As businesses adopt more flexible, hybrid workplaces, one thing is becoming clear: digital employee experience matters now more than ever. But although 90% of C-level execs agree DEX has become more important since the pandemic — and 67% of IT leaders say it’s a critical priority — only 7% of employees are completely satisfied with their digital experiences.
So why is there a divide?
We’ll take an inside look our recent report, The Future of the Digital Workplace, to uncover:
Speaker: David Wilkins, CMO, Lakeside Software
Presented by: Lakeside Software
Threat actors, Red-Teams, and Ransomware have been abusing Active Directory for years. In fact, attackers have compromised or leveraged AD in 100% of the successful ransomware attacks over the last 3 years. This discussion will discuss new technologies to help you visualize the risk in your AD and add a layer of security around this very important part of enterprise infrastructure.
Speaker: Tom Atkins, Area Vice President, Attivo
Presented by: Attivo Networks
Two decades of digital transformation and cloud migration have been slowly eroding the traditional network perimeter and with the past two years of transition to more remote work, the walls have come tumbling down. Privileged credentials from access tools (like VPN and RDP) that have been left on endpoints are a valuable target for attack. SAAS applications and Cloud access further expand the proliferation of potentially exposed identities. Once an attacker establishes initial access it becomes trivial for lateral attack movement to take control over critical systems or the entire network. The network perimeter is obsolete. Identity is the new perimeter. Organizations must discover, mitigate and protect their identity risks.
Speaker: Wade Lance, Field Chief Technology Officer, Illusive
Presented by: Illusive
Three forces are colliding to create a perfect cyberstorm: An escalated threat level, a cybersecurity talent shortage and the growing complexity that comes with managing a multitude of security solutions. This storm is driving change, forcing us to break down silos between endpoint, workload, network and identity. It’s driving the need to leverage existing tooling rather than bolting on more. And it is reshaping the focus of managed security services away from “busy work” and toward “expert work.” This session will explore a case study of a new type of MDR service from Open Systems. A new approach that offers shelter from the storm.
Speaker: Mike Meltz, Senior Sales Executive, Open Systems
Presented by: Open Systems
Following the success of Isaac Sacolick’s first book, Driving Digital, in this keynote, Isaac will share stories and insights from his new book publishing this summer, Digital Trailblazer:
Essential Lessons to Jumpstart Transformation and Accelerate Your Technology Leadership. Your business needs more transformation leaders – what Isaac calls Digital Trailblazers—who can lead teams, evolve sustainable ways of working, develop technologies as competitive differentiators, and deliver business outcomes. This keynote highlights who are Digital Trailblazers, how to empower them, and what practices they will need to drive digital transformation.
Speaker: Isaac Sacolick, Bestselling Author, Top Social CIO/CDO, Digital Transformation Influencer, Star CIO
In 2021 we’ve seen major changes in the way that cyber-attacks, including ransomware, unfold. While the concerns and challenges are real, there is a framework to assist in enhancing your cyber-resiliency. Join this session to learn about:
Presented by: Veeam
In most markets, there is an abundance of open IT jobs with fewer people able to fill them – and the positions are getting more expensive. Working remotely is the norm, but not optimal (usually). There is less off-shoring and more resources are focused locally or within the same hemisphere.
Additionally, we are still not recruiting enough woman and minorities into the rank and file, especially senior IT roles, and we’re losing talent to major tech hubs.
Join us at the roundtable with your peers as we dive into solutions to tackle the following challenges:
Moderators:
Helen Knight, Transformation Consultant, Helen Knight Consulting
Diane Huff, SVP Technology, Triangle Services
Dmitriy Sokolovskiy, CISO, Avid Technologies
Becky Frieden, Senior Director, Enterprise Applications and Decision Support Systems, New York Institute of Technology
Suresh Martha, Associate Director, BI Analytics & Reporting, EMD Serono
Zero Trust has got to be one of the most talked about themes in cyber security. While the term means different things to different people, there are two things that can be agreed on: it’s a journey worth taking and microsegmentation is a key pillar of that journey. The next question always is how do you get started?
Regardless of the sophistication of ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you simple steps to protect yourself from these threats that include:
While the journey can seem intimidating, we’ll help you realize that it doesn’t take a team of 100 or a PhD to deploy zero trust microsegmentation that will protect your organization and keep ransomware at bay.
Presented by: Illumio
The Digital Transformation Challenge: More Applications, Frequent Deployments, Greater Quality.
Digital transformation in most enterprises is about improving customer and employee experiences, becoming data-driven organizations, creating differentiating capabilities with emerging technologies, and enabling operational efficiencies with automation. The goal is to evolve products, services, operations, and experiences to compete in a digitally-enabled ecosystem where there is potential disruption from startups, market entrants, health, financial, regulatory, and other factors.
Speaker: Chris Young, Director of Technical Services | Host Connectivity, Micro Focus
Presented by: Micro Focus
Understanding the risk that the business endpoints have to face in the modern threat landscape. Prepare, not to panic about the known and unknown real time vulnerabilities. Recommending a practical approach in securing endpoints through the layered approach strategy.
Key takeaways:
Speaker: Romanus Prabhu Raymond, Global Head – Technical Support, Unified Endpoint Management and Security, ManageEngine
Presented by: ManageEngine
By 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains (Gartner) which are only becoming increasingly complex due to the changes in how modern software is built. These trends, together with new federal regulations, require organizations to take action to ensure the security and integrity of their software. But this is easier said than done.
In this session, we’ll explore the software supply chain as an attack vector – by identifying risks and mitigation strategies throughout the software development processes and environment. Join us to learn how you can meet new requirements and protect your software from these attacks.
Speaker: Mic McCully, Field Strategist, Snyk
Presented by: Snyk
Your business is in danger. Be innovative or become irrelevant. This talk will be a fun look at common problems with modern businesses, how to avoid them, and how to thrive.
Speaker: Mike Bachman, Global Architect & Principal Technologist – Boomi Office of the CTO, Boomi
Presented by: Boomi
You’re a hard-working leader responsible for protecting and improving the backbone of your organization. It’s a never-ending job that takes energy, vigilance, constant improvement and keeping up with all the latest industry trends.
But as you’re giving your best to your organization who’s looking out for you? What about your own personal development? Who can you trust to have no agenda other than your own success?
This session will be unlike any others in the conference. Using an interactive, fireside chat format you’ll hear about how one tech leader took his life and career to the next level by partnering with both an agent and a coach. He’ll tell you about his challenges, what the engagements were like, and the results that he got.
A lively Q&A session will follow, and you can see firsthand if getting a personal champion should be your next career move.
Speaker: Robert Field, VP Global Digital Solutions, Precipart
Rick Diana, Talent Agent, Trinitas Talent Management
Pete Cafarchio, Executive Coach, Coach Pete
Speaker: Les Correia, Enterprise Cybersecurity & Risk (ECR) – Global Head of Application Security, Estee Lauder
New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.
Join this session and unpack some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.
This presentation will discuss:
Presented by: Darktrace
With Incident Response as the new normal, ensuring that our systems and processes support that effort and threat hunting are working as expected. We will discuss why and how to establish a Continuous Security Validation (CSV) program within your organization. Specifically, how such a program evolves beyond Breach and Attack Simulation (BAS) and provides teams a continuous feedback loop to understand their posture and identify gaps as they arise.
Speaker: Joseph Mastromarino, Sales Engineer, AtackIQ
Presented by: AttackIQ
Building a compelling business case for digital transformation is a challenge faced by many technology leaders. It becomes even more complicated when the change beneficiaries are not the funders, and the choice to invest in technology feels like it is taking services from our most vulnerable citizens. Helen Knight, an award-winning leader of non-profit digital transformations will share how she modernized emergency shelters and food banks, and how she uses technology to optimize services for people struggling with poverty. Helen will also share ways technology leaders can use their skills to help people today, and invite you to help solve the challenges ahead.
Speaker: Helen Knight, Transformation Consultant, Helen Knight Consulting