$150

Boston Seminar: Cloud, Security, Network, Infrastructure

Event Information

Share this event

Date and Time

Location

Location

Boston

Boston, MA

View Map

Friends Who Are Going
Event description

Description

This comprehensive seminar covers the increasingly related topics of IT security/compliance, network infrastructure, private/public/hybrid cloud and Containers/DevOps. Scroll down to see the full agenda and click on links to see company information and speakers' biographies, who deliver concise, technical, educational and non-salesy talks. There is a Microsoft keynote, plus subject matter experts presenting from Silver Peak and other technology leaders.

Content is pre-approved by Angelbeat and past attendees to maximize learning; click here to download presentation guidelines that are followed by all participants, which makes the program so worthwhile for IT Directors, Security Analysts, Enterprise Architects, Network & System Administrators, Data Center/Storage/Infrastructure Managers, CISO/CIO's, etc.

CEO Ron Gerber's 7 Reasons to attend Angelbeat
As one Walmart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, "Thanks for hosting a very informative meeting with vendors that tied in well; it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace."

Every attendee receives meals, complimentary WiFi, plus 4 CPE credit hours towards your CISSP or other certification. There are drawings for gift cards and other prizes at the end.

Agenda

7:30 - 8:40: Registration Begins, Breakfast Served, Exhibit Area Open with Product Demonstrations, Time For Peer Networking/Interaction

8:40 - 9:00: The Enterprise Immune System - A New Approach to Cyber Defense with Darktrace
Fast-evolving cyber-threats call for a change in the way we protect our most critical information assets, in a digital world more interconnected than ever. Understand from Darktrace how new self-learning technology, known as the “Enterprise Immune System,” marks a fundamental transition in cyber defense, allowing organizations to gain indispensable visibility into their network, and detect emerging cyber-threats that bypass traditional security controls.

Thanks to fundamental advances in mathematics and unsupervised machine learning developed at the University of Cambridge, UK, Darktrace's technology is capable of learning what is normal and abnormal within an organization, detecting genuine behavioral anomalies, without using rules or signatures. More than 250 organizations across the world rely on its Enterprise Immune System to defend against novel cyber-threats, including insider threat, and protect themselves in today’s changing threat landscape.

Austin Eppstein, one of Darktrace's top cyber security experts, will cover the following subjects during this session:
- Learn why “immune system” technologies represent a fundamental innovation for cyber defense
- Discover how to apply machine learning and mathematics to detect advanced, internal threats
- Understand how to gain 100% network visibility to investigate emerging anomalies in real time
- Hear real-world examples of threats detected by the Enterprise Immune System

9:00 - 9:20: The Importance of Web Application Firewalls for Today's Cloud-Based World, from Network Box
IT Security is in the news every single day, and everyone is fully aware of the need for better cyber protection. However many individuals are underestimating the scope, severity and frequency of attacks to web servers and web-based applications, while overestimating the ability of firewalls and IPS to protect these web servers and applications.

Without adequate safeguards, cybercriminals can unleash attacks that leverage the expanse and anonymity of the world wide web, to not just cripple a website but cripple it instantly. This can paralyze an entire corporate infrastructure in mere seconds, while giving hackers access to confidential and sensitive professional and personal data.

During this informative and technical discussion, Pierlugi Stella, CTO at Network Box, will discuss the functionality of its Web Application Firewall, and how/why it should be part of your defense-in-depth security platform.

9:20 - 9:40: Software Defined Wide Area Networks (SD-WAN) with Silver Peak
Geographically distributed enterprises are embracing SD-WAN at an accelerating pace. As applications continue to move to the cloud, networking professionals are quickly realizing that traditional WANs were never architected for a dynamic, internet-based environment and recognize that backhauling traffic from the branch to headquarters doesn't make sense. Furthermore, end users often find their business apps run faster over their home Internet service, or even on their mobile device.

During this technical session on this increasingly important topic, Silver Peak will help you better understand how and why to deploy SD-WAN in your network infrastructure, covering the following topics:

- Address and overcome concerns around overall network performance, reliability and security
- Harden broadband internet connectivity for a secure SD-WAN
- Extend micro-segmentation from the data center across the WAN to securely connect users to applications and meet compliance requirements
- Eliminate latency and performance limitations of broadband
- Prioritize mission-critical applications and ensure that non-business/consumer applications that are bandwidth-intensive, such as Netflix, do not impact customer service
- Connect the branch securely and directly to SaaS applications and trusted web services using broadband significantly increasing performance
- Interoperate with existing routers and WAN infrastructure to migrate to SD-WAN at your own pace, or replace branch routers with an SD-WAN alternative for greenfield installations and router refresh projects
- Simplify management, configuration and expansion of branch offices with centralized management and zero-touch provisioning to lower OPEX and reduce configuration errors
- Lower overall WAN costs by up to 90%

9:40 - 10:20 Envision: Big Data

10:20 - 10:40: Versatile: Migration of Onsite Applications to Hosted/Cloud Platforms

Coffee/Snack Break, Exhibit Area Open, Peer Networking, Product Demonstrations

11:10 - 12:00: Linux, Windows Server and Hyper-V Containers: What They Are, Which One to Use, Why and How, plus Integration with Azure Private/Public/Hybrid Cloud, with Microsoft
A container is an isolated and portable operating environment. It provides a mechanism for IT to deploy services in a portable, repeatable and predictable manner. Container technology is the next evolution in virtualization, and in addition to Linux, Windows now also offers two different types of containers for addressing various business needs.

In this session Dan Stolts, world renown Technical Evangelist at Microsoft and a dynamic/engaging presenter, will examine the similarities and differences between a container and a virtual machine, review the requirements and walk through the processes and essential operations of enabling, creating, deploying and managing Linux and Windows containers and resources. He will also evaluate when to use which containers, why and how?

For those who are new to containers, his delivery serves as a jumpstart to accelerate your learning of containers. If you have already had some experience on Linux containers, his session familiarizes you with the specifics on Windows containers and helps bridge and extend your skills for bringing business value to both Linux and Windows communities.

Mr. Stolts will conclude this session by highlighting the top five new features in Microsoft's Azure cloud platform for 2017, and how to integrate your organization's public/private/hybrid cloud and container strategies. Lots of valuable content for infrastructure, data center, network and DevOps professionals.

End of Event, Raffle Prize Drawings for gift cards and other great items!

FAQs

What are Angelbeat's privacy and optin/optout policies

Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database

However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors.

If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at rgerber@angelbeat.com.

Who is eligible to receive a free pass
There is no charge to attend for an end user IT professional who works in the telecom/network/storage/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals/healthcare providers, pharmaceuticals, insurers, manufacturers, retailers, financial services/banks, real estate, legal/accounting/services, transportation/logistic firms, etc. and use, support, approve and/or are involved in or influence the decision to buy the products and services offered by our sponsors.

All free attendees must be pre-approved in advance by Angelbeat. Angelbeat reserves the right to accept or reject a free pass request at its sole discretion. As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above, who attend our events at no charge. If you fall in this category and would still like to attend then the fee is $150/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015. If you are a non-sponsoring vendor/integrator/consultant and would like to attend but avoid paying this $150 fee, then you must be accompanied by one of your clients who has not previously registered, and is a CIO, CISO or IT Director that meets the end user criteria above. Full-time reporters from major newspapers, websites, television and radio stations can attend as our guest, but again must be approved in advance.

If you do not meet the above criteria and still try to register, then you will receive an automatic reply/confirmation from Eventbrite. However you will shortly receive another email from Angelbeat, rejecting and cancelling your registration.

What are my transport/parking options getting to the event
Detailed driving directions will be sent out to all attendees one week before the event. There is complimentary self parking.

What is the dress code
Suggested dress is business casual.

What if you have special dietary needs/restrictions
If you have special dietary needs/restrictions, then please email Angelbeat below. We will do our best to accommodate any and all requests.

What if I am a government employee and cannot accept free meals and/or win raffle prizes
If you are a government employee and cannot accept free meals, then you can pay Angelbeat $35/person, to cover the cost of breakfast. Please contact the event organizer at registration@angelbeat.com to arrange payment.

Each sponsoring company/exhibitor handles its own raffle prize drawing; Angelbeat itself has nothing to do with these prizes and attendees are not automatically entered for any raffle prize drawing. Since each attendee must individually signup to win a raffle prize, then government employees (who are not eligible to win these prizes) can simply not signup for the drawing.

Share with friends

Date and Time

Location

Boston

Boston, MA

View Map

Save This Event

Event Saved