(8AM – 1PM PST)
Designing a Trusted Framework
October 14, 2021
11:00 AM – 4:00 PM EST
8:00 AM – 1:00 PM PST
AGENDA
- 11:00am – 11:45am EST
Findings from the latest AFCOM State of the Data Center Report
When we talk about the new normal, we’re talking about the vast distribution of users and data. Over the past few months, we’ve seen incredible fallout from some of the world’s largest data breaches. Findings from the 2021 AFCOM State of the Data Center report highlight the security challenges that come in a distributed market.
In this keynote, we’ll discuss the zero trust security model, how distributed users and applications have created new challenges for businesses, and what leaders are doing to drive true security and infrastructure modernization efforts. Further, we’ll review the latest findings from the AFCOM State of the Data Center report including security, robotics, automation, and balancing new workforce requirements.
Specifically, we’ll cover:- The winds of security are changing: a review of recent security events
- Why zero trust security models need to become the default security architecture
- How users are changing
- Key findings from the AFCOM State of the Data Center report
EVP of Digital Solutions, Switch, and
Contributing Editor,
ITPro Today
- 11:45am – 12:00pm EST
Fireside Chat
- 12:00pm – 12:15pm EST
Sponsored by: Fortinet
- 12:15pm – 1:00pm EST
What You Should Know
Presented by: Brien Posey
Microsoft conditional access gives organizations a set of policies and configurations to control which devices get access to various apps and data. But to make effective use of Microsoft conditional access, organizations must first determine which types of conditional access policies to implement. In this keynote, we’ll share key considerations for devising the right conditional access policies for your business.
- 1:15pm – 1:30pm EST
Networking Break
Sponsored by: Sponsored By
PREMIER SESSION
- 1:30 PM – 2:00 PM EST
Richard Archdeacon, Advisory CISO, Duo Security | Josh Green, Technical Marketing Engineer, Duo Security
We have all heard how important zero-trust is to our organizational security, but most of us are still carrying around some baggage from a past relationship: the password. Let’s talk about how to get that obstacle out of your Zero-Trust path. Where does passwordless fit logically? How, and importantly, where will it work?
Join Duo Advisory CISO Richard Archdeacon and Technical Marketing Engineer Josh Green for answers to these questions and more.
PREMIER SESSION
- 1:30 PM – 2:00 PM EST
It’s no longer news that we need to support and secure increasingly distributed organizations. As companies look for long-term solutions for their hybrid and fully remote workforces, one thing is clear – identity is the new perimeter for businesses today.
An identity-first approach to security reduces today’s cybersecurity risks and provides the foundation for a zero trust security strategy. A modern Identity solution can also help you tie the complexities of protecting people and assets together in a seamless way.
Join this session to learn:- How to enable and secure a hybrid workforce
- How identity can lay the foundation for any zero trust security initiative
- What zero trust projects your peers are thinking about now and into the next 12-18 months
- 2:00 PM – 2:15 PM EST
PREMIER SESSION
- 2:15 PM – 2:45 PM EST
Getting Hybrid Clouds, Security and Networking Right
Rapid adoption of hybrid clouds means networks are now more distributed than ever before and business values are shifting toward agility, innovation, and software, leading to the rise of the software-defined enterprise.
Hybrid cloud adoption is also driving three strategic technology trends: zero trust, SD-WAN and SASE. Going forward, IT teams must grapple with these key trends, while managing a combination of in-house and service-provider solutions and balancing risk management with business objectives and customer experiences. How should we think about computing, networking, and security when enterprises own less infrastructure, platform, and software?
In this session, you’ll learn:
- Strategies to deploy adaptive cloud security, zero trust, SD-WAN and SASE in an integrated fashion
- Practical strategies to secure hybrid clouds
- How to deliver better outcomes and experiences.
PREMIER SESSION
- 2:15 PM – 2:45 PM EST
Autonomy vs Centralization: Addressing Cloud Security Challenges Across the Modern Enterprise
Digital transformation has brought many organizations to the cloud, eager to take advantage of opportunities for rapid innovation, productivity gains, and cost savings that can help sustain an edge over the competition. But this new world of software development also requires new ways of thinking about security, and is as much a cultural change as a technology shift.
In order to realize the benefits of the cloud, developers need the autonomy to produce code and product as they see fit. This requires agility and speed that cannot be slowed down by security and compliance measures. So how do we build cloud architectures that still foster this independence but can also provide centralized governance to protect cloud workloads, platforms,and data?
Join Sandy Bird, CTO and co-founder of Sonrai Security, for this presentation focused on helping you design a secure cloud framework.
Attendees will learn:
- Why the complexities of identity & data management in cloud environments create new risks we may not be aware of
- Ways to build a culture where autonomy is preserved and cloud risk management is still respected
- How to detect risks such as policy violations, misconfigurations, data drift and toxic combinations without harming productivity
- 2:45 PM – 3:15 PM EST
Gal Revach, Product Manager, and Keith Mokris, Director of Product Marketing, Prisma Cloud
DevOps and Infrastructure operations teams have taken to containers to scale their applications in ways never before thought possible. These teams are deploying with increasing release velocities, in times measured in seconds and minutes as opposed to days and weeks.
With increased release velocities also comes heightened security requirements for integrated security checks and controls into recurring DevOps workflows. This helps organizations identify vulnerabilities or compliance issues before a container is deployed into production. But, what about runtime security posture?
With the latest enhancements to Cloud Workload Protection in Prisma Cloud, development, DevOps, and cloud infrastructure practitioners can now see runtime risks before ever deploying into production with Prisma Cloud’s dynamic image analysis sandbox capabilities.
In this webinar, join Prisma Cloud Product Manager Gal Revach and Director of Product Marketing Keith Mokris to learn more about:- The latest trends in container adoption and security
- A demo of the latest capabilities from Prisma Cloud’s image analysis sandbox
- An overview of our latest Cloud Workload Protection enhancements
- 3:15 PM – 3:30 PM EST
- 3:30 PM – 4:00 PM EST
Kubernetes-Native Security: Enable Kubernetes Adoption While Securing Your Workloads
Container technology has altered the way we develop, manage, and run our applications. With the massive adoption of containers and Kubernetes, how we secure our containerized technologies has also shifted. Kubernetes deploys, manages, and scales container workloads efficiently, and our security solutions need to accommodate this change if we want to leverage its fullest potential.
Red Hat Advanced Cluster Security (Formerly StackRox) is designed to tackle the security challenges of Kubernetes. In this session, we’ll discuss the changes to how we prioritize risk, manage Kubernetes configuration challenges and integrate security policies into our existing workflows and tools.
Specifically, we’ll cover:
- What is Kubernetes-native security?
- Security challenges with Kubernetes and how to identify them
- Prioritizing issues and setting organizational policies
- How to enable developers with best practices and collaboration
Prizes & Interaction
Attend the live conference on October 14th, 2021 and win! The more you participate, the more points you earn! It’s that simple. You’ll earn prize points for each activity you participate in throughout the virtual conference. Points will be calculated at the end of the live event day.
Explorer Giveaway
30 Points
Session Viewed
25 Points
Zone Visits
20 Points
Location Chat Attended
10 Points
Documents Viewed
5 Points
Exchanged vCards
October 14, 2021
11:00 AM – 4:00 PM EST | 8:00 AM – 1:00 PM PST