Windows IT Pro
The 2017 State of Security

Thursday, September 21, 2017 11:00am ET

11:00 a.m. – 12:00 p.m. The 2017 State of Security: More of the Same or Something New Under the Sun?
Presented by: Nick Cavalancia

Sponsored by:

Adaptiva

The answer to the question "Are we secure?" in 2017 requires some complex, multi-faceted, "make your head spin" kind of thinking. You need to consider each and every possible threat vector that has any chance whatsoever to rear its ugly head and successfully attack your environment. To make matters worse, the list of threats keeps changing; so if you haven't brushed up on the "latest and greatest" threats, you're probably already compromised.

So, what attacks do you need to be looking out for?

In this educational session, join Penton contributor and industry expert, Nick Cavalancia, as he takes you on a whirlwind tour of all things threatening to your network. Topics will include:
  • Attack Vectors to Watch – From injections to ransomware to threat actors in lateral movement... and everything in between
  • Where to Place your Focus – Endpoints? Devices? Apps? The cloud? We'll cover the latest targets.
  • Bringing Security up to 2017 Standards – what will it take... and is it even possible?
12:00 p.m. – 12:15 p.m. Networking Break
12:15 p.m. – 1:15 p.m. Premier Session
Sponsored by:

Zerto
12:15 p.m. – 1:15 p.m. Premier Session
Sponsored by:

Druva
1:15 p.m. – 1:30 p.m. Networking Break
1:30 p.m. – 2:30 p.m. Cloud Security: How to strengthen security and minimize threats
Presented by: Bill Kleyman

You don't want to be on the wrong end of a data or security breach. The unfortunate part is that this seems to be happening more and more often. The modern data center now houses more data and information than ever before. Furthermore, new applications, mobility, and IoT are creating even more data. And, this data is valuable.

Too often organizations build their business, deploy IT, and only then think about security a few steps down the line. But with so many major breaches and the rise of advanced persistent threats (APTs), it's time to realign your security strategy so that it scales with your business. To do that, there needs to be a shift in your security thought process. This shift happens when you begin to understand how your infrastructure security spans a variety of different systems – both on premise and in the cloud.

In this session, industry expert and Penton contributor Bill Kleyman will cover the basics around strengthening your security architecture and talk about how to effectively minimize advanced threats. Furthermore, he will discuss what happens if you do actually get breached - and what steps to take. His presentation will include:
  • Key trends around cloud, data center, and security
  • Understanding the dynamic threat landscape
  • The "economization" of hacking
  • Enabling modern security practices
  • You've just been breached... now what?
  • Security best practices and how to evolve with the digital landscape
2:30 p.m. – 2:45 p.m. Networking Break
2:45 p.m. – 3:45 p.m. Backup and Disaster Recovery for the Enterprise: Today's Biggest Challenges and the Best Practices to Overcome Them
Presented by: Michael Otey

Sponsored by:
Unitrends

In today's enterprises, data protection and disaster recovery aren't just nice to have -- they are absolute necessities. Data is one of the most critical assets that the enterprise has. Protecting and being able to recover that data is the IT administrator's most important job. Not being able to restore your data could damage the business and even cost your job. Today, data protection is critical in order to restore the business from a server or site failure as well as to be able to protect your organization from threats like ransomware.

Creating an effective disaster-recovery plan is challenging. Businesses need to deal with massive data growth even as the increased demands for 24 x 7 availability have resulted in an ever-shrinking backup window.

In this session, join IT Pro's senior contributing editor Mike Otey as he covers some of the best practices to deal with these modern backup and DR challenges, including the use of RTO and RPO driven backup strategies, using replication for availability and faster DR, the use of the cloud as a backup and DR site, and using cloud-based DR-as-a-Service.

One of the biggest issues with using the cloud for backup and DR is being able to ensure that your data is secured. Oey will talk about essential strategies to secure your cloud-based data and virtual assets. Finally, he will discuss the need to test your DR plans and look at strategies and tools that can help you to automate that process.
3:45 p.m. – 5:00 p.m. Networking Break

Event Registration

If you have already registered, click here to access.
Not You? Please clear your cookies and refresh this page.