Join SecureWorld, Gigamon, and partners as we bring you an educational online summit on today's hybrid infrastructure—taking you from complexity to confidence.
This free, half-day event will cover what you and your organization need to know about managing network and cloud security in a hybrid environment. Our industry experts will place special emphasis on cybersecurity best practices and scaling for efficiency and cost savings. Get the playbook, know the playbook, and then execute it for success!
Attendees are eligible to receive 4 CPE credits.
12:00 PM EDT / 9:00 AM PDT
Ransomware: Today's Cyber Weapon of Choice
This year, ransomware groups have gone after it all: the fuel supply chain, the meat supply chain, the IT management supply chain. They have also targeted many other organizations. We can no longer think of these as individual cyberattacks. Instead, Col. Leighton says we must think of them as a broader strategy that our digital adversaries use against us. And they are leveraging multiple attack vectors to do so. Join this keynote to look at the actors, the motivations, and the steps both governments and private industry might take to mitigate risk from today's cyber weapon of choice.
Colonel Cedric Leighton |
Breakout Session #1 | 12:45 PM EDT / 9:45 AM PDT
Find and Fix Your Security Blind Spot
With rapid digital transformation, IT teams have been overwhelmed with broader and new attack surfaces. To add to this hurdle, enterprise mobility and shadow IT (or remote workforce) contribute to security blind spots. To have a strong security posture, you need to have a complete view of your network, tools, and the users. Is it possible to mitigate this problem? Yes.
|
|
|
Breakout Session #2 | 1:30 PM EDT / 10:30 AM PDT
Security Starts with Visibility: A 7-Step Implementation Plan
Delivering security in the cyber-physical era. Learn the nature and reason for the need for cloud-to-ground visibility and network control in the hyper-converged IoT world of digital business. We will explore the cause and effect of hyper convergence and some industry examples of how and why cloud-to-ground is used. Finally, leaving you with seven steps to implement a convergence plan in your enterprise.
|
|
|
Breakout Session #3 | 2:30 PM EDT / 11:30 AM PDT
Network Detection and Response 101
We've found an active threat in our infrastructure; how many other hosts are infected? That’s an unpleasant but an all too common situation. Join this session to see a real-world scenario on how to detect, investigate and respond to threats using ThreatINSIGHT.
|
|
|
Breakout Session #1 | 12:45 PM EDT / 9:45 AM PDT
Gain Visibility into the Performance and Security of Your Network with AWS and Gigamon
Having visibility into your network is a foundational item that is needed to help ensure that your network is secure and functional. This is no different for customers who are running workloads on Amazon Web Services. In this session we will provide an overview of how you can gain visibility into your AWS network traffic, leverage Gigamon to help with analytics and management of your traffic, and gain more confidence around the operations and security of your network traffic.
|
Breakout Session #2 | 1:30 PM EDT / 10:30 AM PDT
Multi-Cloud and Container Visibility
OpenShift, K8s, Mesh Service... huh? What language is this? In this session, we'll review the not-so-new-but-very-confusing world of software containers that have accelerated digital transformation (DX) and decoupled OS and programing languages, and share how you can maintain consistent, pervasive visibility in a very dynamic environment.
|
Breakout Session #3 | 2:30 PM EDT / 11:30 AM PDT
Enabling Zero Trust: Review of an Actual Large-Scale Deployment Reference Architecture
Zero Trust has become a high priority for both government and commercial organizations. Whether you are implementing Zero Trust or planning a ZT-based next-gen security model, learn how Gigamon enables the critical components of a ZT architecture.
|
|
|
|
Panel Discussion | 3:15 PM EDT / 12:15 PM PDT
IT and Security management is facing a complex set of challenges with the need to accelerate digital confirmation with flat or declining budget. At the same time, they need to address Return To Office (RTO) and hybrid environments for employees and protect against the continued threat of rising ransomware attacks. Our distinguished panel will discuss challenges of cloud migration including monitoring and security, trends in ransomware attacks and best practices to protect your organizations, and recommendations for the new hybrid work environment.
Bring your questions for this interactive group discussion.