Print Page   |   Contact Us   |   Sign In
Community Search

Thank you to our 2017 Sponsors!

2017 Industry Presentations
Share |

Theaters Sponsored by: Intel Security

Tuesday, November 14, 2017

Hardened Cryptography: The root of Trust for Multi-domain-security

Date: Tuesday, December 6, 2016
Time:1130- 1230
Location: San Juan B
Presented by: FutureX

Speaker: Adam Cason

As the frequency and complexity of cyberattacks increase alongside dramatic growth in the number of connected users, devices, and applications, relying on hardened cryptography to protect sensitive data becomes even more critical. To combat sophisticated attack vectors, robust cryptographic infrastructure with automated management and monitoring capabilities is needed for tasks such as PKI management, code signing, credential generation, and user identity lifecycle management. This presentation outlines proven methodologies to build a highly available cryptographic resources platform for multi-domain operations that is scalable, versatile, automatable, and secure.

All guests who attend this session can register to win a chance for two Charter Level Spurs tickets to the Jan. 7th game vs Charlotte Hornets!

Endpoint Security

Date: Tuesday, December 6, 2016
Time: 1130 - 1230
Location: San Juan A
Presented by: Intel Security

Speaker: Scott Wisniewski

Isolated endpoint security solutions in today’s enterprises cannot keep up with sophisticated, emerging threats. McAfee offers one unified solution that covers all the devices in an enterprise, reducing management complexity and cutting costs. To strengthen and streamline endpoint defenses, McAfee tightly integrates broad endpoint technologies to combat multi-vector threats and compliance violations, while cutting management complexity.

The Benefits and Dangers of SSL

Date: Tuesday, December 6, 2016
Time: 1400 - 1500
Location: San Juan B
Presented by: F5

This presentation will cover industry trends, recent exploits, and best practices around implementing SSL Encryption in your environment.  SSL traffic is doubling every year and along with this encrypted traffic comes new exploits, hidden attack vectors, and potential increased complexity and overhead that IT practitioners should be aware of. Robert Smith, Senior Federal Systems Engineering Manager with F5 Networks, will discuss commercial and Federal trends, best practices and how to get an A on your SSL implementations. 

What Role Does DNS, Network Operations, and IP Visibility and Mgmt Play in Your Cyber Security Strategy?

Date: Tuesday, December 6, 2016
Time: 1400 - 1500
Location: San Juan A
Presented by: Infoblox

DNS, the often forgotten network protocol, is critical for your network to operate. Learn what risks you face from attack or mis-use, and how can it give a boost to your security responses.  Network Operations and IP Visibility and Mgmt is a powerful set of tools for cyber security as well.  If you know what is on your network and where it is at all times with automatic security policy enforcement, then your security becomes automatic. Enhance your security, simplify your network operations, and save time and money.  You will learn about the power of integrated DNS, IP Mgmt, and Automatic Network Operations to enhance your network cyber security. 

Wednesday, November 15, 2017

LANDESK - XTRACTION

Date:Wednesday, December 7, 2016
Time: 1130 - 1230
Location: San Juan B
Presented by: Insight

Xtraction enables any organization a real-time consolidated dashboard and reporting capability to view your current and future enterprise data sets including Microsoft SCCM, BMC Remedy, Tenable ACAS, McAfee EPO/HBSS, Solarwinds, VMWare VCenter and many more. Xtractions intuitive, easy-to-use drag and drop interface allows users to instantly create Cyber, Operations, Compliance (and many more) dashboards and reports quickly and efficiently without any programming.

Adaptive Security Yields Smarter Defenses

Date: Wednesday, December 7, 2016
Time: 1130 - 1230
Location: San Juan A
Presented by: Intel Security

Speaker: Christopher Johnston

Leveraging the McAfee Data Exchange Layer (DXL), McAfee Threat Intelligence Exchange (TIE) to optimize threat detection and response by closing the gap from malware encounter to containment

Real-time Search on Terabytes of Cyber Events Per Day: Lessons Learned

Date: Wednesday, December 7, 2016
Time: 1400 - 1500
Location: San Juan B
Presented by: Three Wire Systems

The challenge with modern cyber security is the figuring out how to collect, store, and search all of the log and event data generated by complex infrastructure. To address these challenges at Rocana we're applying big data technologies that are designed to handle this massive scale. In particular we need to simultaneously offer full-text and faceted search queries against large volumes of historical data as well as perform near-real time search against events collected in the last minute. In this talk we describe the challenges we've experienced performing search against petabytes of historical data while scaling to terabytes of new data ingest per day. We'll also share the key lessons we've learned and detail our architecture for handling search at these massive volumes. We detail how we use Apache Kafka to stream event data in near real-time to Apache Hadoop HDFS for deep storage and how we leverage Apache Lucene to scale our search infrastructure to terabytes per day of ingest. We present our solution in the context of an overall event data management solution and show real-world scalability results.

Comply to Connect

Date: Wednesday, December 7, 2016
Time: 1400 - 1500
Location: San Juan A
Presented by: ForeScout

The idea behind Comply to Connect (C2C) is simple: Implement controlling countermeasures that safeguard your information systems. However, as with any U.S. Government initiative, there are a few details you should know. Join ForeScout as we clarify the concept and use case of Comply to Connect. During this informative webinar, you’ll also see real-world examples of how ForeScout® CounterACT® can provide visibility, hygiene, mitigation and control across technical, management and operational assets in accordance with the U.S. Government’s 800-53 and NIST SP 800-171 standards.