IT Summit - Fall
Tuesday-Wednesday, October 4-5, 2016

SynerComm's 14th Annual IT Conference

Registration Closed

Click on a track to filter the results below


Back to Top

Title
Rapid Deployment & Scaling of Next Gen Security – Build Now, Pay When You Need IT
Abstract
How can you be agile and secure in this time of rapid and disruptive change? Join us for a deep dive review of F5. Much more than just a load balancer, F5 is Security Platform enabling businesses to quickly adapt to next generation infrastructure and security demands. Addressing SSL decryption, distributed denial of service (DDOS) attacks, web application firewalling and other key topics will be openly discussed.
Presented by
SynerComm with F5

Back to Top

Title
Hyper-Convergence Cap & Grow Strategy – Deploy Faster While Reducing Network, Storage and Compute Costs
Abstract
An open presentation and whiteboard discussion on hyper-convergence technology. This session will dive deep into what defines hyper-convergence technology. We will explore how the environments are exceptionally simple to manage, especially in relation to traditional storage and compute environments. Participants will have the opportunity to take a guided test drive of a full Nutanix environment and consider strategies for integrating hyper-convergence into their existing environments.
Presented by
SynerComm with Nutanix

Back to Top

Title
IT Summit Kickoff: Optimizing Disruptive Technologies in a Hyper-Digital World
Abstract
The hyper speed at which technology is moving today is causing disruption to ripple out like a pebble in a pond, affecting not only products and business models, but also disrupting the behaviors and our needs of customers. Keeping pace with our customer's digital expectations requires us to understand the key technology trends ushering us into a new hyper-digital world. The Hyper-digital age is fueled by three trends: Hyper-connectivity, Hyper-automation, and Hyper-adoption. In this session, Karl Gouverneur, Vice President and CTO at Northwestern Mutual, will clarify these trends and highlight examples of how each can not only disrupt our business, but also offer opportunity for differentiation in the marketplace. Karl will address the sea of technology start-up companies that pop up daily to rival market leaders and provide insight into the unbundling of giants for which we should all prepare!
Speaker
Karl Gouverneur Details
Presented by

Back to Top

Title
Breaking Down the Hacking of Evil Corp: How to Defend Against Target Attacks
Abstract
Hopefully by now you've witnessed the Hacking of Evil Corp by SynerComm's AssureIT team. During the presentation, SynerComm's pentesters demonstrated common and real attacks against a live corporate network. This Breaking Down the Hacking of Evil Corp presentation takes a look at how companies can defend themselves against many of the hacks seen in the original presentation. You will learn what controls are essential, how they should be implemented and how they should be monitored.
Speaker
AssureIT Team Details
Presented by

Back to Top

Title
Beyond Transformation
Abstract
Technology is a continual state of flux, but the current state of transformation is different in that it will radically change the way in which we – individuals and businesses – work and make decisions. Sweeping changes resulting from the adoption and maturation of mobility, cloud computing, Big Data, automation, cognitive computing and the Internet of Things will reshape business operations, processes and priorities. Today, we think and talk about the changing technology, but not the results of that change. The 2112 Group's Larry Walsh looks beyond the changing technology to explore the downstream impact of IT transformation and what it means to IT businesses in terms of operations, management, security and outcomes.
Speaker
Larry Walsh Details
Presented by
The 2112 Group

Back to Top

Title
The Broken Cloud Datacenter Security Model
Abstract
In this session, we'll cover prevailing datacenter architectures, how we got to this point, and why the current methods of securing a datacenter are at odds with the promise of the Software Defined DataCenter.
Speaker
Matt Ebben Details
Presented by
vArmour

Back to Top

Title
2016 Industry Trends and How to Deal with Them
Abstract

Enterprises are moving data to the Cloud, embracing the mobility of today's users and accelerating the use of encryption while attackers are shifting their focus from credit cards to PII and moving their sights from the data center to the employee. All of this has combined to render traditional corporate security models impotent.

CISO's today need to present comprehensive architectures and tools that allow businesses to grow, enable users to be agile and protected all while trusting no one, inspecting everything and sharing threat intel globally. We will explore this concept focusing on 0-Days and Behavioral Analysis.

Speaker
Bil Harmer Details
Presented by
Zscaler

Back to Top

Title
Why visibility matters... to Network Ops, Dev Ops, Security Ops and the Boardroom
Abstract
With virtualization, IoT, mobility, "Big Data" and the sheer complexity of enterprise networks on the rise, companies need dynamic network monitoring of security and application performance to provide the business a critical advantage. Ixia's Kristi Thiele will discuss how network visibility architectures will deliver immediate and ongoing insight of production networks. This will maximize your company's productivity and profitability, as well as a quantifiable return on new and existing IT investments. You'll hear how two enterprise organizations have been able to reduce their capital investment in security while experiencing an increased awareness of network and security anomalies.
Speaker
Kristi Thiele Details
Presented by

Back to Top

Title
SDN, NFV, VNF, *aaS and other buzzwords. What does CLOUD Infrastructure really mean, separating reality from marketing?
Abstract
In this session we will  provide an understanding of the exact definition of cloud and what makes cloud different from virtual environments. Also, why automation and cloud seem the same but are very different. This session will explore OpenStack from a usability perspective and cover AWS to OpenStack, a dashboard to project mapping. This session will show how to take advantage of Public clouds. In conclusion, this session will provide an understanding of the cloud components that are practical to you
Speaker
Geoff Korrub Details
Presented by

Back to Top

Title
Managing WiFi in a Software Defined World
Abstract
Wireless LANs have traditionally been managed as static environments, without any ability to respond to their environment or intelligently manage user traffic. Network designers formally needed to elect between cost and throughput, solely based on static device density. To solve this issue, Aerohive Networks is proud to introduce Software Defined LAN (SD-LAN) capable wireless and wired capability using Aerohive's HiveManager NG and SD-LAN capable, machine-learning, autonomous, and adaptive access points.
Speaker
Bill Lundgren Details
Presented by

Back to Top

Title
The First 72 Hours
Abstract

This presentation will demonstrate, using actual examples seen over the past 15 years, the best practices incident responders are using in the initial 72-hours of an incident response. While containing and recovering data may seem to be the right thing to do, it also may be the most counterproductive to removing threats from your environment. Incident responders, business leaders, governance managers, legal counsels, law enforcement, and policy makers must understand the questions to ask, expectations, processes, and procedures that need to happen in the first 72-hours in order for the organization to efficiently and effectively respond to an incident.

Speaker
Ryan Vela Details
Presented by

Back to Top

Title
The Human Factor in the Age of Cyber Conflict
Abstract
With new technologies appearing daily, attackers have a constant stream of potential new tools, tactics and practices to use as offensive weapons. This constantly expanding attack surface forces defenders to assess each as well in an ever-escalating arms race. But this can cause an over-dependence on technology and an under-appreciation of the human nature and behavior of adversaries. The desire for waves of more machine-generated data to consume and assess is in fact boggling minds and breaking team and process effectiveness. As human defenders realize this, they shift strategies to proactive approaches, to focus on fundamentals that truly uncover meaningful threats, and force multipliers that dramatically accelerate threat investigation and disruption.
Speaker
Jerry Skurla Details
Presented by

Back to Top

Title
Secure Access As A Growth Requirement – Why It's Mission Critical For Humans In The Digital Age
Abstract

The Internet of Things is projected to drive $19 Trillion in growth activity by year 2025. Global Internet users and millennials world-wide are being added at 2 billion users annually through the year 2020. The average number of devices today's end-users bring to the digital "table" averages between five-and-seven, combining Smart Phones, Tablets, PCs and Work Stations. In the hyper-competitive world of applications, 44% are introduced with known and unknown security gaps meant to be addressed post-beta-test-launch. Today's emerging business leaders prefer mobility and BYOD as their work standard, accessing the ability to be productive irrespective of geography, location and time-zone. Over 55% of enterprise businesses are incorporating the Cloud as a key part of its' collective digital strategy in 2017.

In this informative and innovative presentation, Pulse Secure Access Evangelist Jim Hebler is joined by 25-year U.S. Military-Cybersecurity and Pulse Secure Ninja Architect Mike Riemer to help define and understand rapid change in today's emerging mobile environment, how business needs to grow through a device-obsessed market-place and how embracing a well-defined Secure Access strategy – leveraging real-time authenticated tunnels to Applications, the Cloud, Devices – complete with front-edge network monitoring and visibility – can help business thrive.

Lead by Mobility Visionary and Pulse CEO Sudhakar Ramakrishna, former Global Product Lead of Citrix's $2.5 billion Global Mobility Division – Pulse Secure serves as the Gold Standard for 13 of 15 free world networks, 90% of the world's leading Financial Institutions and 80% of the Fortune 100. Learn about where we are, where we're heading and how Secure Access is mission-critical for navigating today's disparate digital marketplace from this key Synercomm Global Partner.

Speaker
Jim Hebler & Mike Riemer Details
Presented by

Back to Top

Title
The Ultimate ROI: Reduce 7 Vendors to 1, Makes Users Happy and Secure Identity
Abstract
Our networks have changed with a de-parameterization as data resides everywhere. To add to this complication is the fact that users are computing off network and there are 3rd parties always gaining access in. The worst part is that most networks can be hacked by using credentials that are readily available on the dark web. Centrify will address these concerns but more importantly lay out a framework of how to address this. With a proven identity methodology you can take a phased approach to getting the upper hand back. By simplifying process reducing the number of vendors involved in securing identity; risk and cost reductions become a reality.
Speaker
Brian Krause Details
Presented by

Back to Top

Title
The Need To Keep Visibility in Rapidly Changing Diversified IT Environments
Abstract
Information flow today spans across a rapidly growing digital universe that includes our traditional private networks, data centers, virtualized environments and is now pushing out to new boundaries which include the public cloud and Internet of Things. Any changes in how information flows and/or how users access data has significant impact on the ability to perform monitoring and security analytics. This presentation will cover critical aspects of the challenges being faced, decisions that need to be made and clarify common misconceptions or misunderstandings which can severely impact data visibility and costs associated with monitoring and securing data in diversified environments.
Speaker
Buck Bundhund Details
Presented by

Back to Top

Title
Keeping Insider Risk at Bay
Abstract
Is that activity you're seeing a malicious user? Is it someone who made a mistake? Is it coming from an account whose credentials were compromised? Is it command and control traffic? How confident are you? As security programs are maturing, attention is turning to threats emanating from inside the network. Doug Copley will discuss seven profiles of highly risky users, outline how unified security solutions help organizations reduce insider risk, and present a real-world case study of how a software organization protected themselves.
Speaker
Doug Copley Details
Presented by

Back to Top

Title
Hack the Planet: repairing the broken security industry
Abstract
The security world is in fast-evolution. Unlike its mature brothers (routing, switching, compute, and storage) there are very few actual standards. What are manufacturers doing to fix this. How are the implementing standards and why is it important? Explore the stuttering beginnings of an interoperability initiative and laugh about the inequities and challenges of an engineer trying to make a difference.
Speaker
James Cabe Details
Presented by

Back to Top

Title
Assessing The Maturity Of Your Security Program
Abstract
Information assurance is the practice of managing risks pertaining to information and data processing environments. Effectively managing risk requires a deep understanding of the weaknesses that leave assets vulnerable and the controls that protect them. Over time, organizations will be required to assess the maturity of their information security program. An effective information security program will include elements of leadership commitment and participation, well designed and communicated policies and standards, effective and meaningful controls, an engaged user population, evidence of continuous improvement, and risk and compliance management.
Speaker
Bill Curtis & Paul Hendler Details
Presented by

Back to Top

Title
Attacking Microsoft Productivity Applications
Abstract
A poignant voyage in to the into the fun world of active directory linked, public, single-factor authentication endpoints. This talk will show why having a public Microsoft productivity application can end in disaster. Attendees will see the major security flaws possible with Sharepoint, Lync, and Outlook Web Access. Simple flaw mitigations will also be shared.
Speaker
Scot Berner Details
Presented by

Back to Top

Title
Hybrid Infrastructure 1: Overview of Hybrid Infrastructure Strategies – Your Competition Has One, You Should Too
Abstract
The "Cloud" is more than just a concept. Cloud solutions are real and adoption is rapidly growing. Learn about the most common types of Clouds companies utilize, how they are integrated with existing infrastructure and how they are leveraged to drive business initiatives.
Speaker
Nate Ressel Details
Presented by

Back to Top

Title
Agile Security 1: Tactical vs Strategic – What Approach is Your Business Taking
Abstract
Mobility, IoT, cloud computing, Agile work schedules and locations... company security perimeters have dissolved and are harder to define. Learn what IT organizations are doing to adapt to this changed reality.
Speaker
Lisa Niles Details
Presented by

Back to Top

Title
5 Audit Controls That Many Organizations Neglect
Abstract
IT auditors examining your environment are looking for how your organization is implementing standards, but several controls are found lacking in many organizations. We will look at several examples of policies, procedures, and plans to implement in your environment to have a more successful IT audit.
Speaker
Drew Hjelm Details
Presented by

Back to Top

Title
Defensive Wins That Drive Pentesters Crazy
Abstract
Receiving penetration test results can be brutal. You've patched your systems, AV is up to date, but the tester took it all. How did this happen and how could you prevent it? This talk will look at simple yet effective defensive wins which will leave penetration testers (and attackers) spinning their wheels. Through the experience of a seasoned penetration tester, we'll take a detailed look at what organizations can do to create secure networks.
Speaker
Travis Kaun Details
Presented by

Back to Top

Title
Hybrid Infrastructure 2: Operating and Managing Hybrid Infrastructure – Operational Efficiency and Effectiveness
Abstract
Hybrid infrastructure environments are supporting the rapid changes in business needs. How can you keep up? Learn about solutions that help organizations manage and control these fast changing environments and avoid costly traps.
Speaker
Nate Ressel Details
Presented by

Back to Top

Title
Agile Security 2: Identity Based Security – Employee Satisfaction AND Improved Security
Abstract
Identity vulnerabilities are 4 of the top 6 risks we find. Learn how usernames and passwords are your weakest link and how you can help your business address it.
Speaker
Lisa Niles Details
Presented by

Back to Top

Title
Are You Doing Continuous Penetration Testing?
Abstract
Business practices change, IT migrations occur regularly,and the marketing team just stood up a new WordPress without notifying security. Many companies undergo a pentest once a year, but networks, services, and applications are always changing. This talk will highlight the benefits of continuous security testing and will debunk false assumptions and myths.
Speaker
Casey Cammilleri Details
Presented by

Back to Top

Title
PowerShell: Fear But Don't Lose Hope
Abstract
You've heard the AssureIT team rant and rave about PowerShell. Maybe you've even seen PowerShell show up in your pentest report findings. If you're curious to see exactly what harm can be wrought in your environment at the hands of powershell.exe, this talk is for you. You won't leave too depressed; defensive measures will also be demonstrated including how to audit and collect the correct events for detecting malicious PowerShell activity.
Speaker
Jason Lang Details
Presented by

Back to Top

Title
Hybrid Infrastructure 3: Cap and Grow with Hybrid Infrastructure – Quick Wins for Your Business
Abstract
Ready or not, clouds are here and being integrated with existing on-premises infrastructure to form solutions. Join us to discuss approaches to you can take today to deliver timely, agile solutions with hybrid infrastructure to meet your business demands.
Speaker
Nate Ressel Details
Presented by

Back to Top

Title
Agile Security 3: Smart Segmentation – Isolate and Protect Your Business Assets
Abstract
It is not a matter of "if," it is a matter of "when" a security incident will happen to you. In this session, we will discuss force multiplier concepts, strategies and tools to help you minimize the blast radius and more quickly identify and address security issues.
Speaker
Lisa Niles Details
Presented by

Back to Top

Title
Let's Get Kraken: Why You Should Test Account Passwords
Abstract
Self managed password cracking and auditing provides insight into your organization of previously unknown business practices and potentially weak/dormant accounts. This talk will cover real world examples identified over the past few years and provide access to a free, open source tool specially developed to help manage your password cracking needs.
Speaker
Hans Lakhan & Casey Cammilleri Details
Presented by

Back to Top

Title
Fantastic Data and Where to Find It: A Look Into The Socially Accepted Perpetual Profiling
Abstract
Join information assurance consultant Sam Link as he demonstrates how attackers and.. well anyone, can readily aggregate information from public sources and leverage it to craft targeted attacks. This talk will investigate OSINT (Open-Source Intelligence) tools and techniques used for the collection and interpretation of your publicly available information.
Speaker
Sam Link Details
Presented by

Back to Top

Title
Hybrid Infrastructure 4: Tuning Enterprise Class Wireless
Abstract
In this session you will learn how and when to create SSIDs, custom radio profiles, look at signal to noise ratios, co-channel interference to tune power and channels.
Speaker
Andy Piche Details
Presented by

Back to Top

Title
Agile Security 4: Configuration Assurance – Tune and Use What You Already Have
Abstract
As you consider investing in new solutions, learn how you can also make the highest and best use of the investments you have already made.
Speaker
Lisa Niles Details
Presented by