
Providence Feb 10
Date and time
Description
Program Description:
This comprehensive seminar covers the increasingly related topics of security/compliance, network infrastructure, storage/backup and private/public/hybrid cloud, plus a special discussion from RSA on encryption and a preview of the upcoming RSA Conference. There are expert speakers from Microsoft, VMware and many more technology leaders - scroll down to see the fantastic agenda and click on links to see speakers' biographies - who deliver concise, technical, educational and complementary talks.
Content is pre-approved by Angelbeat and past attendees to maximize learning; click here to download presentation guidelines that are followed by all speakers, which makes the program so worthwhile for IT Directors, Security Analysts, Enterprise Architects, Network & System Administrators, Data Center/Storage/Infrastructure Managers, CISO/CIO's, etc.
Join your peers from Citizens Bank, FM Global, MassMutual, University of Rhode Island, Johnson & Wales, RDIS, Providence College, Naval War College, Collette Vacations, Advent, PURVIS, Xerox, Coastway, Paolino Properties, Providence Equity, Patridge Snow & Hahn, S&S, City of Warwick, City of New Bedford, Care of New England, Lifespan, Dentaquest and many other major employers who are confirmed attendees.
As one Walmart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, "Thanks for hosting a very informative meeting with vendors that tied in well; it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace."
Every attendee receives meals including a full hot lunch (click here to see the delicious menu), complimentary self-parking (the Hilton is conveniently right off 95) and Wi-Fi, plus 4 CPE credit hours towards your CISSP or other certification. There are drawings for gift cards, an Amazon Fire TV Stick and other prizes at the end.
7:30 - 8:40: Registration, Hot Breakfast, Exhibit Area Open, Peer Networking, Product Demonstrations
8:40 - 9:00: Insiders are the New Malware with Varonis
Nearly every major security breach starts with an insider, or an attacker using an insider’s credentials. It’s estimated that the average organization suffered from 3.8 insider attacks last year. And even more troubling is that 45% of businesses can’t tell if they’ve suffered a breach.
To combat the insider threat, organizations need to shift their focus from the perimeter to their data itself. They need to secure their data from the inside out.
During this informative session, you’ll learn about the 3-phase, Inside-Out Varonis approach for preventing insider threats.
9:00 - 9:20: Top Five Tips for Educating Employees about Cybersecurity with Kaspersky
Corporate cybercrime is usually blamed on outsiders, but sometimes employees can represent the biggest threat to your organization’s IT security. In his presentation, Kaspersky’s Mark Villinski will provide practical advice for educating your employees about cybersecurity, covering topics including:
- How to create efficient and effective security policies
- Overview and statistics of the current threat landscape
- The importance of keeping your employees updated about the latest threats and scams
- Security solutions that can help keep your systems updated and protected
Kaspersky is the world's largest privately held, and among the top four security vendors, operating in 200 countries and protecting 400 million users.
9:20 - 9:40: Unified Identity Services across data center, cloud and mobile with Centrify
Centrify strengthens enterprise security by managing and securing user identities from cyber threats. As organizations expand IT resources and teams beyond their premises, identity is becoming the new security perimeter. With its platform of integrated software and cloud-based services, Centrify uniquely secures and unifies identity for both privileged and end users across today’s hybrid IT world of cloud, mobile and data center. The result is stronger security and compliance, improved business agility and enhanced user productivity through single sign-on. Over 5000 customers, including half of the Fortune 50 and over 80 federal agencies, leverage Centrify to secure their identity management.
9:40 - 10:00: Making the Cloud Safe for Hosted Email and Mission-Critical Business Applications with Barracuda and Custom
Email is one of the most essential tools your business has in its arsenal. Many companies are migrating to a cloud-based email platform and enjoying the convenience of easy access to email and reduced overhead. But trusting your most important data to the cloud raises new concerns about security, compliance and data protection.
Protecting your company’s data requires careful and strategic planning. A solid security plan will include protection against all of the threats associated with web-based email, demonstrate compliance and retention if emails are stored in the same production environment, and protect against human-caused data loss.
Discover peace of mind and complete protection when Barracuda and their partner, Custom Computer Specialists discuss how multi-layer security, archiving and back-up solutions allows organizations to prepare, migrate and operate more efficiently. Barracuda/Custom will also raffle an Amazon Fire TV Stick at the end of the conference.
10:00 - 10:20: Top Ten Checklist for Securing Your Network with Accelops:
Anthem, Sony, JP Morgan Chase, Target … Seemingly every day, another large and sophisticated company suffers a major security breach. In this era of DevOps, software-defined everything, and the Internet of Things, current security tools are increasingly vulnerable and (as these examples demonstrate) cannot prevent attacks by sophisticated hackers. There is hope however….. During this session featuring Accelops, organizations of all sizes will learn how to prevent data center attacks and improve overall network/infrastructure performance by:
- Cross-correlating security and performance events
- Using synthetic transactions to proactively monitor business services
- Creating baselines using machine learning to automate remediation
- Using auto-remediation to correct known errors
- Mapping hardware and software to your business services
Coffee/Refreshment Break, Product Demonstrations, Exhibit Area Open, Peer Interaction
11:00 - 11:20: Data Center Architecture and Data Governance/Management, with Veritas and ConRes
Veritas software and hardware products enable 86 percent of the world’s Fortune 500 companies to protect, identify, and manage data within the world’s largest and most complex environments—from traditional data centers to private, public, and hybrid clouds. Veritas helps enterprises address information management challenges with a complete, organized product strategy and roadmap focused on their needs. Its backup and recovery, business continuity, software-defined storage, and information governance products help keep businesses up and running so they can focus on what they do best.
Unchecked data growth is an expensive burden—and a potential security risk. With a majority of the world’s enterprise data holding no legal, regulatory, or business value, the cost in time, money, and resources to store and manage it is staggering. But how do companies separate the valuable from the volume? Veritas solutions help them identify the needles of high-value information buried deep inside every corporate data haystack. Its approach to helping companies defy the data deluge is governed by three beliefs: Not all data is created equal. Infrastructure availability does not equal business uptime. Know what data you have, keep only the data you need. The majority of target-rich data, housed in general IT systems and metadata, is information that Veritas already touches with backup, archive, and storage management solutions. As such Veritas is uniquely positioned to bring these pieces together, to provide organizations with access to information that drives informed decision-making.
11:20 - 11:40 Flash Storage with Reduxio
Reduxio enterprise hybrid storage array gives customers of all sizes the freedom to do with their data what they need to do, when they need to, safely, reliably and with blinding speed. Its systems deliver all-flash performance at the cost of disk-based systems, providing the first-ever built-in data protection that allows to-the-second recovery without upfront administration.
11:40 - 12:00: Office365 Deployment Recommendations with Versatile
Office365 is rapidly replacing, if not eliminating, desktop installations of Office, as this cloud-based platform provides much greater flexibility to an increasingly mobile workforce. Versatile, a key strategic partner of Microsoft, will discuss a four-part strategy for successfully deploying Office365:
1. Start with a deep understanding of the business goals and people challenges.
2. Provide a solution that people love and gets things done more effectively.
3. Create a strategy to drive adoption.
4. Establish benchmarks, key performance indicators, and success stories.
12:00 - 12:30: Microsoft: Windows 10 Built-in Cyber Threat Resistance/Protection, Plus Azure Cloud Platform
The number of new malware threats released every day is staggering. These threats are real, malicious and increasingly sophisticated. Traditional threat resistance based on detection has become a losing battle. IT needs a new approach to better protect corporate assets.
Dan Stolts, a top Microsoft desktop/cloud/security evangelist, will first discuss the new security features/capabilties that are designed into Windows 10, plus highlight its new approach to fundamentally secure computing resources. He will demonstrate the ability to authenticate a user with biometrics and hardware-based security, plus how to enroll a device to a domain via cloud, all through Windows 10.
Dan will then discuss Azure, Microsoft's open and flexible cloud platform. Any developer or IT professional can be productive with Azure. Its integrated tools, pre-built templates and managed services make it easier to build and manage enterprise, mobile, Web and Internet of Things (IoT) applications faster, across a global network of Microsoft-managed datacenters, using skills you already have and technologies you already know. Here are its top features:
- Private/Public/Hybrid Cloud Architecture Support: Some cloud providers make you choose between your datacenter and the cloud. Not Azure, which easily integrates with your existing IT environment through the largest network of secure private connections, hybrid database and storage solutions, and data residency and encryption features - your assets can stay right where you need them. You can even run Azure in your own datacenter with Azure Stack. Azure hybrid cloud solutions give you the best of both worlds: more IT options, less complexity and cost.
- Open, Flexible, Reliable and Proven: Azure supports the broadest selection of operating systems, programming languages, frameworks, tools, databases and devices. Run Linux containers with Docker integration; build apps with JavaScript, Python, .NET, PHP, Java and Node.js; build back-ends for iOS, Android and Windows devices. Azure supports the same technologies millions of developers and IT professionals already rely on and trust, from small dev-test projects to global product launches. More than 57 percent of Fortune 500 companies use Azure, which offers enterprise grade SLAs on services, 24/7 tech support, and round-the-clock service health monitoring.
- Scalability/Pay-As-You-Go/Grow: Azure’s pay-as-you-go services can quickly scale up or down to match demand, so you only pay for what you use. Per-minute billing and a commitment to match competitor prices for popular infrastructure services like compute, storage and bandwidth mean you’re always getting unbeatable price for performance.
- Security/Compliance/Data Protection: Microsoft recognizes that some organizations are still wary of the cloud. That’s why Microsoft has made an industry-leading commitment to the protection and privacy of your data. Microsoft was the first cloud provider recognized by the European Union’s data protection authorities for its commitment to rigorous EU privacy laws, plus the first to adopt the new international cloud privacy standard, ISO 27018. There is Azure Government, a stand-alone version of Azure designed to meet the rigorous compliance requirements of U.S. government agencies.
- Run your apps anywhere: Azure runs on a worldwide network of Microsoft-managed datacenters across 22 regions—more countries and regions than Amazon Web Services and Google Cloud combined. This fast-growing global footprint gives you lots of options for running applications and ensuring great customer performance. Azure is also the first multinational cloud provider in mainland China.
- Big Data/Analytics Support: Azure’s predictive analytics services, including machine learning, cortana analytics and stream analytics, are redefining business intelligence. Make smarter decisions, improve customer service and uncover new business possibilities from your structured, unstructured and streaming Internet of Things data.
Full Hot Lunch (click here to see the delicious menu), Exhibit Area Open, Peer Networking, Product Demonstrations
RSA Lunchtime Keynote on The Encryption Debate - IT Security/Privacy vs National Security - Plus a Preview of the RSA Conference
Who could have imagined that encryption is emerging as one of the top issues in the 2016 Presidential Election? Organizations of all sizes must continually upgrade their IT security, to protect/encrypt confidential data that is under attack by a highly sophisticated hacker community. Yet government agencies are increasingly asking for "backdoor" access, that will decrypt data and allow them to identify/prevent terrorist attacks. Is it possible to have a safe backdoor program, that will not weaken privacy, satisfy all applicable laws, and ensure that another Marathon bombing never happens?
Learn from RSA Director of Technology Solutions Marketing Robert Sadowski on the future of encryption, and how the tension between IT and National Security objectives might affect your security/compliance and overall IT infrastructure strategy. Robert will also provide a preview of next month's RSA Conference.
1:45 - 2:15: VMware's One Cloud, Any Application, Any Device Architecture, built on Software Defined Data Center
VMware’s One Cloud, Any Application, Any Device architecture enables customers to rapidly develop, automatically deliver, and safely consume all applications. Built on the foundation of the Software-Defined Data Center (SDDC) - which fully automates the virtualized infrastructure of compute, storage, networking and security - this software-defined approach enables customers to implement unified hybrid cloud and fully realized business mobility.
Steve DiRienzo, one of VMware's top cloud/SDDC expert, will share practical recommendations on the road to a completely Software Defined Enterprise (SDE), plus discuss these main components/features/benefits of SDDC:
- Data center virtualization, standardization and consolidation: Dramatically reduce capital and operational expenditures while bringing hardware choice, flexibility and extensibility to the hybrid cloud. Support traditional and new application types such as big data and mobile. Extend to the hybrid cloud, with unit costs equal to or lower than public cloud, so capital expenses can be reduced up to 70 percent.
- Streamlined and automated data center operations: Increase operational control while optimizing and improving infrastructure performance, capacity, health and costs. Leverage third-party data integration, proactive analysis and smart alerts to monitor performance plus improve insight and response. Extend its intelligent operations management console across physical, virtual and cloud infrastructures, covering vSphere, Hyper-V, OpenStack, Amazon Web Services and physical hardware. Leverage predictive analytics to correlate data from applications to storage, leading to policy-based automation and improved data center performance, health and capacity management.
- Security controls native to infrastructure. Tie network and security services to specific workloads, since SDDC is based on virtualization of layers 2 to 7. Enable micro-segmentation and more granular control of security settings at the infrastructure level.
- Hardware and hypervisor agnostic network virtualization. Provide maximum flexibility to capitalize on existing network infrastructure investments and improve the ratio of security to level of effort.
- High availability and resilient infrastructure. Protect all data and apps, across the data center and any platform, to guarantee business continuity and ensure regulatory compliance, through a hardware-agnostic platform. Automate application recovery through flexible policy enforcement to achieve high availability locally and disaster recovery across sites or to the hybrid cloud. Extend protection to all virtualized apps in the data center.
- Application and infrastructure delivery automation Deliver infrastructure, plus traditional and new applications, in minutes across private and public infrastructures, while being hardware, hypervisor and cloud platform agnostic. Build a true self-service hybrid cloud that instantly scales up or down based on business needs.
End of Event, Raffle Prize Drawings for Gift Cards and other great items!
FAQs
What are Angelbeat's privacy and optin/optout policies
Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database.
However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors.
If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at rgerber@angelbeat.com.
Who is eligible to receive a free pass
There is no charge to attend for an end user IT professional who works in the telecom/IT/networking/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals, manufacturers, retailers, banks, financial services firms, insurers, real estate/construction/property management, insurance/brokerage agencies, pharmaceutical companies, law/accounting/consulting firms, trucking/transportation/logistic firms, etc. and use, support, purchase and/or are involved in or influence the purchase of products and services offered by our sponsors. Systems integrators and consultants who attend with or are representing their enterprise clients are also eligible to receive a free pass. Full-time reporters from major newspapers, websites, television and radio stations can also attend as our guest. If you are a government employee and have limitations/restrictions on your ability to attend free events, then please contact the Angelbeat team by clicking below. For instance, some individuals simply reimburse Angelbeat for the cost of the meals, to avoid any perception of conflict-of-interest.
As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above who attend our events at no charge. If you fall in this category and would still like to attend then the fee is $300/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015.
All free attendees must be pre-approved in advance by Angelbeat and Angelbeat reserves the right to accept or reject a free pass request at its discretion. If you do not meet the above criteria and still try to register, then you will receive an automatic reply/confirmation from Eventbrite. However you will shortly receive another email from Angelbeat, rejecting and cancelling your registration.
What are my transport/parking options getting to the event
Detailed driving directions will be sent out to all attendees one week before the event. There is complimentary self parking.
What is the dress code
Suggested dress is business casual.
What if you have special dietary needs/restrictions
If you have special dietary needs/restrictions, then please email Angelbeat below. We will do our best to accommodate any and all requests.