Wed, May 3, 2017 - 8:00 am to 9:00 am Hermitage D |
Registration and Continental Breakfast
Download to your calendar
|
Wed, May 3, 2017 - 9:00 am to 9:45 am Hermitage C |
Keynote: Security as a Key Component of Every Business Decision Business leaders know all too well that companies can suffer significant losses from cyber attacks. However, many CIOs are still finding themselves in the position of educating their senior leadership team as to the necessity of putting security at the forefront of every business decision. Security is not just an IT issue, it must be a central component of every organizational initiative, on every level. The IT leaders' typical ammunition seems to consist of technical explanations, that senior management doesn't quite understand and some frightening scenarios they don't completely believe. They key to success is presenting arguments that business (executive, financial and operational) leaders will find convincing. This talk will outline ways IT leaders can address this gap, and present cyber security needs in terms of quantitative financial risk. Download to your calendar
|
Wed, May 3, 2017 - 9:45 am to 10:00 am Hermitage C |
End Point Solutions For The Midmarket FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 5,000 customers across 67 countries, including more than 940 of the Forbes Global 2000.
Download to your calendar
|
Wed, May 3, 2017 - 10:00 am to 10:45 am Hermitage C |
The Human Side of Security Architecture Hear a frank discussion about the core of security architecture often lost in a CIO’s strategy--humans. During this session, David Carter of Encore Technology Group will demonstrate the need for a comprehensive understanding of the people side of a security architecture. Carter will also show how a simplified architecture can survive all the technologies IT and line of business throw at it. He will also share how Encore’s broad customer base budgets for the human side of security architecture and justifies those costs to the executive suite. The key to developing this architecture is for CIOs to keep user productivity front and center. Download to your calendar
|
Wed, May 3, 2017 - 10:45 am to 11:00 am Hermitage D |
Networking Break & Table Tops
Download to your calendar
|
Wed, May 3, 2017 - 11:00 am to 11:15 am Hermitage C |
The Evolving Threat Landscape, What We See Everything worth doing involves some degree of risk, and this is especially true when it comes to commerce. Fortinet, utilizing its position as the world leader in installed security devices, has analyzed real-world threat data from around the globe, and the resulting Threat Landscape Report advises customers on the latest threats and risks. Attendees will be guided through these threats, and come away with practical approaches to addressing them. Sponsored by:
Download to your calendar
|
Wed, May 3, 2017 - 11:15 am to 11:25 am Hermitage C |
Defeating Unknown Threats With Machine Learning Learn more about Bitdefender in this engaging interview. Sponsored by:
Download to your calendar
|
Wed, May 3, 2017 - 11:30 am to 12:15 pm Hermitage C |
Making Progress Priority #1: Tips to Accelerate Security Efforts in Any Organizations A couple years ago the emphasis for most organizations was on simply starting security efforts to just do something. Nowadays, with attacks unabating, organizations need to not only do something, but must make specific measured progress through the development and operation of a healthy security program. This interactive session will provide actionable techniques to implement exactly this type of system. One that can measure current state, establish what future state should look like with the plan to get there, and then to execute. This session is designed for any midmarket organization, with the goal of providing actionable ideas and techniques that participants can bring from the session. Download to your calendar
|
Wed, May 3, 2017 - 12:15 pm to 1:15 pm Hermitage D |
Networking Lunch and Table Tops
Download to your calendar
|
Wed, May 3, 2017 - 8:00 am to 9:00 am Hermitage D |
Registration and Continental Breakfast
Download to your calendar
|
Wed, May 3, 2017 - 9:00 am to 9:45 am Hermitage C |
Keynote: Security as a Key Component of Every Business Decision Business leaders know all too well that companies can suffer significant losses from cyber attacks. However, many CIOs are still finding themselves in the position of educating their senior leadership team as to the necessity of putting security at the forefront of every business decision. Security is not just an IT issue, it must be a central component of every organizational initiative, on every level. The IT leaders' typical ammunition seems to consist of technical explanations, that senior management doesn't quite understand and some frightening scenarios they don't completely believe. They key to success is presenting arguments that business (executive, financial and operational) leaders will find convincing. This talk will outline ways IT leaders can address this gap, and present cyber security needs in terms of quantitative financial risk. Download to your calendar
|
Wed, May 3, 2017 - 9:45 am to 10:00 am Hermitage C |
End Point Solutions For The Midmarket FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 5,000 customers across 67 countries, including more than 940 of the Forbes Global 2000.
Download to your calendar
|
Wed, May 3, 2017 - 10:00 am to 10:45 am Hermitage C |
The Human Side of Security Architecture Hear a frank discussion about the core of security architecture often lost in a CIO’s strategy--humans. During this session, David Carter of Encore Technology Group will demonstrate the need for a comprehensive understanding of the people side of a security architecture. Carter will also show how a simplified architecture can survive all the technologies IT and line of business throw at it. He will also share how Encore’s broad customer base budgets for the human side of security architecture and justifies those costs to the executive suite. The key to developing this architecture is for CIOs to keep user productivity front and center. Download to your calendar
|
Wed, May 3, 2017 - 10:45 am to 11:00 am Hermitage D |
Networking Break & Table Tops
Download to your calendar
|
Wed, May 3, 2017 - 11:00 am to 11:15 am Hermitage C |
The Evolving Threat Landscape, What We See Everything worth doing involves some degree of risk, and this is especially true when it comes to commerce. Fortinet, utilizing its position as the world leader in installed security devices, has analyzed real-world threat data from around the globe, and the resulting Threat Landscape Report advises customers on the latest threats and risks. Attendees will be guided through these threats, and come away with practical approaches to addressing them. Sponsored by:
Download to your calendar
|
Wed, May 3, 2017 - 11:15 am to 11:25 am Hermitage C |
Defeating Unknown Threats With Machine Learning Learn more about Bitdefender in this engaging interview. Sponsored by:
Download to your calendar
|
Wed, May 3, 2017 - 11:30 am to 12:15 pm Hermitage C |
Making Progress Priority #1: Tips to Accelerate Security Efforts in Any Organizations A couple years ago the emphasis for most organizations was on simply starting security efforts to just do something. Nowadays, with attacks unabating, organizations need to not only do something, but must make specific measured progress through the development and operation of a healthy security program. This interactive session will provide actionable techniques to implement exactly this type of system. One that can measure current state, establish what future state should look like with the plan to get there, and then to execute. This session is designed for any midmarket organization, with the goal of providing actionable ideas and techniques that participants can bring from the session. Download to your calendar
|
Wed, May 3, 2017 - 12:15 pm to 1:15 pm Hermitage D |
Networking Lunch and Table Tops
Download to your calendar
|
The Channel Company strives to deliver events rich in content to our audiences. We are always interested in learning about prospective speakers ─ industry experts, inspirational leaders and individuals with unique perspectives ─ for our events. If you would like to be considered, please complete and submit a form to tell us a little about yourself and what you would like to present.