elliott (1YR) and Bryson (5YR) as well as his amazing Wife Robin. Hobbies include Biking, Musical Theatre, playing the saxophone, and Watersports.
In this session we will discuss the common global procurement and logistics strategies and potential pitfalls:
This talk touches on:
Online:
By Phone: