Little Rock January 12
Event on 2015-01-12 07:30:00
This comprehensive seminar, including a full hot lunch, covers the increasingly related topics of security/compliance, storage/backup and cloud/sdn. Angelbeat coordinates expert speakers from VMware, Microsoft, HP, Dell, Check Point, AT&T and other top firms – scroll down to see the agenda – who deliver concise, technical and complementary talks. Content is pre-approved by Angelbeat and past attendees to maximize learning. CISSP's and other individuals can receive 4 CPE credit hours for attending. As one Wal-Mart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, “Thanks for hosting a very informative meeting with vendors that tied in well… it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace.
Watch Angelbeat CEO Ron Gerber on Youtube discuss why you should attend. Meals, self-parking and Wi-Fi are provided at no charge, with drawings for an HP tablet, gift cards and other prizes at the end. Given the recent Sony attack/breach and Russian hackers stealing one billion passwords, you definitely want to attend and learn how to protect your confidential data, stored onsite or in the cloud, accessed via wired or wireless network, from any device, against the latest threats.
Join your peers from UALR, State of Arkansas, Crafton Tull, Arkansas Blue Cross, Harrison Energy, Southwest Power Pool, City of Little Rock and many more organizations who are confirmed attendees.
7:30 – 8:40: Registration, Coffee Break/Snacks, Exhibit Area Open, Peer Networking, Product Demonstrations
8:40 – 8:55: Protection against Phishing Attacks with Kaspersky
Kaspersky is the world’s largest privately held, and among the top four security vendors, operating in 200 countries and protecting 300 million users. Its mission is to provide the world's most effective, responsive and efficient protection against cyber-threats: those from malware, spam, hackers, DDoS attacks, sophisticated cyber-espionage tools, and cyber-weapons that target organization's critical IT infrastructure with potentially catastrophic consequences. Their talk will focus on protecting your IT infrastructure and confidential data against the latest and most sophisticated phishing attacks.
8:55 – 9:15: 2014 Year-End Check Point Security Report: Lessons Learned, Recommendations for 2015
Check Point will highlight the 2014 Security Report which provides major security events and current malware trends. The data included in this report is based on collaborative research and in-depth analysis of 200,000+ hours of monitored network traffic from 996 organizations of various industries. Basically, what happened last year, how can you learn from security breaches/attacks at Sony, Chase, Home Depot, etc., and what should you do in 2015 to secure your IT infrastructure and confidential/sensitive data.
To protect against today's evolving threat landscape, while supporting high-demanding IT infrastructures, customers are considering dynamic security architectures. Check Point will introduce a brief description of Software Defined Protection architecture, which provides operational resilience and real-time, proactive protection.
9:15 – 9:30: Protecting your network while navigating social media, with Barracuda
Social media and Web 2.0 applications enable rich user interaction and collaboration, they also open the door to a variety of threats like social media scams, identity theft, Trojans, phishing attacks, botnets, advanced persistent threats, cyberbullying, and data leakage.
During the early years of social media most organizations blocked access to these sites in the workplace because of their adverse impact on productivity. However, today's IT administrators have the dual challenge of providing access to selected Web 2.0 resources, while ensuring the network security and user safety. This is particularly difficult because of the mashed content on social media portals. For example, an organization may want to use Facebook or Twitter for viral marketing campaigns but prevent employees from playing games on Facebook or leaking confidential information through Twitter. This is problematic with traditional content filtering solutions since they either completely block or allow unrestricted access to these types of content and applications.
The Barracuda Web Filter provides extremely granular control over Web 2.0 sites and applications. Administrators can also configure the Barracuda Web Filter to archive outbound social media communications, like Facebook posts, tweets, and web-based email to a message archiving solution, such as the Barracuda Message Archiver. These messages can be indexed and then mined for forensic analysis.
9:30 – 9:45: Security/Compliance: Securing Unstructured Data, The Next Evolution of eDiscovery and Data Loss Prevention with Varonis
The importance of securing and managing sensitive & confidential data was vividly reinforced by the recent NSA/Snowden and Wikileak incidents. Organizations must protect the rapidly growing volume of unstructured and semi structured data—documents, spreadsheets, presentations, media files and other business data – that can be stored in file servers, NAS devices, SharePoint, virtual data centers, cloud-based storage platforms, etc. This is taking ediscovery and data loss prevention (DLP) to the next level.
Attendees will learn about solutions to this important issue from Varonis, the foremost innovator and provider of access, governance, and retention solutions for human-generated data, the fastest-growing and most sensitive class of digital information. Based on patented technology and a highly accurate analytics engine, Varonis solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times from all devices, all use is monitored, and abuse is flagged.
Varonis makes digital collaboration secure, effortless and efficient so that people can create and share content easily, and organizations can extract more value from their content while being confident that it is protected and managed efficiently.
9:45 – 10:05: Detecting and Stopping Advanced Persistent Threats (APT) with LogRhythm
Advanced Persistent Threats, or APTs, are a growing concern in the security industry. APTs differentiate themselves from other types of hacking activities by targeting a specific organization (such as Sony) for a specific target, often extremely high pay-off data. APTs are “advanced” in that the attackers often write customized zero-day malware and exploits specific to their target organization. They will also frequently launch specifically targeted “phishing” attacks in an attempt to exploit user systems. In effect, APTs will harness the full spectrum of logical, physical and social attack vectors – with extreme sophistication and capability.
APTs are “persistent” in that they are extremely patient and methodical in their approach to reconnaissance, target compromise, and data exfiltration. An APT doesn’t care if it takes a week or a year to reach their objective – just so long as they eventually do. There is no single attack vector used by APTs, no single activity pattern, and thus no easy way for an organization to protect itself from an APT. A defense-in-depth strategy across logical, physical, and social boundaries is fundamental.
LogRhythm is able to collect log data from multiple “touch points” as the APT works through the layers of defense; context is provided along with cross-phase correlation and corroboration to determine what is taking place, how and when. While no two APTs are the same, most follow a common lifecycle in which reconnaissance is performed against a target organization, an initial compromise of a host is accomplished and credentials are stolen, tools are installed to maintain access, lateral movement to the target data occurs, and ultimately the target data is exfiltrated. Although this activity is generally done “low and slow,” often utilizing custom malware and/or legitimate credentials to avoid detection, activity at each phase leaves a footprint in the log trail.
LogRhythm, the leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented and award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.
10:05 – 10:20: Primary Storage and Flash Technology with Tegile
Tegile is pioneering a new generation of flash-driven enterprise storage arrays that balance performance, capacity, features and price for virtualization, file services and database applications. Its hybrid arrays are significantly faster than legacy arrays and significantly less expensive than all solid-state disk-based arrays. Featuring both NAS and SAN connectivity, these virtual data storage systems are easy-to-use, fully redundant, and highly scalable, plus come with built-in snapshot, replication, near-instant recovery, and virtualization management features.
10:20 – 10:40: Dell Backup/DR/Data Protection for Physical, Virtual, Cloud Platforms
Disaster Recovery/Business Continuity is vitally important in today's always-on world. But when data can be at rest, in use or in motion – and stored on physical, virtual and/or private/public/hybrid clouds – a cost-effective and manageable solution can be very challenging.
Dell will discuss how organizations of all sizes can meet this challenge, through its broad portfolio of scalable solutions that protect data and deliver rapid recoverability across physical, virtual and cloud environments. Its automated processes for validating and verifying the integrity of data helps ensure the success of every recovery. They will also cover:
- Trends in data protection/DR/backup and how cloud, offsite hosting, big data, security/compliance requirements and an increasingly mobile workforce affects business continuity plans
- The value of a common data protection/DR/backup platform that seamlessly and consistently covers legacy physical servers plus data stored on virtual/cloud platforms
10:40 – 11:20: Coffee/Refreshment Break, Product Demonstrations, Exhibit Area Open, Peer Interaction
11:20 – 11:40: HP: Simplify Your Network with Software Defined Networks (SDN)
Software-defined networking (SDN) is an emerging architecture that is dynamic, manageable, cost-effective, and adaptable, making it ideal for the high-bandwidth, dynamic nature of today’s applications. This architecture decouples the network control and forwarding functions, enabling the network control to become directly programmable and the underlying infrastructure to be abstracted for applications and network services.
In this session, you will learn about the layers of the SDN architecture, how a hybrid SDN deployment can enable you to slowly adopt SDN without the need to “rip and replace,” and how HP has developed an open SDN ecosystem that ensures choice and flexibility. You’ll see how SDN can lower your costs, improve availability and scale, and enable you to deliver services faster.
11:40 – 12:00: Wide Area Network (WAN)/Fiber Optic Infrastructure Configuration/Redundancy from Telecomp and AT&T
The exponential growth of cloud-based applications, many of which are bandwidth intensive such as video, places much greater emphasis/importance on an organization's Wide Area Network (WAN)/Fiber Optic Infrastructure. With mission-critical programs such as Email, ERP, CRM, eCommerce and others now hosted (versus on-site/local installation), IT professionals must pay very close attention to configuration of their WAN infrastructure, to meet the QoS/performance requirements of end users and support DR/BC objectives.
Arkansas-based Telecomp, one of AT&T's largest partners in the United States, will provide valuable insights on how they utilitize technology/services from AT&T and others to configure WAN architectures for their clients.
12:00 – 12:30 Microsoft: Azure Cloud and Infrastructure Services
Microsoft Azure is an open and flexible cloud platform that enables you to quickly build, deploy and manage applications across a global network of Microsoft-managed datacenters. You can build applications using any language, tool or framework. And you can integrate your public cloud applications with your existing IT environment. Here are some of the major features that will be discussed during this informative session:
- Always On: 99.95% monthly SLA enables you to build and run highly available applications without focusing on the infrastructure.
- Open: Use any language, framework, or tool to build applications. Features and services are exposed using open REST protocols. The Windows Azure client libraries are available for multiple programming languages, and are released under an open source license.
- Unlimited Servers and Storage: Easily scale your applications to any size. It is a fully automated self-service platform that allows you to provision resources within minutes. Elastically grow or shrink your resource usage based on your needs. You only pay for the resources your application uses. Windows Azure is available in multiple datacenters around the world.
- Powerful Capabilities: Azure is a flexible cloud platform that can satisfy any application need. It enables you to reliably host and scale out your application code within compute roles. You can store data using relational SQL databases, NoSQL table stores, and unstructured blob stores, and optionally use Hadoop and business intelligence services to data-mine it.
- Security, Identity and Access Management: Azure Active Directory delivers an enterprise ready cloud identity service enabling a single sign-on experience across cloud and on-premises applications. It allows multi-factor authentication for added security and compliance.
FULL HOT LUNCH, Exhibit Area Open, Peer Networking, Product Demonstrations
1:10 – 1:30: BYOD Bring Your Own Device, High-Speed 802.11n/ac WiFi, Access Point Architecture, the "Internet of Things", with Aruba and Promas
During the first weekend of sales, Apple sold over 10 million iPhone 6's. For 2014, there will be sales of ~100 million iPad's and ~400 million Android-powered smartphones and tablets. These devices are often employee-owned and are rapidly making their way to the workplace – the Bring-your-own-Device (BYOD) revolution – creating a new set of security and management challenges for IT departments. Plus each device creates exponential growth in network traffic and data – the Internet of Things.
Attendees will learn about best practices for supporting tablet, laptop, smartphone and other devices on your network, which often run different operating systems and rely upon different security protocols. For instance, how can sensitive corporate data be segmented/separated/encrypted from personal information when using the same device? How can you integrate a Mobile Device Management (MDM) solution with existing end point/anti-virus security products? Should you create specialized apps for your employees and/or customers, or do smartphone browsers have sufficient functionality? What is the best approach for providing guest access to visitors on my corporate network, without any performance degradation or security risks? How can you create an integrated WiFi/cellular strategy that provides for secure and speedy access over any wireless network?
Every tablet and smartphone shares a common feature – they can only connect to the Internet via wireless, which greatly increases the importance of a comprehensive wi-fi infrastructure and strategy. With unlicensed wireless device growth measured in the billions of units, combined with a growing role for machine-to-machine mobile communications (the "Internet of Things") and more wireless-based mission-critical applications, it is essential that IT professionals eliminate rf interference, ensure end user wi-fi performance and understand the next generation of standards including 802.11n and 802.11ac, which enables multi-station WLAN throughput of 1 gigabits per second. For instance, attendees will learn about rf antennae design and controller architecture, and why different vendor's access points, even if they all operate under the same 802.11 standard, nonetheless may have vastly different performance.
1:30 – 2:00: VMware Software Defined Data Center (SDDC) and Cloud Offerings
VMware will outline its strategy/offering/platform for private/public clouds and the software defined data center (SDC), which leverages its core expertise in virtualization in exciting new ways.
Enterprises worldwide have used VMware vSphere to significantly improve IT efficiency and performance, yet the mobile cloud era presents new challenges. To meet this challenge, organizations need to virtualize the rest of the data center so all infrastructure services become as inexpensive and easy to provision and manage as virtual machines. The answer is the software-defined data center (SDDC): the ideal architecture for private, public, and hybrid clouds. Pioneered by VMware and recognized by the industry and analysts alike, SDDC extends the virtualization concepts you know – abstraction, pooling and automation – to all data center resources and services.
VMware cloud solutions improve IT efficiency, agility and reliability, while helping drive innovation. They deliver everything an organization needs to build, operate, rent and manage their cloud, even beyond the data center. IT executives get the freedom and flexibility to move workloads seamlessly and securely between an onsite data center/ internal private cloud to a hybrid and/or public cloud. Leveraging cloud services from VMware and/or a certified VMware vCloud service provider, you can run your applications onsite, offsite or both, without compromise.
End of Event, Raffle Prize Drawings for an HP Tablet, Gift Cards and other great items!
What are Angelbeat's privacy and optin/optout policies
Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database.
However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors.
If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at email@example.com.
Who is eligible to receive a free pass
There is no charge to attend for an end user IT professional who works in the telecom/IT/networking/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals, manufacturers, retailers, banks, financial services firms, insurers, real estate/construction/property management, insurance/brokerage agencies, pharmaceutical companies, law/accounting/consulting firms, trucking/transportation/logistic firms, etc. and use, support, purchase and/or are involved in or influence the purchase of products and services offered by our sponsors. Systems integrators and consultants who attend with or are representing their enterprise clients are also eligible to receive a free pass. Full-time reporters from major newspapers, websites, television and radio stations can also attend as our guest. If you are a government employee and have limitations/restrictions on your ability to attend free events, then please contact the Angelbeat team by clicking below. For instance, some individuals simply reimburse Angelbeat for the cost of the meals, to avoid any perception of conflict-of-interest.
As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above who attend our events at no charge. If you fall in this category and would still like to attend then the fee is 0/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015.
All free attendees must be pre-approved in advance by Angelbeat and Angelbeat reserves the right to accept or reject a free pass request at its discretion.
What are my transport/parking options getting to the event
Detailed driving directions will be sent out to all attendees one week before the event. There is complimentary self-parking at the venue.
What is the dress code
Suggested dress is business casual.
What if you have special dietary needs/restrictions
If you have special dietary needs/restrictions, then please email Angelbeat below. We will do our best to accommodate any and all requests.
at Clarion Hotel Medical Center
925 S University Ave
Little Rock, United States