security_university_banner_mes_spring_2017-01.png
mes_security_university_audience_full_banner_2017-01.png
Date
May 3, 2017
Location
Nashville, TN
Wed, May 3, 2017 - 8:00 am to 9:00 am

Hermitage D

Registration and Continental Breakfast
 Download to your calendar 
Wed, May 3, 2017 - 9:00 am to 9:45 am

Hermitage C

Keynote: Security as a Key Component of Every Business Decision

Business leaders know all too well that companies can suffer significant losses from cyber attacks. However, many CIOs are still finding themselves in the position of educating their senior leadership team as to the necessity of putting security at the forefront of every business decision. Security is not just an IT issue, it must be a central component of every organizational initiative, on every level.  The IT leaders' typical ammunition seems to consist of technical explanations, that senior management doesn't quite understand and some frightening scenarios they don't completely believe. They key to success is presenting arguments that business (executive, financial and operational) leaders will find convincing. This talk will outline ways IT leaders can address this gap, and present cyber security needs in terms of quantitative financial risk.

 Download to your calendar 
Wed, May 3, 2017 - 9:45 am to 10:00 am

Hermitage C

End Point Solutions For The Midmarket

FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 5,000 customers across 67 countries, including more than 940 of the Forbes Global 2000.

 Download to your calendar 
Wed, May 3, 2017 - 10:00 am to 10:45 am

Hermitage C

The Human Side of Security Architecture

Hear a frank discussion about the core of security architecture often lost in a CIO’s strategy--humans. During this session, David Carter of Encore Technology Group will demonstrate the need for a comprehensive understanding of the people side of a security architecture. Carter will also show how a simplified architecture can survive all the technologies IT and line of business throw at it. He will also share how Encore’s broad customer base budgets for the human side of security architecture and justifies those costs to the executive suite. The key to developing this architecture is for CIOs to keep user productivity front and center.

 Download to your calendar 
Wed, May 3, 2017 - 10:45 am to 11:00 am

Hermitage D

Networking Break & Table Tops
 Download to your calendar 
Wed, May 3, 2017 - 11:00 am to 11:15 am

Hermitage C

The Evolving Threat Landscape, What We See

Everything worth doing involves some degree of risk, and this is especially true when it comes to commerce. Fortinet, utilizing its position as the world leader in installed security devices, has analyzed real-world threat data from around the globe, and the resulting Threat Landscape Report advises customers on the latest threats and risks. Attendees will be guided through these threats, and come away with practical approaches to addressing them.

Sponsored by:

 Download to your calendar 
Wed, May 3, 2017 - 11:15 am to 11:25 am

Hermitage C

Defeating Unknown Threats With Machine Learning

Learn more about Bitdefender in this engaging interview.

Sponsored by:

 

 

 Download to your calendar 
Wed, May 3, 2017 - 11:30 am to 12:15 pm

Hermitage C

Making Progress Priority #1: Tips to Accelerate Security Efforts in Any Organizations

A couple years ago the emphasis for most organizations was on simply starting security efforts to just do something. Nowadays, with attacks unabating, organizations need to not only do something, but must make specific measured progress through the development and operation of a healthy security program.

This interactive session will provide actionable techniques to implement exactly this type of system. One that can measure current state, establish what future state should look like with the plan to get there, and then to execute.  This session is designed for any midmarket organization, with the goal of providing actionable ideas and techniques that participants can bring from the session.

 Download to your calendar 
Wed, May 3, 2017 - 12:15 pm to 1:15 pm

Hermitage D

Networking Lunch and Table Tops
 Download to your calendar 
Wed, May 3, 2017 - 8:00 am to 9:00 am

Hermitage D

Registration and Continental Breakfast
 Download to your calendar 
Wed, May 3, 2017 - 9:00 am to 9:45 am

Hermitage C

Keynote: Security as a Key Component of Every Business Decision

Business leaders know all too well that companies can suffer significant losses from cyber attacks. However, many CIOs are still finding themselves in the position of educating their senior leadership team as to the necessity of putting security at the forefront of every business decision. Security is not just an IT issue, it must be a central component of every organizational initiative, on every level.  The IT leaders' typical ammunition seems to consist of technical explanations, that senior management doesn't quite understand and some frightening scenarios they don't completely believe. They key to success is presenting arguments that business (executive, financial and operational) leaders will find convincing. This talk will outline ways IT leaders can address this gap, and present cyber security needs in terms of quantitative financial risk.

 Download to your calendar 
Wed, May 3, 2017 - 9:45 am to 10:00 am

Hermitage C

End Point Solutions For The Midmarket

FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 5,000 customers across 67 countries, including more than 940 of the Forbes Global 2000.

 Download to your calendar 
Wed, May 3, 2017 - 10:00 am to 10:45 am

Hermitage C

The Human Side of Security Architecture

Hear a frank discussion about the core of security architecture often lost in a CIO’s strategy--humans. During this session, David Carter of Encore Technology Group will demonstrate the need for a comprehensive understanding of the people side of a security architecture. Carter will also show how a simplified architecture can survive all the technologies IT and line of business throw at it. He will also share how Encore’s broad customer base budgets for the human side of security architecture and justifies those costs to the executive suite. The key to developing this architecture is for CIOs to keep user productivity front and center.

 Download to your calendar 
Wed, May 3, 2017 - 10:45 am to 11:00 am

Hermitage D

Networking Break & Table Tops
 Download to your calendar 
Wed, May 3, 2017 - 11:00 am to 11:15 am

Hermitage C

The Evolving Threat Landscape, What We See

Everything worth doing involves some degree of risk, and this is especially true when it comes to commerce. Fortinet, utilizing its position as the world leader in installed security devices, has analyzed real-world threat data from around the globe, and the resulting Threat Landscape Report advises customers on the latest threats and risks. Attendees will be guided through these threats, and come away with practical approaches to addressing them.

Sponsored by:

 Download to your calendar 
Wed, May 3, 2017 - 11:15 am to 11:25 am

Hermitage C

Defeating Unknown Threats With Machine Learning

Learn more about Bitdefender in this engaging interview.

Sponsored by:

 

 

 Download to your calendar 
Wed, May 3, 2017 - 11:30 am to 12:15 pm

Hermitage C

Making Progress Priority #1: Tips to Accelerate Security Efforts in Any Organizations

A couple years ago the emphasis for most organizations was on simply starting security efforts to just do something. Nowadays, with attacks unabating, organizations need to not only do something, but must make specific measured progress through the development and operation of a healthy security program.

This interactive session will provide actionable techniques to implement exactly this type of system. One that can measure current state, establish what future state should look like with the plan to get there, and then to execute.  This session is designed for any midmarket organization, with the goal of providing actionable ideas and techniques that participants can bring from the session.

 Download to your calendar 
Wed, May 3, 2017 - 12:15 pm to 1:15 pm

Hermitage D

Networking Lunch and Table Tops
 Download to your calendar 

Be A Speaker

The Channel Company strives to deliver events rich in content to our audiences. We are always interested in learning about prospective speakers ─ industry experts, inspirational leaders and individuals with unique perspectives ─ for our events. If you would like to be considered, please complete and submit a form to tell us a little about yourself and what you would like to present.