West IT & Security Leaders Forum Agenda

Are you inspired by the recent advancements in AI? Are people in your organization fearing job losses? Do you not know where to start or what to focus on to ensure your organization’s competitiveness in the disruptive world of AI, machine learning, and analytics? Isaac will review the latest data on AI adoption in the enterprise and share five critical areas to guide your organization.

A hybrid cloud strategy enhances business flexibility by allowing them to address their needs using a combination of public cloud, software as a service (SaaS) and in-house IT resources. This hybrid strategy is the new operating model for IT, proven to boost innovation, ensure compliance in the public cloud, while reducing overall complexity and keeping costs under control.

During this session, we will be discussing the reasoning behind a hybrid cloud strategy, its impact on operations, process, compliance and most importantly, your people.

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against Offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.

In this session, learn about: 

  • Paradigm shifts in the cyber landscape 
  • Advancements in offensive AI attack techniques
  • The Immune System Approach to cybersecurity and defensive, Autonomous Response capabilities 
  • Real-world examples of emerging threats that were stopped with Cyber AI

While finding talent today may not be as challenging, attracting and retaining them can be.  We all too often focus on the upcoming generation titles and traits, trying to define what they want and how we can provide it.  Finding the intersection of what your company can genuinely offer as experience with what they want is the value proposition that defines acceptance or rejection.  Chances are your people leaders today are of a different generation class, which may mean “flexible” is perceived more like “lazy.”  How you connect these generations is the key to leading in the divide.

Most organizations implement Data Encryption Keys to secure data. However, how many are sure that their encryption is allowing interoperability with all of its clients to achieve their fullest business potential? That they are reaching their full business potential? OASIS KMIP(Key Management Interoperability Protocol) enables such an opportunity yet not many organizations take advantage of this resource. In this session, the Speaker is going to discuss the current trends in the Data Encryption, options available in the market, advantages of OASIS KMIP, what enterprise architects must include when designing their products and solutions, and why we should demand KMIP compliant solutions from vendors.

Is deception technology only for mature security operations or is it an effective cybersecurity solution to help companies mature their capabilities? Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. Learn how deploying decoys throughout your environment can build the bridge strengthening all the levels in your security stack. Join us for this session where you’ll hear about real-world deployment experiences, the value customers are realizing, and what Red Teams are saying about deception-based threat detection.

Is deception technology only for mature security operations or is it an effective cyber security solution to help companies mature their capabilities? Organizations continue to build their security stacks, yet advanced threats and insiders continue to breach networks and extract valuable data. Learn how deploying decoys throughout your environment can build the bridge strengthening all the levels in your security stack. Join us for this session where you’ll hear about real-world deployment experiences, the value customers are realizing, and what Red Teams are saying about deception-based threat detection.

CEO & Author Bart McDonough discusses the CIA (Confidentiality, Integrity, Availability) Triad and a back to the basics approach for protecting our information & systems

How can access management keep up with a multi-vendor (AWS, Azure, GCP, OpenStack), multi-role (3rd party, developer, database admin), and multi-protocol (SSH/RDP/HTTPS) world where nothing is static? We will discuss why granting, revoking, and managing access to the critical infrastructure needs innovation. Learn how identities are federated, access management is mostly automated with Zero Trust authentication, global cloud inventories auto-discovered, deployment is fast & scalable – and access is granted just-in-time, with the right amount of privilege for the task at hand.

As the importance of a robust security infrastructure continues to grow, many organizations are struggling, stuck in a notion that security hinders innovation. However, many would argue this is not the case and an effective cybersecurity platform can in fact accelerate innovation.

In this session, we will discuss how to utilize cybersecurity technologies and strategies to provide a bedrock of innovation across products and processes.

As the importance of a robust security infrastructure continues to grow, many organizations are struggling, stuck in a notion that security hinders innovation. However, many would argue this is not the case and an effective cybersecurity platform can in fact accelerate innovation.

In this session, we will discuss how to utilize cybersecurity technologies and strategies to provide a bedrock of innovation across products and processes.

It’s no surprise that cloud computing has grown in popularity as much as it has, as its allure and promise offer newfound flexibility for enterprises, everything from saving time and money to improving agility and scalability. On the other hand, on-premise applications are reliable, secure, and allow enterprises to maintain a level of control that the cloud often cannot. But there’s agreement among IT decision-makers that in addition to their on-premise and legacy systems, they’ll need to leverage new cloud and SaaS applications to achieve their business goals.

According to Gartner, the RPA market grew over 63% last year, making it the fastest-growing enterprise software category. The beauty of RPA is that it enables customers to bring a level of automation to legacy processes without having to rip and replace legacy systems. But when, where, and how should it be applied to ensure effective use?

Is your IT department struggling to deliver successful projects? Is your organization failing to embrace the outcomes of completed projects? This session will address the root-causes and symptoms of an underperforming project portfolio and leave the audience with practical solutions to help IT leaders drive value for the business.

Mobile devices are a critical tool for productivity in today’s mobile-first, cloud-driven world, but how are we protecting the data being accessed outside of the perimeter? With mobile proliferating across the enterprise, a new approach to security is required to address the newly emerging challenges and risks.

The way we work is changing. Technological advancements, an increasingly varied workforce, and new employee demands are triggering fundamental shifts in the working world. Join us to learn more about the expansion of the remote and distributed workforce, in line with the future of work trends, and how a unified approach to cloud-based communications and collaboration can help to engage employees and improve productivity across the digital workplace.

There is a new breed of cyber attacker on the rise. Scalable deception technology finds sophisticated attackers that existing detection vendors cannot by deploying a minefield of highly-credible decoys (i.e. emulations) alongside assets of any kind within your network. Through accurate and rapid detection one can reduce the impact from the destruction of enterprise assets, theft of data, and overall disruption of business operations. Advanced real-time forensics and analysis, coupled with high accuracy, uniquely empowers your SOC to take immediate action (high-fidelity) and disrupt all attacks within the network perimeter or cloud. Terminate the attack through a rich eco-system partnership that integrates with your existing operations and defense-in-depth vendor solutions, out-of-the-box. Deception technology improves compliance, including GDPR, PCI-3.2, HIPAA data, and many other national and state data breach laws, along with other regulatory requirements. A multi-tiered deception platform provides the greatest breadth and depth of coverage at the lowest cost to the enterprise. Are you ready to get offensive with your cyber defense?

Businesses have high expectations of their technical investment. New technologies must reduce costs, increase security, enhance productivity, or improve workflows and communications. But despite the major role technology strategy plays, the relationship between the three pillars of IT, Security, and the Business remains a challenge for many.

It’s clear that while 5G presents a wealth of opportunity for innovation, but not without its challenges. During this session, we will explore the endless opportunities 5G can provide while covering the key steps to ensure you make the most out of this revolutionary change in the industry.

Financial service institutions and online merchants have unique challenges when it comes to fraud and is facing ever-more-dangerous threats. 

The digital economy is forcing enterprises to transform how they connect customers, partners, employees, and operations. Today’s market leaders credit their speed and business advantages to their digital platform.  Equinix will share insights into how global industry leaders deployed a digital edge by removing distance, leveraging edge & cloud computing, and interconnecting ecosystems.

Delivering endpoint security in an increasingly mobile environment comes with some major challenges. Growing businesses need to take a new approach to ensure they stay protected, to look after remote users, and to do all these things while keeping costs down and reducing the administration overhead. This session will explore models that add new levels of reassurance to IT security by allowing companies of all sizes to gain access to the best equipment and most talented security experts.

According to Flexera, 94% of IT operations are already using cloud technologies but 47% say that they have less control over application estate as it moves into the cloud. Clearly migrating to the cloud is not without its challenges. Many issues with cloud migration come from a lack of implementing best practices. When migrating to the cloud, organizations failed to understand application dependencies before deploying or did not test everything before deploying or did not consider the effect consolidation, virtualization or cloud security would have on the infrastructure.  In the end, struggles with cloud migration results in loss of end-user visibility and costly performance degradations.  In this session, find out the six steps to a successful cloud migration so you can gain back control and deliver on the promise of flawless end-user experience.

As businesses and organizations embrace their own digital transformation (DX) journey, change management becomes a critical success factor. However, success heavily depends on the people using the technology. Change management goes beyond acquiring an executive sponsor or providing staff training, it is about changing the mindset of the employees, impacts to their daily routine and how to operationalize it. The promise of rapid deployment and time to value hinge on having a strong change management program in place. How do we can change adopted across all levels of the company?