
NYC March 9
Event Information
Description
Program Description:
This comprehensive seminar at the beautiful and conveniently located Harvard Club in midtown covers the increasingly related topics of security/compliance, network infrastructure, storage/backup, private/public/hybrid cloud and Big Data. There are expert speakers from Microsoft, VMware, Dell, Palo Alto and many more technology leaders - scroll down to see the fantastic agenda and click on links to see speakers' biographies - who deliver concise, technical, educational and complementary talks.
Content is pre-approved by Angelbeat and past attendees to maximize learning; click here to download presentation guidelines that are followed by all speakers, which makes the program so worthwhile for IT Directors, Security Analysts, Enterprise Architects, Network & System Administrators, Data Center/Storage/Infrastructure Managers, CISO/CIO's, etc.
As one Walmart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, "Thanks for hosting a very informative meeting with vendors that tied in well; it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace."
Join your peers from Barclays, Oppenheimer, Credit Suisse, Societe General, Convergex, AXA, BNY Mellon, Alliance Bernstein, Nomura, New York Life, Union Bank, HBO, UPS, Samsung, Shearman & Sterling, Stroock, Squire Patton Boggs, Mendes & Mount, Alvarez & Marsal, Ogilvy, Con Edison, Columbia University, Rutgers, NYU, Stevens Institute, Ocean City College, NYIT, Novartis, Pfizer, Emblem Health, City of New York and many more organizations who are confirmed attendees.
Every attendee receives meals including a full hot lunch (click here to see the delicious menu), complimentary Wi-Fi, plus 4 CPE credit hours towards your CISSP or other certification. There are drawings for gift cards and other prizes at the end.
7:30 - 8:40: Registration, Hot Breakfast, Exhibit Area Open, Peer Networking, Product Demonstrations
8:40 - 9:00: Top Five Tips for Educating Employees about Cybersecurity with Kaspersky
Corporate cybercrime is usually blamed on outsiders, but sometimes employees can represent the biggest threat to your organization’s IT security. In his presentation, Kaspersky’s Mark Villinski will provide practical advice for educating your employees about cybersecurity, covering topics including:
- How to create efficient and effective security policies
- Overview and statistics of the current threat landscape
- The importance of keeping your employees updated about the latest threats and scams
- Security solutions that can help keep your systems updated and protected
Kaspersky is the world's largest privately held, and among the top four security vendors, operating in 200 countries and protecting 400 million users.
9:00 - 9:20: Top Ten Checklist for Securing Your Network with Accelops:
Anthem, Sony, JP Morgan Chase, Target … Seemingly every day, another large and sophisticated company suffers a major security breach. In this era of DevOps, software-defined everything, and the Internet of Things, current security tools are increasingly vulnerable and (as these examples demonstrate) cannot prevent attacks by sophisticated hackers. There is hope however….. During this session featuring Accelops, organizations of all sizes will learn how to prevent data center attacks and improve overall network/infrastructure performance by:
- Cross-correlating security and performance events
- Using synthetic transactions to proactively monitor business services
- Creating baselines using machine learning to automate remediation
- Using auto-remediation to correct known errors
- Mapping hardware and software to your business services
9:20 - 9:40: Unified Identity Services across data center, cloud and mobile with Centrify
Centrify strengthens enterprise security by managing and securing user identities from cyber threats. As organizations expand IT resources and teams beyond their premises, identity is becoming the new security perimeter. With its platform of integrated software and cloud-based services, Centrify uniquely secures and unifies identity for both privileged and end users across today’s hybrid IT world of cloud, mobile and data center. The result is stronger security and compliance, improved business agility and enhanced user productivity through single sign-on. Over 5000 customers, including half of the Fortune 50 and over 80 federal agencies, leverage Centrify to secure their identity management.
9:40 - 10:00: Making IT Infrastructure Invisible with Nutanix
What could you accomplish if you no longer had to spend all your time managing your infrastructure? Nutanix makes datacenter infrastructure invisible, elevating IT to focus on applications and services that power their business.
During this educational session, you will learn about the Nutanix Xtreme Computing Platform, a 100% software-defined infrastructure solution that combines storage, compute and virtualization. Some of the topics covered include:
· A first look at Nutanix Acropolis, which integrates compute, storage and virtualization to run any application
· A preview of Nutanix Prism, which gives administrators a simple and elegant way to manage virtual environments
· A discussion of how web-scale engineering and consumer-grade design applied to the infrastructure stack makes infrastructure simple
10:00 - 10:20: Dell and Custom Computer Specialists: Backup/DR/Data Protection for Physical, Virtual, Cloud Platforms
Disaster Recovery/Business Continuity is vitally important in today's always-on world. But when data can be at rest, in use or in motion - and stored on physical, virtual and/or private/public/hybrid clouds - a cost-effective and manageable solution can be very challenging.
Dell and its partner Custom Computer Specialists will discuss how organizations of all sizes can meet this challenge, through its broad portfolio of scalable solutions that protect data and deliver rapid recoverability across physical, virtual and cloud environments. Its automated processes for validating and verifying the integrity of data helps ensure the success of every recovery. Some of the specific topics addressed include:
- Quantifying the cost of downtime and how much data can you afford to lose, to justify 2016 DR projects.
- Segmenting your data among static, business vital and mission critical applications, then creating a DR plan to match each segment, e.g. there are different data retention requirements.
- Building a defense-in-depth approach, leveraging snapshots, replication, local backups and offsite/cloud options.
- Conducting on-going tests to verify backup accuracy/integrity, and more importantly, complete data recoverability
Coffee/Refreshment Break, Product Demonstrations, Exhibit Area Open, Peer Interaction
11:00 - 11:20: Data Center Architecture and Data Governance/Management, with Veritas and ConRes
Veritas software and hardware products enable 86 percent of the world’s Fortune 500 companies to protect, identify, and manage data within the world’s largest and most complex environments—from traditional data centers to private, public, and hybrid clouds. Veritas helps enterprises address information management challenges with a complete, organized product strategy and roadmap focused on their needs. Its backup and recovery, business continuity, software-defined storage, and information governance products help keep businesses up and running so they can focus on what they do best.
Unchecked data growth is an expensive burden—and a potential security risk. With a majority of the world’s enterprise data holding no legal, regulatory, or business value, the cost in time, money, and resources to store and manage it is staggering. But how do companies separate the valuable from the volume? Veritas solutions help them identify the needles of high-value information buried deep inside every corporate data haystack. Its approach to helping companies defy the data deluge is governed by three beliefs: Not all data is created equal. Infrastructure availability does not equal business uptime. Know what data you have, keep only the data you need. The majority of target-rich data, housed in general IT systems and metadata, is information that Veritas already touches with backup, archive, and storage management solutions. As such Veritas is uniquely positioned to bring these pieces together, to provide organizations with access to information that drives informed decision-making.
11:20 - 11:35: Hybrid IT Monitoring Imperatives with Viavi Solutions
To create a unified monitoring platform for a Hybrid IT environment, organizations need seamless visibility and monitoring of its infrastructure, from the traditional data center, then extending out to the private and public clouds. Holistic monitoring of IT and cloud resources, understanding resource relationships, and having analytical intelligence are critical to the availability and health of IT operations.
Viavi will address some of the specific questions below, enabling you to monitor and manage the performance of a complex and distributed infrastructure:
- How does your monitoring solution address your Cloud strategy, plus Legacy infrastructure monitoring?
- Are you paying for numerous modules that only add to the cost and complexity of your solution?
- Does your current monitoring solution deliver true Multi Tenancy views, for multiple teams and/or end users?
- How well does it integrate with 3rd party applications like ServiceNow or New Relic?
Viavi Solutions was created from the combination of JDSU’s network and service enablement (NSE) and Optical Security and Performance Products (OSP) units, plus the Network Instruments acquisition in 2014. Through an interoperable portfolio of cloud-enabled instruments and systems, software automation and services, Viavi delivers end-to-end visibility, intelligence and insight, for management of network, applications and services with greater precision.
11:35 - 11:55: Desktop Virtualization and Cloud Client-Computing from Dell
As organizations of all sizes rapidly adopt cloud-based Software-As-A-Service (SaaS) applications such as Office365, and are increasingly concerned about security vulnerabilities and costs associated with traditional laptops/desktops, there is significant interest in cloud client computing and thin client architecture.
Learn from Dell how you can quickly and affordably evolve to this simpler state of end point IT management. No matter what stage of desktop virtualization you're in, or what platform you prefer, Dell's fully customizable, end-to-end cloud client-computing solutions can help you realize a heightened level of security, speed and management, across Citrix, Microsoft, VMware and/or Dell-based platforms. During this informative talk, you'll gain practical insights on many subjects, such as how to securely deliver any app, to any user, on any device.
11:55 - 12:10: How to Control and Manage Macs in Windows-Heavy Environments from Parallels
Today's IT teams need practical solutions for controlling and managing Macs in their networks. In this session Parallels, the experts in Mac for Business, presents real-world guidance for supporting Macs in cross-platform environments. Some of the topics covered include a practical comparison of alternative solutions, results from Parallels' recent & extensive market research/study on "Macs in IT", and demonstrations of Parallels' Mac Management platform, which offers outstanding performance and usability. There will be case study examples, so attendees can learn how other IT pros tackled the growing challenge of managing Macs in Windows-heavy environments. If you need answers to any of your Mac-related questions, then this is the perfect session.
12:10 - 12:40: VMware's Networking and Security Platform, Integration with Palo Alto Networks
VMware NSX is the Network Virtualization and Security Platform for the Software-Defined Data Center (SDDC). By bringing the operational model of a virtual machine to your data center network, you can transform the economics of network and security operations. NSX lets you treat your physical network as a pool of transport capacity, with network and security services attached to VMs with a policy-driven approach.
Gabriel Maciel, one of VMware's top Cloud/Networking & Security experts, will share practical recommendations on the road to a completely Software Defined Enterprise (SDE), discuss these main components/features/benefits of NSX, and conclude with insights on integrating NSX with pure security platforms, such as those offered by Palo Alto, the leader in next-generation firewall architecture:
Agility and Streamlined Operations:
How you can deploy NSX non-disruptively on top of your existing physical infrastructure. Just as with server virtualization, NSX network virtualization lets you treat your physical network as a pool of transport capacity, with network and security services attached to workloads using a policy-driven approach.
- Reduce the time to provision multi-tier networking and security services from weeks to minutes by creating virtual networks. Each network is customizable for its supported workloads and isolated from all other virtual networks.
- Leverage a new operational approach to networking as you programmatically create, provision, snapshot, delete and restore complex software-based networks.
- Develop, test and deploy new applications faster by aligning network and security provisioning with compute and storage provisioning.
Security and Micro-segmentation:
NSX brings an SDDC approach to network security. Its network virtualization capabilities enable the three key functions of micro-segmentation: isolation (no communication across unrelated networks); segmentation (controlled communication within a network); and security with advanced services (tight integration with leading third-party security solutions). Key benefits with micro-segmentation:
- Network security inside the data center: Fine-grained policies enable firewall controls and advanced security down to the level of the virtual NIC.
- Automated security for speed and agility in the data center: Security policies are automatically applied when a virtual machine spins up, are moved when a virtual machine is migrated and are removed when a virtual machine is deprovisioned—eliminating the problem of stale firewall rules.
- Integration with the industry’s leading security products: NSX provides a platform for technology partners to bring their solutions to the SDDC. With NSX security tags, these solutions can adapt to constantly changing conditions in the data center for enhanced security.
Platform for Advanced Networking and Security Services:
Change in traditional networks can be slow and error-prone, making them poorly suited to the fluctuating demands of the data center. By contrast, you can configure virtual networks with NSX dynamically and automatically, adding new services—whether they are virtual or physical—as needed. NSX is the networking foundation for the SDDC, giving you the tools to:
- Integrate advanced functionality from leading vendors: The industry’s best providers of software and hardware for networking and security have integrated with NSX, making it possible to meet the demands of the most sophisticated data centers.
- Automate the delivery of network services: NSX allows cloud management platforms to automate the delivery of network services, eliminating the need to manually reconfigure physical network devices. You can then build advanced workflows to automate provisioning of networking and security, including switching, routing, firewalling, and load balancing.
- Bridge the physical and virtual parts of the data center: NSX enables you to connect your virtual networks to physical workloads and legacy VLANs. Products from VMware’s technology partners extend this capability to physical switches as well.
Full Hot Lunch (click here to see the delicious menu), Exhibit Area Open, Peer Networking, Product Demonstrations
1:40 - 2:00: Growing Risk from Insider Threats/Breaches, from Imperva
Data is an organization’s most valuable asset. In order to be effective, employees need access to company data. When internal users become compromised, are careless or carry out malicious activity, enterprise data is put significantly at risk. In the past year the majority of security professionals reported a rise in insider threats attributed mostly to insufficient data protection strategies.
During this informative session featuring Tim Chang of Imperva, you will:
- Become more informed on the rise of the insider threat problem
- Learn why insider threats are tough to detect, even when monitoring technologies are in place
- Understand what to look for in a solution
2:00 - 2:30: Microsoft: Big Data/Internet-of-Things (IOT) Analytics with Cortana
Amul Mago from Microsoft will discuss Cortana Analytics, a fully managed big data and advanced analytics suite that enables organizations of all sizes to transform data into intelligent action. Here are some of the specific topics covered durding this informative talk, on one of the top issues within IT:
- Analytics that enables action: Take action ahead of your competitors, by going beyond looking in the rear-view mirror to predicting what’s next.
- Perceptual intelligence: Get closer to your customers. Infer their needs through their interaction with natural user interfaces.
- Fast and flexible: Build with partner solutions for your industry to get going quickly and tailor to your specific needs.
- Secure and scalable: Get value from your data in a secure and scalable way regardless of its size and complexity.
- Personal digital assistant: Get things done with Cortana in more helpful, proactive, and natural ways.
End of Event, Raffle Prize Drawings for Gift Cards and other great items!
FAQs
What are Angelbeat's privacy and optin/optout policies
Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database.
However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors.
If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at rgerber@angelbeat.com.
Who is eligible to receive a free pass
There is no charge to attend for an end user IT professional who works in the telecom/IT/networking/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals, manufacturers, retailers, banks, financial services firms, insurers, real estate/construction/property management, insurance/brokerage agencies, pharmaceutical companies, law/accounting/consulting firms, trucking/transportation/logistic firms, etc. and use, support, purchase and/or are involved in or influence the purchase of products and services offered by our sponsors. If you are a government employee and have limitations/restrictions on your ability to attend free events, then please contact the Angelbeat team by clicking below. For instance, some individuals simply reimburse Angelbeat for the cost of the meals, to avoid any perception of conflict-of-interest.
All free attendees must be pre-approved in advance by Angelbeat and Angelbeat reserves the right to accept or reject a free pass request at its sole discretion. As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above who attend our events at no charge. If you fall in this category and would still like to attend then the fee is $300/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015. If you are a non-sponsoring vendor/integrator/consultant and would like to attend but avoid paying this $300 fee, then you must be accompanied by one of your clients who has not previously registered, and is a CIO, CISO or IT Director that meets the end user criteria above. Full-time reporters from major newspapers, websites, television and radio stations can attend as our guest, but again must be approved in advance.
If you do not meet the above criteria and still try to register, then you will receive an automatic reply/confirmation from Eventbrite. However you will shortly receive another email from Angelbeat, rejecting and cancelling your registration.
What are my transport/parking options getting to the event
Detailed driving directions will be sent out to all attendees one week before the event. The Harvard Club is located in mid-town, right off 5th Avenue, just a few blocks from Grand Central Station, and easily accessible from all subway and bus lines.
What is the dress code
Suggested dress is business casual. Jacket and tie are NOT required nor recommended.
What if you have special dietary needs/restrictions
If you have special dietary needs/restrictions, then please email Angelbeat below. We will do our best to accommodate any and all requests.