Breakout Session A
SOCIAL ENGINEERING - WHAT TO LOOK FOR AND HOW TO SAFEGUARD AGAINST IT!
Allen Lepke, Senior Solutions Engineer (High Point Networks) | Meeting Room 1-2
This breakout session will focus on the different types of Social Engineering with examples, how to identify the many different types, and what you can do to safeguard against it.
GETTING YOUR MICROSOFT HOUSE IN ORDER
Chris Watson, Solutions Architect (High Point Networks) | Meeting Room 3
Out with the old and in with the new. What Items do you have in your environment that will soon be unsupported? Check your locks. What doors do you need to put extra security on? Buy into a cool vacation home. What can we put in the Azure to make sure you have a place to stay in case of emergency.
FLEXIBILITY WITH WIRED AND WIRELESS
Dr. Dustin Hopkins, Systems Engineer & Nick Patrick, Territory Manager (HPE) | Meeting Room 6
In this breakout Dustin and Nick will discuss the advantages of an Aruba solution with out flexible management options with the same hardware. Whether a customer wants the Cloud, On-Prem Software, a Controller, or an Instant environment, you will be able to use the same AP and switch hardware. This provides a faster ROI and the comfort of knowing that if your needs change, you don’t need to rip and replace your entire network.
HOW MITEL IS LEADING IN TODAY'S CONTACT CENTER ECOSYSTEM
Lou Gallagher, Contact Center Specialist (Mitel) | Meeting Room 7
In today’s contact center, one of the biggest challenges is integrating disparate applications into a coherent contact center technology architecture. Come learn how Mitel is well positioned to meet this challenge and is innovating within contact center to help companies deliver a more exceptional customer experience.
Breakout Session B
ONLINE PASSWORD CRACKING
Jamie Maguire, Security Engineer (High Point Networks) | Meeting Room 1-2
In this presentation, Jamie will describe web application attacks for enumerating usernames and talk specifically about Web Application Timing Attacks. He will demonstrate a timing attack against a popular Web Application to enumerate valid usernames. After he gathers a list of valid usernames, Jamie will then discuss Password Guessing attacks including “Password Spraying.” The presentation will finish with a few examples of how to defend against attacks such as these.
$100 SAYS WE CAN BREAK INTO YOUR NETWORK IN UNDER 10 HOURS
Chris Currin, VP of Sales (Infogressive) | Meeting Room 3
Why are we so confident? With more than a decade of experience, Infogressive knows that the majority of companies don’t have a solid security foundation. This foundation along with educated and trained engineers is a requirement to preventing the BIG BREACH. Join this breakout to learn what is a part of that solid foundation, how to go about implementing it and hear the real-world horror stories of what happens when the BIG BREACH occurs.
HPE MAKES HYBRID IT SIMPLE
Aaron Hansen, Storage Solutions Architect (HPE) | Meeting Room 6
Learn how software defined HPE solutions like Infosight, Simplivity and Synergy, powered by HPE OneView, can create positive business outcomes from IT to your organization.
SECURITY VIA EXTREME FABRIC AND EXTREME CONTROL
Mike Claypool, Senior Account Executive & Ryan Schmotter, Solutions Engineer (Extreme Networks) | Meeting Room 7
Introductory session on how to provide increased security utilizing user roles and access policies via Extreme’s G2 infrastructure and XMC (formerly Netsight). You will also learn about Extreme’s new Campus Fabric offering, which provides the ultimate solution to multicast and traffic hyper segmentation.
Breakout Session C
PROACTIVE NETWORK MANAGEMENT
Jordan Sanger, NOC Engineer (High Point Networks) | Meeting Room 1-2
NOC Engineer, Jordan Sanger, shares tips and best practices we use to ensure you’re ‘Always Connected’.
EVENT DETECTION AND RESPONSE: HOW TO GET STARTED
Karl Ackerman, Principal Product Manager (Sophos) | Meeting Room 3
Join Sophos in this clear cut introduction to Event Detection and Response (EDR) solutions and how to prepare to evaluate them for the first time. In this breakout session we will cover some of the common deployment options for EDR, how to prepare your team for installation and management and some of the key decisions you will need to make in choosing an EDR solution.
CYBERSECURITY: PARTNERS IN PROTECTION
Jesse Nordgaard (Axis Communications) | Meeting Room 6
Concern about cyber crime via IP camera networks is real. And there‘s no magic bullet - no single solution for staying safe. Join Axis Communications in this breakout for an overview of potential threats and how to protect your network.
ADVANCED SOCs & MSSPs & MDRs, OH MY!
Shane Harsch, Senior Solutions Principal (RSA) | Meeting Room 7
Let’s talk meat and potatoes about advancing your SOC with threat hunting, threat intelligence, incident management, and live response. We will also look at how MSSPs and MDRs can make you successful (or not), and how to think about what kind of strategy you might need in today’s hyperkinetic, darkweb-laden, threat-actor-suffused, buzzword-embattled, cyber defense hot mess initiatives.