Event Schedule

  • Windows 10 Migrations and In-Place Upgrades – How to Get It Done Right 9:00 am

    Presented by baramundi

    Many Companies have been scrambling for a while now to beat the deadline and get their remaining Win 7 machines migrated to Windows 10.
    Even after Microsoft discontinued Windows 7 on January 14th migrations are still in full swing. At the same time Win10 In-Place Upgrades to keep up with Microsoft’s rapid release program are posing a new, but very similar challenge already.

    Start managing your endpoints properly and proactively. Avoid the inevitable long term implications of a stop-gap OS migration approach. A proper long term upgrade strategy makes it far easier to support and maintain your endpoints, enhances the overall consistency and leaves you less vulnerable to attacks.

    In this presentation we outline the different migration approaches taken today. We also show how to overcome some common pitfalls and get migrations done quicker, chaeper and less intrusive. Get some valuable advise on how to properly manage the entire life-cycle of your PCs, Servers and Mobile Devices, where patch deployments, software updates, OS migrations and On-demand machine rebuilds simply become a routine task.

    With the right toolset, migrations should no longer be considered large and resource consuming projects for IT to conquer frequently.

    Click to Expand

    Speaker:

    Holger Weeres
    Holger Weeres

    Holger Weeres

    VP Midwest Operations at baramundi

    Collapse This Item

  • Real Talk on Ransomware 9:30 am

    Presented by Arcserve

    We all know what ransomware is – we know the stats, we’ve seen the headlines, we’re all in the mindset of “if, not when.” With all the fear, uncertainty and doubt constantly bombarding IT professionals, Arcserve dives into the realities of ransomware attacks and the real impacts on organizations. We offer participants an opportunity to “sound off” on ransomware and share experiences and challenges with your peers to better understand how prepared organizations are to defend against ransomware attacks.

    Click to Expand

    Speaker:

    Collapse This Item

  • Coffee Break
  • Utilizing the MITRE Att&ck Matrix 10:30 am

    Presented by Check Point Software Technologies

    Utilizing the MITRE Att&ck Matrix to identify security risks, gaps and where you need to focus your organization’s security efforts.

    Click to Expand

    Speaker:

    Collapse This Item

  • The Paradox of Securing Workloads 11:00 am

    Presented by Morphisec

    Servers contain an organization’s most valuable assets and underpin its operational capabilities. These are the ultimate targets of many cybercriminals. Yet strategies for defending them often rely on client-grade technologies like AV and EDR. This exposes the enterprise at a time when many companies are migrating workloads to the cloud. Gartner’s model for Cloud Workload Protection Platforms offers insights on the must-haves and nice-to-haves of server protection, on-prem and in the cloud. It also points to ways of safeguarding them from unknown attacks by using deterministic technology like moving target defense.

    Click to Expand

    Speaker:

    Arthur Braunstein
    Arthur Braunstein

    Arthur Braunstein

    Vice President of Sales

    Collapse This Item

  • Lunch Break
  • The FBI’s Cyber Program 12:00 pm

    Presented by Federal Bureau of Investigation

    The FBI is the lead federal agency for investigating cyber attacks by criminals, overseas adversaries, and terrorists. The threat is serious-and growing. Cyber intrusions are becoming more commonplace, more dangerous, and more sophisticated. This session will describe the FBI’s Cyber Program, and discuss the different types of cyber threats targeting internet users, as well as threats targeting our national security.

    Click to Expand

    Speaker:

    Collapse This Item

  • Dessert and Coffee Break
  • Cybersecurity as a System 1:30 pm

    Presented by Sophos

    Organizations here in the US face a pretty immense challenge when it comes to cybersecurity. Doing more of the same is clearly not the answer. Instead we need to evolve our approach and move to cybersecurity as a system.

    Click to Expand

    Speaker:

    Collapse This Item

  • Deception Technology, Luxury Item or Lifeline? 2:00 pm

    Presented by Attivo Networks

    A common deception technology misconception is that it is a luxury item meant only for companies with mature security operations or large budgets. This session will provide insight into how deception has evolved, its fit within the security stack, and why organizations both large and small are turning to deception for accurate detection, building predictive defenses, and accelerated incident response. Join in to hear about real-world deployments and top use cases. Attendees will leave with insight into the value and benefits that defenders have realized from adding deception into their security operations programs and why it is often a lifeline for defense against today’s advanced attackers.

    Click to Expand

    Speaker:

    Collapse This Item

  • Break
  • What We Don’t Know 2:45 pm

    Presented by RSA

    A discussion of the many things we don’t know that will hopefully enlighten and entertain you. Expect to learn something new in this discussion of the unknown and how it can affect our information technology lives. Learning something entirely new and surprising to you can be fun in some cases or a horrifying shock in others, and this session will attempt to provide you some of the former and help you avoid the latter.

    For a copy of this presentation, please contact Bethe Tomasek – [email protected]

    Click to Expand

    Speaker:

    Collapse This Item

  • Networking / Happy Hour
Partners