Breakout Session A
EVOLVING SECURITY CHALLENGES: PROTECTING YOUR ENTERPRISE IN THE NEW PARADIGM
Cliff Hieronymus, Director of Aruba Security (HPE) | Breakout Room 5
Connectivity is increasingly mobile and open and the number of unmanaged devices is growing exponentially. Today’s attacks don’t come through the firewall, they are already on the inside. We’ll discuss these challenges in bit more depth and discuss how to secure the people and things connected to the rapidly expanding attack surface.
$100 SAYS WE CAN BREAK INTO YOUR NETWORK IN UNDER 10 HOURS
Heather Lantz, Chief Operating Officer (Infogressive) | Breakout Room 4
Why are we so confident? With more than a decade of experience, Infogressive knows that the majority of companies don’t have a solid security foundation. This foundation along with educated and trained engineers is a requirement to preventing the BIG BREACH. Join this breakout to learn what is a part of that solid foundation, how to go about implementing it and hear the real-world horror stories of what happens when the BIG BREACH occurs.
HOW MITEL IS LEADING IN TODAY'S CONTACT CENTER ECOSYSTEM
Lou Gallagher, Contact Center Specialist (Mitel) | Breakout Room 1
In today’s contact center, one of the biggest challenges is integrating disparate applications into a coherent contact center technology architecture. Come learn how Mitel is well positioned to meet this challenge and is innovating within contact center to help companies deliver a more exceptional customer experience.
ONLINE PASSWORD CRACKING
Jamie Maguire, Security Engineer (High Point Networks)| Breakout Room 3
In this presentation, Jamie will describe web application attacks for enumerating usernames and talk specifically about Web Application Timing Attacks. He will demonstrate a timing attack against a popular Web Application to enumerate valid usernames. After he gathers a list of valid usernames, Jamie will then discuss Password Guessing attacks including “Password Spraying.” The presentation will finish with a few examples of how to defend against attacks such as these.
CUSTOMER PANEL - A DISCUSSION WITH YOUR PEERS
Current HPN Customers | Breakout Room 2
Learn how area IT Leaders have proactively leveraged their relationship with HPN to ensure they are ‘Always Connected’.
Breakout Session B
HPE MAKES HYBRID IT SIMPLE
Aaron Hansen, Storage Solutions Architect (HPE) | Breakout Room 2
Learn how software defined HPE solutions like Infosight, Simplivity and Synergy, powered by HPE OneView, can create positive business outcomes from IT to your organization.
DECRYPTING ZERO DAY THREATS IN AN ENCRYPTED WORLD:
A TECHNICAL DEEP DIVE ABOUT SSL & SANDBOXES
David Raiter, Sales Engineer (SonicWall) | Breakout Room 3
With over 50% of Internet traffic being encrypted, and new threats coming out at a rate of 5 – 10 per second: we have a security problem! At a technical level, we will break down how firewalls can keep you safe from encrypted threats. We will also cover the technology behind how it is possible for your firewall to protect you from threats that are not yet known with multiple layers of sandboxes – yes, sandboxes. This session is for the more technical attendees, or if you would merely like to understand the technology behind how firewalls protect your staff every day.
MANAGEMENT, ANALYSIS, & DEPLOYMENT OF
FLEXIBLE POOLS FOR YOUR LOAD BALANCING ENVIRONMENT
Jayme Albrecht, Senior Systems Engineer (A10 Networks) | Breakout Room 1
Join A10 Networks and learn how capacity pools work for you to simplify operations, protect your investments, and elasticity allocate licensing. .
GETTING YOUR MICROSOFT HOUSE IN ORDER
Chris Watson, Solutions Architect (High Point Networks) | Breakout Room 5
Out with the old and in with the new. What Items do you have in your environment that will soon be unsupported? Check your locks. What doors do you need to put extra security on? Buy into a cool vacation home. What can we put in the Azure to make sure you have a place to stay in case of emergency.
SOCIAL ENGINEERING - WHAT TO LOOK FOR AND HOW TO SAFEGUARD AGAINST IT!
Allen Lepke, Senior Solutions Engineer (High Point Networks) | Breakout Room 4
This breakout session will focus on the different types of Social Engineering with examples, how to identify the many different types, and what you can do to safeguard against it.
Breakout Session C
SECURITY VIA EXTREME FABRIC & EXTREME CONTOL
Mike Claypool, Senior Account Executive & Ryan Schmotter, Solutions Engineer (Extreme Networks) | Breakout Room 5
Introductory session on how to provide increased security utilizing user roles and access policies via Extreme’s G2 infrastructure and XMC (formerly Netsight). You will also learn about Extreme’s new Campus Fabric offering, which provides the ultimate solution to multicast and traffic hyper segmentation.
CYBERSECURITY: PARTNERS IN PROTECTION
Kyle Reinoehl, Area Sales Manager (Axis Communications) | Breakout Room 2
Concern about cyber crime via IP camera networks is real. And there‘s no magic bullet - no single solution for staying safe. Join Axis Communications in this breakout for an overview of potential threats and how to protect your network.
A DEEPER DIVER INTO DRaaS: CONTINUED FROM THE MAIN STAGE TALK
Eric Torres, Channel Development Manager (Datto) | Breakout Room 4
Brandon Conkins, Manager of Managed Services & NOC | High Point Networks
We'll answer even more of your questions and dive into greater detail about HPN's DRaaS.
ADVANCED SOCs & MSSPs & MDRs, OH MY!
Matthew Tharp, Network Forensics & Malware Analysis (RSA) | Breakout Room 1
Let’s talk meat and potatoes about advancing your SOC with threat hunting, threat intelligence, incident management, and live response. We will also look at how MSSPs and MDRs can make you successful (or not), and how to think about what kind of strategy you might need in today’s hyperkinetic, darkweb-laden, threat-actor-suffused, buzzword-embattled, cyber defense hot mess initiatives
THE ESSENTIAL ELEMENT OF SECURITY
Rodger Harbaugh & Brain Kamm (Gigamon) | Breakout Room 3
Gigamon bonds with your entire network ecosystem to make it more resilient, more responsive, and more secure. It’s a force that’s visible no matter what application or data is running, no matter where it is in the enterprise. It lives within your existing structure to identify and eradicate threats faster, and it makes the tools you already have more powerful.