Windows IT Pro
The 2017 State of Security

Thursday, September 21, 2017 11:00am ET

11:00 a.m. – 12:00 p.m. The 2017 State of Security: More of the Same or Something New Under the Sun?
Presented by: Nick Cavalancia

Sponsored by:


The answer to the question "Are we secure?" in 2017 requires some complex, multi-faceted, "make your head spin" kind of thinking. You need to consider each and every possible threat vector that has any chance whatsoever to rear its ugly head and successfully attack your environment. To make matters worse, the list of threats keeps changing; so if you haven't brushed up on the "latest and greatest" threats, you're probably already compromised.

So, what attacks do you need to be looking out for?

In this educational session, join Penton contributor and industry expert, Nick Cavalancia, as he takes you on a whirlwind tour of all things threatening to your network. Topics will include:
  • Attack Vectors to Watch – From injections to ransomware to threat actors in lateral movement... and everything in between
  • Where to Place your Focus – Endpoints? Devices? Apps? The cloud? We'll cover the latest targets.
  • Bringing Security up to 2017 Standards – what will it take... and is it even possible?
12:00 p.m. – 12:15 p.m. Networking Break
12:15 p.m. – 1:15 p.m. Keeping the Enterprise Always On with IT Resilience
Presented by: Jack Bailey

Sponsored by:


Your organization is always running and can’t afford downtime during disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true disaster recovery for the business. What types of disaster will impact the business? Learn about disaster recovery scenarios, and also the questions to ask and answer when planning your disaster recovery solution to drive true IT resilience. Learn about which decisions impact business in which ways, and how to avoid making sacrifice for you always-on organization.
12:15 p.m. – 1:15 p.m. Backup & Recovery: Your Get out of Ransomware Free Card
Presented by: Jim Reavis and Andrew Nielsen

Sponsored by:


Ransomware has become a major concern for organizations around the globe. The U.S. Department of Justice reports that an average of 4,000 ransomware attacks occur daily. These ransomware attacks aren’t just targeting laptops and other end-user devices either. Servers are equally at risk of ransomware attacks as well. There’s good news though - your backup data can be difference between being held hostage and easily recovering from an attack.

Join security experts, Andrew Nielsen, Chief Trust Officer from Druva and Jim Reavis, CEO of Cloud Security Alliance to learn:

  • The top vulnerabilities exploited for endpoints and servers
  • Proactive strategies to protect data before a malicious attack occurs
  • How to avoid paying the ransom by leveraging your backup data
12:15 p.m. – 1:15 p.m. Identity-led security and strong authentication
Presented by: Krystal Wang, Security Solutions, Okta

Sponsored by:


As organizations and workplaces evolve, less control is exercised over devices, services, and people, leading to a gap with traditional security tools. Identity not only becomes the critical control point, but the information stemmed from it can be leveraged to strengthen existing processes as well as integrate with other security investments. Join this webinar to learn why identity isn’t simply just a "first step" but also the foundation modern security should be built on. Then explore what characteristics a strong authentication solution should include as we demo Okta’s Adaptive MFA solution.
1:15 p.m. – 1:30 p.m. Networking Break
1:30 p.m. – 2:30 p.m. Cloud Security: How to strengthen security and minimize threats
Presented by: Bill Kleyman

You don't want to be on the wrong end of a data or security breach. The unfortunate part is that this seems to be happening more and more often. The modern data center now houses more data and information than ever before. Furthermore, new applications, mobility, and IoT are creating even more data. And, this data is valuable.

Too often organizations build their business, deploy IT, and only then think about security a few steps down the line. But with so many major breaches and the rise of advanced persistent threats (APTs), it's time to realign your security strategy so that it scales with your business. To do that, there needs to be a shift in your security thought process. This shift happens when you begin to understand how your infrastructure security spans a variety of different systems – both on premise and in the cloud.

In this session, industry expert and Penton contributor Bill Kleyman will cover the basics around strengthening your security architecture and talk about how to effectively minimize advanced threats. Furthermore, he will discuss what happens if you do actually get breached - and what steps to take. His presentation will include:
  • Key trends around cloud, data center, and security
  • Understanding the dynamic threat landscape
  • The "economization" of hacking
  • Enabling modern security practices
  • You've just been breached... now what?
  • Security best practices and how to evolve with the digital landscape
2:30 p.m. – 2:45 p.m. Networking Break
2:45 p.m. – 3:45 p.m. Backup and Disaster Recovery for the Enterprise: Today's Biggest Challenges and the Best Practices to Overcome Them
Presented by: Michael Otey

Sponsored by:


In today's enterprises, data protection and disaster recovery aren't just nice to have -- they are absolute necessities. Data is one of the most critical assets that the enterprise has. Protecting and being able to recover that data is the IT administrator's most important job. Not being able to restore your data could damage the business and even cost your job. Today, data protection is critical in order to restore the business from a server or site failure as well as to be able to protect your organization from threats like ransomware.

Creating an effective disaster-recovery plan is challenging. Businesses need to deal with massive data growth even as the increased demands for 24 x 7 availability have resulted in an ever-shrinking backup window.

In this session, join IT Pro's senior contributing editor Mike Otey as he covers some of the best practices to deal with these modern backup and DR challenges, including the use of RTO and RPO driven backup strategies, using replication for availability and faster DR, the use of the cloud as a backup and DR site, and using cloud-based DR-as-a-Service.

One of the biggest issues with using the cloud for backup and DR is being able to ensure that your data is secured. Oey will talk about essential strategies to secure your cloud-based data and virtual assets. Finally, he will discuss the need to test your DR plans and look at strategies and tools that can help you to automate that process.
3:45 p.m. – 5:00 p.m. Networking Break

Event Registration

If you have already registered, click here to access.
Not You? Please clear your cookies and refresh this page.