Oklahoma City Jan 14

Oklahoma City Jan 14
Event on 2016-01-13 07:30:00
Program Description: This comprehensive 1/2 day seminar covers the increasingly related topics of security/compliance, network/data center infrastructure and private/public/hybrid cloud. There are expert speakers from Microsoft and many more technology leaders – scroll down to see the fantastic agenda and click on links to see speakers' biographies – who deliver concise, technical, educational and complementary talks. Content is pre-approved by Angelbeat and past attendees to maximize learning; click here to download presentation guidelines that are followed by all speakers, which makes the program so worthwhile for IT Directors, Security Analysts, Enterprise Architects, Network & System Administrators, Data Center/Storage/Infrastructure Managers, CISO/CIO's, etc. As one Walmart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, "Thanks for hosting a very informative meeting with vendors that tied in well; it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace." Every attendee receives meals including a full hot lunch (click here to see the delicious menu), complimentary self-parking and Wi-Fi, plus 4 CPE credit hours towards your CISSP or other certification. There are drawings for gift cards and other prizes at the end. 7:30 – 8:40: Registration, Breakfast, Exhibit Area Open, Peer Networking, Product Demonstrations 8:40 – 9:00: Top Five Tips for Educating Employees about Cybersecurity with Kaspersky and its partner Promas Corporate cybercrime is usually blamed on outsiders, but sometimes employees can represent the biggest threat to your organization’s IT security. In his presentation, Kaspersky’s Mark Villinski will provide practical advice for educating your employees about cybersecurity, covering topics including: – How to create efficient and effective security policies – Overview and statistics of the current threat landscape – The importance of keeping your employees updated about the latest threats and scams – Security solutions that can help keep your systems updated and protected Kaspersky is the world's largest privately held, and among the top four security vendors, operating in 200 countries and protecting 400 million users. 9:00 – 9:20: Real-Time Endpoint Security, Management and Control with Tanium Tanium gives organizations of all sizes the unique power to secure, control and manage millions of endpoints across the enterprise within seconds. Serving as the “central nervous system” for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of every endpoint across the enterprise in plain English, retrieve data on their current state and execute change as necessary, all within seconds. With the unprecedented speed, scale and simplicity of Tanium, organizations now have complete and accurate information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT operations. 9:20 – 9:40: Check Point Annual Security Report: Lessons Learned from 2015, Recommendations for 2016 to Protect Your IT Infrastructure, Next Generation Firewall Architecture Check Point will summarize its annual Security Report that analyzes major security events and malware trends. The data included in this report is based on collaborative research and in-depth analysis of 200,000+ hours of monitored network traffic from 996 organizations across all industries. Basically, what has happened over the past 12 months, how can you learn from security breaches/attacks at Sony, Chase, Home Depot, etc., and what you can do to secure your IT infrastructure and confidential/sensitive data. One solution that organizations of all sizes should consider deploying, to protect against this rapidly evolving threat landscape while supporting high-demanding IT infrastructures, is a "Software Defined Protection Architecture", which provides greater operational resilience plus real-time, proactive protection. Check Point will conclude this session with a discussion on Next Generation Firewalls (NGFW), and why NGFW needs to be part of your defense-in-depth strategy. 9:40 – 10:00: Stopping Insider Threats, Attacks and Hacks with Varonis The recent spate of highly publicized breaches has drawn attention to the most challenging issue that keeps security professionals up at night – once an attacker is “inside” the network, their activities are often difficult to spot and recover from. This is true of outside attackers that compromise the credentials and systems of employees, as well as employees that are "breaking bad" or unwittingly exposing sensitive files. This session will review the anatomy of typical outside-in attacks including infiltration, data gathering, and exfiltration, then discuss methods and techniques for analyzing file analysis records to spot and stop potentially malicious activity from both insiders and external attackers. 10:00 – 10:20: Sofware Defined Networks and Data Center Architecture from Brocade Everybody loves Lego building blocks. Many of us grew up playing with them. No matter how old you are, the colorful, approachable Lego pieces communicate – without a user manual – how they can be used to build things to your liking. Given a set of pieces based on an atomic, connectable unit, a young child can construct a simple tower, or a young person interested in engineering can build a detailed replica of Frank Lloyd Wright’s “Falling Water” house. The point is that starting with the right core design can take you a long way, and this simple yet powerful approach is equally applicable towards Network and Data Center Infrastructure Design. During this informative session, you will learn about the Brocade SDN Controller, which is built upon the OpenDaylight Project’s Software Defined Networking (SDN) architecture. The openness and excellence of the core design of the OpenDaylight controller makes it the most promising SDN controller framework on the market. Brocade brings to this framework the needed applications, support, services, and education ecosystem to help your organization build an agile and efficient network quickly and confidently. Coffee/Refreshment Break, Product Demonstrations, Exhibit Area Open, Peer Interaction 11:20 – 11:40: Data Center Architecture/Colocation Strategies in a Cloud-Driven World; Insights from ISG One of the biggest issues facing organizations of all sizes is determining their colocation strategy. For instance, what data and which applications should be stored and/or accessed remotely, and is there an impact on end user performance/QoS? What are the security/compliance implications? How does this balance one-time capital spending versus on-going operating expenses? ISG is a leading data center/hosting organization, with facilities in Wichita, Topeka, Kansas City and Columbia. Their experts will provide valuable insights on this critically important decision. 11:40 – 12:00: Next Generation Network Monitoring for Virtual/Cloud Environments with Extrahop The spread of virtualization, cloud computing, agile development practices, and service-oriented architectures has made traditional monitoring technologies obsolete. A new, simpler approach is needed, to provide visibility into these complex, hyperdynamic environments. In this educational session, ExtraHop will demonstrate how its Operational Intelligence platform meets these requirements, with its "real-time wire data analytics" tracking all L2–L7 communications, including full bidirectional transactional payloads. This innovative approach provides the correlated, cross-tier visibility, which is essential for application performance, availability, and security in today's complex/dynamic IT environments. 12:00 – 12:30: Big Data/Business Analytics Value Proposition, Why It Matters to Application and Infrastructure Staff plus Line-of-Business Executives; Insights from Tableau and Interworks Businesses are working hard to become more data-driven, open and analytical. That is why "Big Data" and complementary business intelligence initiatives are widely viewed as a top 2016 priority, for organizations of all sizes. Yet despite allocating significant resources towards these efforts in the past, companies often struggled to make progress. During this informative discussion, Tableau and its partner Interworks will educate you on Big Data, show you how to integrate business intelligence applications with the underlying enterprise architecture, and demonstrate how their clients created a data and analytics-driven culture, bringing together application, infrastructure and line-of-business personnel. Some specific topics include: – What IT can do to make this easy on business users? – What business users can do to make this easy on IT? – Case study examples, to help your organization understand and replicate these successes Tableau Software, (publicly traded on the New York Stock Exchange, NYSE: DATA) helps people see and understand data. Tableau helps anyone quickly analyze, visualize and share information. More than 35,000 customer accounts get rapid results with Tableau in the office and on-the-go. And tens of thousands of people use Tableau Public to share data in their blogs and websites. Full Hot Lunch (click here to see the delicious menu), Exhibit Area Open, Peer Networking, Product Demonstrations 1:00 – 1:45: Microsoft: Windows 10 Built-in Cyber Threat Resistance/Protection, Plus Azure Cloud Platform The number of new malware threats released every day is staggering. These threats are real, malicious and increasingly sophisticated. Traditional threat resistance based on detection has become a losing battle. IT needs a new approach to better protect corporate assets. Yung Chou, a top Microsoft desktop/cloud/security evangelist, will first discuss the new security features/capabilties that are designed into Windows 10, plus highlight its new approach to fundamentally secure computing resources. He will demonstrate the ability to authenticate a user with biometrics and hardware-based security, plus how to enroll a device to a domain via cloud, all through Windows 10. Yung will then discuss Azure, Microsoft's open and flexible cloud platform. Any developer or IT professional can be productive with Azure. Its integrated tools, pre-built templates and managed services make it easier to build and manage enterprise, mobile, Web and Internet of Things (IoT) applications faster, across a global network of Microsoft-managed datacenters, using skills you already have and technologies you already know. Here are its top features: – Private/Public/Hybrid Cloud Architecture Support: Some cloud providers make you choose between your datacenter and the cloud. Not Azure, which easily integrates with your existing IT environment through the largest network of secure private connections, hybrid database and storage solutions, and data residency and encryption features – your assets can stay right where you need them. You can even run Azure in your own datacenter with Azure Stack. Azure hybrid cloud solutions give you the best of both worlds: more IT options, less complexity and cost. – Open, Flexible, Reliable and Proven: Azure supports the broadest selection of operating systems, programming languages, frameworks, tools, databases and devices. Run Linux containers with Docker integration; build apps with JavaScript, Python, .NET, PHP, Java and Node.js; build back-ends for iOS, Android and Windows devices. Azure supports the same technologies millions of developers and IT professionals already rely on and trust, from small dev-test projects to global product launches. More than 57 percent of Fortune 500 companies use Azure, which offers enterprise grade SLAs on services, 24/7 tech support, and round-the-clock service health monitoring. – Scalability/Pay-As-You-Go/Grow: Azure’s pay-as-you-go services can quickly scale up or down to match demand, so you only pay for what you use. Per-minute billing and a commitment to match competitor prices for popular infrastructure services like compute, storage and bandwidth mean you’re always getting unbeatable price for performance. – Security/Compliance/Data Protection: Microsoft recognizes that some organizations are still wary of the cloud. That’s why Microsoft has made an industry-leading commitment to the protection and privacy of your data. Microsoft was the first cloud provider recognized by the European Union’s data protection authorities for its commitment to rigorous EU privacy laws, plus the first to adopt the new international cloud privacy standard, ISO 27018. There is Azure Government, a stand-alone version of Azure designed to meet the rigorous compliance requirements of U.S. government agencies. – Run your apps anywhere: Azure runs on a worldwide network of Microsoft-managed datacenters across 22 regions—more countries and regions than Amazon Web Services and Google Cloud combined. This fast-growing global footprint gives you lots of options for running applications and ensuring great customer performance. Azure is also the first multinational cloud provider in mainland China. – Big Data/Analytics Support: Azure’s predictive analytics services, including machine learning, cortana analytics and stream analytics, are redefining business intelligence. Make smarter decisions, improve customer service and uncover new business possibilities from your structured, unstructured and streaming Internet of Things data. End of Event, Raffle Prize Drawings for Gift Cards and other great items! FAQs What are Angelbeat's privacy and optin/optout policies Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database. However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors. If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at rgerber@angelbeat.com. Who is eligible to receive a free pass There is no charge to attend for an end user IT professional who works in the telecom/IT/networking/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals, manufacturers, retailers, banks, financial services firms, insurers, real estate/construction/property management, insurance/brokerage agencies, pharmaceutical companies, law/accounting/consulting firms, trucking/transportation/logistic firms, etc. and use, support, purchase and/or are involved in or influence the purchase of products and services offered by our sponsors. Systems integrators and consultants who attend with or are representing their enterprise clients are also eligible to receive a free pass. Full-time reporters from major newspapers, websites, television and radio stations can also attend as our guest. If you are a government employee and have limitations/restrictions on your ability to attend free events, then please contact the Angelbeat team by clicking below. For instance, some individuals simply reimburse Angelbeat for the cost of the meals, to avoid any perception of conflict-of-interest. As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above who attend our events at no charge. If you fall in this category and would still like to attend then the fee is 0/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015. All free attendees must be pre-approved in advance by Angelbeat and Angelbeat reserves the right to accept or reject a free pass request at its discretion. If you do not meet the above criteria and still try to register, then you will receive an automatic reply/confirmation from Eventbrite. However you will shortly receive another email from Angelbeat, rejecting and cancelling your registration. What are my transport/parking options getting to the event Detailed driving directions will be sent out to all attendees one week before the event. There is complimentary self parking. What is the dress code Suggested dress is business casual. What if you have special dietary needs/restrictions If you have special dietary needs/restrictions, then please email Angelbeat below. We will do our best to accommodate any and all requests.

at The Tower Hotel
3233 Northwest Expressway
Oklahoma City, United States

This entry was posted in Pay Per Click and tagged , . Bookmark the permalink.