Sat, Aug 12, 2017 - 5:00 pm to 7:00 pm

Osceola Ballroom Lobby

Registration & Attendee Welcome Desk
 Download to your calendar 
Sat, Aug 12, 2017 - 5:30 pm to 6:30 pm

Osceola Ballroom A

Opening Remarks & Keynote: Cybersecurity Is Risk Management

This XChange University: IT Security keynote features Michael Echols, a senior cybersecurity expert who worked for the Department of Homeland Security working with public sector and industry. He was the point person for President Barack Obama's executive order to develop a national program for information sharing and analysis organizations. Echols will share his views on why cybersecurity is risk management for solution provider customers and how they need to build a strategy around cyber threat information sharing and risk reduction opportunities. Echols will offer details on the elements of building a secure environment for customers that includes disruption, teamwork, and how to create a culture of cybersecurity. Echols is a believer that customers must understand "employees are a greater part of the risk management process than the investment organizations make in them." In addition, Echols promotes using free government resources and insights about the challenges facing many organizations in today's battle against cyber criminals.

 Download to your calendar 
Sat, Aug 12, 2017 - 6:30 pm to 7:10 pm

Osceola Ballroom A

Security Keynote: The Next Evolution of Protection: Introduction To Deep Learning

Sophos has over 30 years of experience in creating an effective defense against ever-changing threats. One constant truth is that there is no silver bullet in security, solutions need to evolve to adapt the ever changing threat landscape.  In this presentation, we share what tools are needed and how to best protect customers, and introduce you to the latest techniques in machine learning.

 Download to your calendar 
Sat, Aug 12, 2017 - 7:15 pm to 8:45 pm

Old Hickory Steakhouse

Private Dinners

Juniper Networks   Tech Data

 Download to your calendar 
Sat, Aug 12, 2017 - 7:15 pm to 8:45 pm

Osceloa 1-2

Private Reception
 Download to your calendar 
Sun, Aug 13, 2017 - 7:45 am to 9:00 am

Osceola Ballroom Lobby

Registration
 Download to your calendar 
Sun, Aug 13, 2017 - 7:45 am to 8:30 am

Osceola Ballroom A

Networking Breakfast
 Download to your calendar 
Sun, Aug 13, 2017 - 8:30 am to 9:00 am

Osceola Ballroom A

Keynote: Current And Future State Of Cybersecurity: Lead, Follow Or Get Out Of The Way

Cybersecurity--it’s the one topic on every company’s mind. It also a market of growing importance to the channel as IT professionals take on the challenges of protecting their customers against increasing odds. This puts security-minded solution providers and their tech suppliers in a position to either lead the way turning their actions into profits and increased revenue or just go along for the ride. In this keynote, longtime NPD channel analyst Michael Diamond will share what IT security products and solutions are growing in the business-to-business channel and what solutions customers will need in the next few years. Demand is increasing rapidly as firms feverishly digitize their businesses in hopes of driving greater customer centricity, employee productivity and new products and services.  The session will also highlight which industry verticals, sub-verticals and company departments--based on the information they generate, analyze and store--have the greatest risk of being targeted by hackers and bad actors over the next few years

 Download to your calendar 
Sun, Aug 13, 2017 - 9:00 am to 9:15 am

Osceola Ballroom A

Security Briefing: File-Management Security In A Post-Mobile World

Mobility has forever changed the way customers interact with their files. That trend translates into numerous opportunities for solutions providers to work with customers  to select the best file-management tools to increase productivity and collaboration. There is a wide variety of tools available today. These numerous options introduce complexities in terms of access controls, data loss, compliance and even ransomware. In this session, leaders from Intermedia will discuss the risks of data loss introduced by popular file-management systems and ways solution providers can mitigate this risk while maximizing profitability. 

 Download to your calendar 
Sun, Aug 13, 2017 - 9:15 am to 9:30 am

Osceola Ballroom Lobby

Break
 Download to your calendar 
Sun, Aug 13, 2017 - 9:30 am to 10:00 am

Osceola Ballroom A

Keynote: Ransomware: A Customer’s Greatest IT Threat—How Solution Providers Can Prepare And Protect

Every day it seems like another ransomware attack is in the news. Just a few weeks ago, many businesses were locked out of their computer systems with hackers demanding $300 in Bitcoin ransom. There is no doubt that bad actors are taking advantage of outdated technology and holes in some Windows operating systems wreaking havoc on the customers of solution providers. This is causing unnecessary distractions and expenses. Ransomware has been around since 1989 but it has become an increasing lucrative business for cyber criminals with the most recent variants of ransomware having changed along with tactics for infection. Solution providers need to understand this ever-changing threat and what's around the corner if they are to secure their customers' IT systems and  instill confidence in them. The solution provider is on the front lines defending customers from ever more sophisticated attackers that can create malware faster, use anonymous digital currencies and leverage publicly available tools. In this session, solution providers will gain an understanding of the following: 

  • How fast this IT threat growing 
  • The latest ransomware viruses and how have infection tactics changed 
  • What kind of companies are malware developers targeting and why 
  • Why a customer who is once attacked is open for a repeat   
  • Best practices to immediately reduce risk of infection and how to quickly recover if infected 
  • The alternatives to paying ransom
 Download to your calendar 
Sun, Aug 13, 2017 - 10:00 am to 10:15 am

Osceola Ballroom A

Security Briefing: Build A Software-Defined Secure Network To Defend Your Business

The network has the power to deliver highly effective protection from today’s sophisticated and ever-evolving threat landscape. With a software-defined secure network (SDSN) from Juniper, businesses can benefit from unified defense across multivendor environments, private clouds and public clouds. Powered by automated remediation, real-time intelligence and machine learning, solution providers can build and manage a network for their customers that will know when and how to defend employees, data and infrastructure.

Juniper Networks

 Download to your calendar 
Sun, Aug 13, 2017 - 10:15 am to 10:45 am

Osceola Ballroom A

Keynote: Best Practices In Growing Your Security Business--Lessons Learned

This session focuses on best practices for solution providers looking to grow their security business from the perspective of someone who did just that.  Peter Streips, founder and president of Boston-based Network Security Group, will discuss how he started a VAR more than 12 years ago and grew it into a multi-million dollar business.  Streips will discuss best practices in a variety of topics including sales strategies, effectively investing marketing development funds, growing vendor and customer relationships, maintaining high renewal rates, and keeping your employees motivated and happy.

 Download to your calendar 
Sun, Aug 13, 2017 - 10:45 am to 11:00 am

Osceola Ballroom A

Break
 Download to your calendar 
Sun, Aug 13, 2017 - 11:00 am to 11:15 am

Osceola Ballroom A

Security Briefing: Developing A Best-in-class Security Practice

Tech Data has unveiled a new integrated Americas security practice designed to provide  the most comprehensive set of security solutions and capabilities in the industry. The integrated security business represents the winning combination of Tech Data's cutting-edge offerings doubling Tech Data's security-focused resources and offerings giving partners throughout the Americas the tools and expertise required to support their customers' expanding needs in this essential, rapidly evolving core technology.  Tech Data’s strategy is to help partners develop best-in-class solutions and tools to help them grow, protect and build their businesses. Tech Data's newly integrated security business includes a special focus on five key areas of security: endpoint, identity and access management, perimeter, data/application and security intelligence.

Tech Data

 Download to your calendar 
Sun, Aug 13, 2017 - 11:15 am to 11:45 am

Osceola Ballroom A

Keynote: Don't Put Your Eggs In One Basket: SSO Solutions And Best Practices

This session will feature a review and discussion of the OneLogin breach including a discussion of the SSO solutions and best practices. Solution providers should discourage their clients from using cloud-based single sign-on services. They are the digital equivalent of putting all of an organization's eggs in one basket. It can create a massive single point of failure. The OneLogin breach shows that other cloud-based SOO services are vulnerable too. It is a massive problem and disruptive for customers because they must now change the inner guts of their authentication systems creating lots of employee inconvnience.

 Download to your calendar 
Sat, Aug 12, 2017 - 5:00 pm to 7:00 pm

Osceola Ballroom Lobby

Registration & Attendee Welcome Desk
 Download to your calendar 
Sat, Aug 12, 2017 - 5:30 pm to 6:30 pm

Osceola Ballroom A

Opening Remarks & Keynote: Cybersecurity Is Risk Management

This XChange University: IT Security keynote features Michael Echols, a senior cybersecurity expert who worked for the Department of Homeland Security working with public sector and industry. He was the point person for President Barack Obama's executive order to develop a national program for information sharing and analysis organizations. Echols will share his views on why cybersecurity is risk management for solution provider customers and how they need to build a strategy around cyber threat information sharing and risk reduction opportunities. Echols will offer details on the elements of building a secure environment for customers that includes disruption, teamwork, and how to create a culture of cybersecurity. Echols is a believer that customers must understand "employees are a greater part of the risk management process than the investment organizations make in them." In addition, Echols promotes using free government resources and insights about the challenges facing many organizations in today's battle against cyber criminals.

 Download to your calendar 
Sat, Aug 12, 2017 - 6:30 pm to 7:10 pm

Osceola Ballroom A

Security Keynote: The Next Evolution of Protection: Introduction To Deep Learning

Sophos has over 30 years of experience in creating an effective defense against ever-changing threats. One constant truth is that there is no silver bullet in security, solutions need to evolve to adapt the ever changing threat landscape.  In this presentation, we share what tools are needed and how to best protect customers, and introduce you to the latest techniques in machine learning.

 Download to your calendar 
Sat, Aug 12, 2017 - 7:15 pm to 8:45 pm

Old Hickory Steakhouse

Private Dinners

Juniper Networks   Tech Data

 Download to your calendar 
Sat, Aug 12, 2017 - 7:15 pm to 8:45 pm

Osceloa 1-2

Private Reception
 Download to your calendar 
Sun, Aug 13, 2017 - 7:45 am to 9:00 am

Osceola Ballroom Lobby

Registration
 Download to your calendar 
Sun, Aug 13, 2017 - 7:45 am to 8:30 am

Osceola Ballroom A

Networking Breakfast
 Download to your calendar 
Sun, Aug 13, 2017 - 8:30 am to 9:00 am

Osceola Ballroom A

Keynote: Current And Future State Of Cybersecurity: Lead, Follow Or Get Out Of The Way

Cybersecurity--it’s the one topic on every company’s mind. It also a market of growing importance to the channel as IT professionals take on the challenges of protecting their customers against increasing odds. This puts security-minded solution providers and their tech suppliers in a position to either lead the way turning their actions into profits and increased revenue or just go along for the ride. In this keynote, longtime NPD channel analyst Michael Diamond will share what IT security products and solutions are growing in the business-to-business channel and what solutions customers will need in the next few years. Demand is increasing rapidly as firms feverishly digitize their businesses in hopes of driving greater customer centricity, employee productivity and new products and services.  The session will also highlight which industry verticals, sub-verticals and company departments--based on the information they generate, analyze and store--have the greatest risk of being targeted by hackers and bad actors over the next few years

 Download to your calendar 
Sun, Aug 13, 2017 - 9:00 am to 9:15 am

Osceola Ballroom A

Security Briefing: File-Management Security In A Post-Mobile World

Mobility has forever changed the way customers interact with their files. That trend translates into numerous opportunities for solutions providers to work with customers  to select the best file-management tools to increase productivity and collaboration. There is a wide variety of tools available today. These numerous options introduce complexities in terms of access controls, data loss, compliance and even ransomware. In this session, leaders from Intermedia will discuss the risks of data loss introduced by popular file-management systems and ways solution providers can mitigate this risk while maximizing profitability. 

 Download to your calendar 
Sun, Aug 13, 2017 - 9:15 am to 9:30 am

Osceola Ballroom Lobby

Break
 Download to your calendar 
Sun, Aug 13, 2017 - 9:30 am to 10:00 am

Osceola Ballroom A

Keynote: Ransomware: A Customer’s Greatest IT Threat—How Solution Providers Can Prepare And Protect

Every day it seems like another ransomware attack is in the news. Just a few weeks ago, many businesses were locked out of their computer systems with hackers demanding $300 in Bitcoin ransom. There is no doubt that bad actors are taking advantage of outdated technology and holes in some Windows operating systems wreaking havoc on the customers of solution providers. This is causing unnecessary distractions and expenses. Ransomware has been around since 1989 but it has become an increasing lucrative business for cyber criminals with the most recent variants of ransomware having changed along with tactics for infection. Solution providers need to understand this ever-changing threat and what's around the corner if they are to secure their customers' IT systems and  instill confidence in them. The solution provider is on the front lines defending customers from ever more sophisticated attackers that can create malware faster, use anonymous digital currencies and leverage publicly available tools. In this session, solution providers will gain an understanding of the following: 

  • How fast this IT threat growing 
  • The latest ransomware viruses and how have infection tactics changed 
  • What kind of companies are malware developers targeting and why 
  • Why a customer who is once attacked is open for a repeat   
  • Best practices to immediately reduce risk of infection and how to quickly recover if infected 
  • The alternatives to paying ransom
 Download to your calendar 
Sun, Aug 13, 2017 - 10:00 am to 10:15 am

Osceola Ballroom A

Security Briefing: Build A Software-Defined Secure Network To Defend Your Business

The network has the power to deliver highly effective protection from today’s sophisticated and ever-evolving threat landscape. With a software-defined secure network (SDSN) from Juniper, businesses can benefit from unified defense across multivendor environments, private clouds and public clouds. Powered by automated remediation, real-time intelligence and machine learning, solution providers can build and manage a network for their customers that will know when and how to defend employees, data and infrastructure.

Juniper Networks

 Download to your calendar 
Sun, Aug 13, 2017 - 10:15 am to 10:45 am

Osceola Ballroom A

Keynote: Best Practices In Growing Your Security Business--Lessons Learned

This session focuses on best practices for solution providers looking to grow their security business from the perspective of someone who did just that.  Peter Streips, founder and president of Boston-based Network Security Group, will discuss how he started a VAR more than 12 years ago and grew it into a multi-million dollar business.  Streips will discuss best practices in a variety of topics including sales strategies, effectively investing marketing development funds, growing vendor and customer relationships, maintaining high renewal rates, and keeping your employees motivated and happy.

 Download to your calendar 
Sun, Aug 13, 2017 - 10:45 am to 11:00 am

Osceola Ballroom A

Break
 Download to your calendar 
Sun, Aug 13, 2017 - 11:00 am to 11:15 am

Osceola Ballroom A

Security Briefing: Developing A Best-in-class Security Practice

Tech Data has unveiled a new integrated Americas security practice designed to provide  the most comprehensive set of security solutions and capabilities in the industry. The integrated security business represents the winning combination of Tech Data's cutting-edge offerings doubling Tech Data's security-focused resources and offerings giving partners throughout the Americas the tools and expertise required to support their customers' expanding needs in this essential, rapidly evolving core technology.  Tech Data’s strategy is to help partners develop best-in-class solutions and tools to help them grow, protect and build their businesses. Tech Data's newly integrated security business includes a special focus on five key areas of security: endpoint, identity and access management, perimeter, data/application and security intelligence.

Tech Data

 Download to your calendar 
Sun, Aug 13, 2017 - 11:15 am to 11:45 am

Osceola Ballroom A

Keynote: Don't Put Your Eggs In One Basket: SSO Solutions And Best Practices

This session will feature a review and discussion of the OneLogin breach including a discussion of the SSO solutions and best practices. Solution providers should discourage their clients from using cloud-based single sign-on services. They are the digital equivalent of putting all of an organization's eggs in one basket. It can create a massive single point of failure. The OneLogin breach shows that other cloud-based SOO services are vulnerable too. It is a massive problem and disruptive for customers because they must now change the inner guts of their authentication systems creating lots of employee inconvnience.

 Download to your calendar 

Be A Speaker

The Channel Company strives to deliver events rich in content to our audiences. We are always interested in learning about prospective speakers ─ industry experts, inspirational leaders and individuals with unique perspectives ─ for our events. If you would like to be considered, please complete and submit a form to tell us a little about yourself and what you would like to present.