IT Summit - Fall
Tuesday-Wednesday, October 4-5, 2016
SynerComm's 14th Annual IT Conference
Upcoming Sessions
Information Subject to Change
Click on a track to filter the results below
Rapid Deployment & Scaling of Next Gen Security – Build Now, Pay When You Need IT
Tuesday • 1:00PM - 3:00PM
• Room: Progress Room
- Title
- Rapid Deployment & Scaling of Next Gen Security – Build Now, Pay When You Need IT
- Abstract
- How can you be agile and secure in this time of rapid and disruptive change? Join us for a deep dive review of F5. Much more than just a load balancer, F5 is Security Platform enabling businesses to quickly adapt to next generation infrastructure and security demands. Addressing SSL decryption, distributed denial of service (DDOS) attacks, web application firewalling and other key topics will be openly discussed.
- Presented by
- SynerComm with F5
Hyper-Convergence Cap & Grow Strategy – Deploy Faster While Reducing Network, Storage and Compute Costs
Tuesday • 1:00PM - 3:00PM
• Room: Prosperity Room
- Title
- Hyper-Convergence Cap & Grow Strategy – Deploy Faster While Reducing Network, Storage and Compute Costs
- Abstract
- An open presentation and whiteboard discussion on hyper-convergence technology. This session will dive deep into what defines hyper-convergence technology. We will explore how the environments are exceptionally simple to manage, especially in relation to traditional storage and compute environments. Participants will have the opportunity to take a guided test drive of a full Nutanix environment and consider strategies for integrating hyper-convergence into their existing environments.
- Presented by
- SynerComm with Nutanix
Keynote: IT Summit Kickoff: Optimizing Disruptive Technologies in a Hyper-Digital World
Tuesday • 4:00PM - 5:00PM
• Room: Serenity Room
- Title
- IT Summit Kickoff: Optimizing Disruptive Technologies in a Hyper-Digital World
- Abstract
- The hyper speed at which technology is moving today is causing disruption to ripple out like a pebble in a pond, affecting not only products and business models, but also disrupting the behaviors and our needs of customers. Keeping pace with our customer's digital expectations requires us to understand the key technology trends ushering us into a new hyper-digital world. The Hyper-digital age is fueled by three trends: Hyper-connectivity, Hyper-automation, and Hyper-adoption. In this session, Karl Gouverneur, Vice President and CTO at Northwestern Mutual, will clarify these trends and highlight examples of how each can not only disrupt our business, but also offer opportunity for differentiation in the marketplace. Karl will address the sea of technology start-up companies that pop up daily to rival market leaders and provide insight into the unbundling of giants for which we should all prepare!
- Speaker
- Karl Gouverneur Details
- Presented by
Keynote: Breaking Down the Hacking of Evil Corp: How to Defend Against Target Attacks
Tuesday • 6:00PM - 8:00PM
• Room: Serenity Room
- Title
- Breaking Down the Hacking of Evil Corp: How to Defend Against Target Attacks
- Abstract
- Hopefully by now you've witnessed the Hacking of Evil Corp by SynerComm's AssureIT team. During the presentation, SynerComm's pentesters demonstrated common and real attacks against a live corporate network. This Breaking Down the Hacking of Evil Corp presentation takes a look at how companies can defend themselves against many of the hacks seen in the original presentation. You will learn what controls are essential, how they should be implemented and how they should be monitored.
- Speaker
- AssureIT Team Details
- Presented by
Keynote: Beyond Transformation
Wednesday • 8:30AM - 9:20AM
• Room: Serenity Room
- Title
- Beyond Transformation
- Abstract
- Technology is a continual state of flux, but the current state of transformation is different in that it will radically change the way in which we – individuals and businesses – work and make decisions. Sweeping changes resulting from the adoption and maturation of mobility, cloud computing, Big Data, automation, cognitive computing and the Internet of Things will reshape business operations, processes and priorities. Today, we think and talk about the changing technology, but not the results of that change. The 2112 Group's Larry Walsh looks beyond the changing technology to explore the downstream impact of IT transformation and what it means to IT businesses in terms of operations, management, security and outcomes.
- Speaker
- Larry Walsh Details
- Presented by
- The 2112 Group
The Broken Cloud Datacenter Security Model
Wednesday • 9:30AM - 10:10AM
• Room: Harmony Room
- Title
- The Broken Cloud Datacenter Security Model
- Abstract
- In this session, we'll cover prevailing datacenter architectures, how we got to this point, and why the current methods of securing a datacenter are at odds with the promise of the Software Defined DataCenter.
- Speaker
- Matt Ebben Details
- Presented by
- vArmour
2016 Industry Trends and How to Deal with Them
Wednesday • 9:30AM - 10:10AM
• Room: Progress Room
- Title
- 2016 Industry Trends and How to Deal with Them
- Abstract
Enterprises are moving data to the Cloud, embracing the mobility of today's users and accelerating the use of encryption while attackers are shifting their focus from credit cards to PII and moving their sights from the data center to the employee. All of this has combined to render traditional corporate security models impotent.
CISO's today need to present comprehensive architectures and tools that allow businesses to grow, enable users to be agile and protected all while trusting no one, inspecting everything and sharing threat intel globally. We will explore this concept focusing on 0-Days and Behavioral Analysis.
- Speaker
- Bil Harmer Details
- Presented by
- Zscaler
Why visibility matters... to Network Ops, Dev Ops, Security Ops and the Boardroom
Wednesday • 9:30AM - 10:10AM
• Room: Prosperity Room
- Title
- Why visibility matters... to Network Ops, Dev Ops, Security Ops and the Boardroom
- Abstract
- With virtualization, IoT, mobility, "Big Data" and the sheer complexity of enterprise networks on the rise, companies need dynamic network monitoring of security and application performance to provide the business a critical advantage. Ixia's Kristi Thiele will discuss how network visibility architectures will deliver immediate and ongoing insight of production networks. This will maximize your company's productivity and profitability, as well as a quantifiable return on new and existing IT investments. You'll hear how two enterprise organizations have been able to reduce their capital investment in security while experiencing an increased awareness of network and security anomalies.
- Speaker
- Kristi Thiele Details
- Presented by
SDN, NFV, VNF, *aaS and other buzzwords. What does CLOUD Infrastructure really mean, separating reality from marketing?
Wednesday • 9:30AM - 10:10AM
• Room: Serenity Room
- Title
- SDN, NFV, VNF, *aaS and other buzzwords. What does CLOUD Infrastructure really mean, separating reality from marketing?
- Abstract
- In this session we will provide an understanding of the exact definition of cloud and what makes cloud different from virtual environments. Also, why automation and cloud seem the same but are very different. This session will explore OpenStack from a usability perspective and cover AWS to OpenStack, a dashboard to project mapping. This session will show how to take advantage of Public clouds. In conclusion, this session will provide an understanding of the cloud components that are practical to you
- Speaker
- Geoff Korrub Details
- Presented by
Managing WiFi in a Software Defined World
Wednesday • 10:30AM - 11:10AM
• Room: Harmony Room
- Title
- Managing WiFi in a Software Defined World
- Abstract
- Wireless LANs have traditionally been managed as static environments, without any ability to respond to their environment or intelligently manage user traffic. Network designers formally needed to elect between cost and throughput, solely based on static device density. To solve this issue, Aerohive Networks is proud to introduce Software Defined LAN (SD-LAN) capable wireless and wired capability using Aerohive's HiveManager NG and SD-LAN capable, machine-learning, autonomous, and adaptive access points.
- Speaker
- Bill Lundgren Details
- Presented by
The First 72 Hours
Wednesday • 10:30AM - 11:10AM
• Room: Progress Room
- Title
- The First 72 Hours
- Abstract
This presentation will demonstrate, using actual examples seen over the past 15 years, the best practices incident responders are using in the initial 72-hours of an incident response. While containing and recovering data may seem to be the right thing to do, it also may be the most counterproductive to removing threats from your environment. Incident responders, business leaders, governance managers, legal counsels, law enforcement, and policy makers must understand the questions to ask, expectations, processes, and procedures that need to happen in the first 72-hours in order for the organization to efficiently and effectively respond to an incident.
- Speaker
- Ryan Vela Details
- Presented by
The Human Factor in the Age of Cyber Conflict
Wednesday • 10:30AM - 11:10AM
• Room: Prosperity Room
- Title
- The Human Factor in the Age of Cyber Conflict
- Abstract
- With new technologies appearing daily, attackers have a constant stream of potential new tools, tactics and practices to use as offensive weapons. This constantly expanding attack surface forces defenders to assess each as well in an ever-escalating arms race. But this can cause an over-dependence on technology and an under-appreciation of the human nature and behavior of adversaries. The desire for waves of more machine-generated data to consume and assess is in fact boggling minds and breaking team and process effectiveness. As human defenders realize this, they shift strategies to proactive approaches, to focus on fundamentals that truly uncover meaningful threats, and force multipliers that dramatically accelerate threat investigation and disruption.
- Speaker
- Jerry Skurla Details
- Presented by
Secure Access As A Growth Requirement – Why It's Mission Critical For Humans In The Digital Age
Wednesday • 10:30AM - 11:10AM
• Room: Serenity Room
- Title
- Secure Access As A Growth Requirement – Why It's Mission Critical For Humans In The Digital Age
- Abstract
The Internet of Things is projected to drive $19 Trillion in growth activity by year 2025. Global Internet users and millennials world-wide are being added at 2 billion users annually through the year 2020. The average number of devices today's end-users bring to the digital "table" averages between five-and-seven, combining Smart Phones, Tablets, PCs and Work Stations. In the hyper-competitive world of applications, 44% are introduced with known and unknown security gaps meant to be addressed post-beta-test-launch. Today's emerging business leaders prefer mobility and BYOD as their work standard, accessing the ability to be productive irrespective of geography, location and time-zone. Over 55% of enterprise businesses are incorporating the Cloud as a key part of its' collective digital strategy in 2017.
In this informative and innovative presentation, Pulse Secure Access Evangelist Jim Hebler is joined by 25-year U.S. Military-Cybersecurity and Pulse Secure Ninja Architect Mike Riemer to help define and understand rapid change in today's emerging mobile environment, how business needs to grow through a device-obsessed market-place and how embracing a well-defined Secure Access strategy – leveraging real-time authenticated tunnels to Applications, the Cloud, Devices – complete with front-edge network monitoring and visibility – can help business thrive.
Lead by Mobility Visionary and Pulse CEO Sudhakar Ramakrishna, former Global Product Lead of Citrix's $2.5 billion Global Mobility Division – Pulse Secure serves as the Gold Standard for 13 of 15 free world networks, 90% of the world's leading Financial Institutions and 80% of the Fortune 100. Learn about where we are, where we're heading and how Secure Access is mission-critical for navigating today's disparate digital marketplace from this key Synercomm Global Partner.
- Speaker
- Jim Hebler & Mike Riemer Details
- Presented by
The Ultimate ROI: Reduce 7 Vendors to 1, Makes Users Happy and Secure Identity
Wednesday • 11:15AM - 11:55AM
• Room: Harmony Room
- Title
- The Ultimate ROI: Reduce 7 Vendors to 1, Makes Users Happy and Secure Identity
- Abstract
- Our networks have changed with a de-parameterization as data resides everywhere. To add to this complication is the fact that users are computing off network and there are 3rd parties always gaining access in. The worst part is that most networks can be hacked by using credentials that are readily available on the dark web. Centrify will address these concerns but more importantly lay out a framework of how to address this. With a proven identity methodology you can take a phased approach to getting the upper hand back. By simplifying process reducing the number of vendors involved in securing identity; risk and cost reductions become a reality.
- Speaker
- Brian Krause Details
- Presented by
The Need To Keep Visibility in Rapidly Changing Diversified IT Environments
Wednesday • 11:15AM - 11:55AM
• Room: Progress Room
- Title
- The Need To Keep Visibility in Rapidly Changing Diversified IT Environments
- Abstract
- Information flow today spans across a rapidly growing digital universe that includes our traditional private networks, data centers, virtualized environments and is now pushing out to new boundaries which include the public cloud and Internet of Things. Any changes in how information flows and/or how users access data has significant impact on the ability to perform monitoring and security analytics. This presentation will cover critical aspects of the challenges being faced, decisions that need to be made and clarify common misconceptions or misunderstandings which can severely impact data visibility and costs associated with monitoring and securing data in diversified environments.
- Speaker
- Buck Bundhund Details
- Presented by
Keeping Insider Risk at Bay
Wednesday • 11:15AM - 11:55AM
• Room: Prosperity Room
- Title
- Keeping Insider Risk at Bay
- Abstract
- Is that activity you're seeing a malicious user? Is it someone who made a mistake? Is it coming from an account whose credentials were compromised? Is it command and control traffic? How confident are you? As security programs are maturing, attention is turning to threats emanating from inside the network. Doug Copley will discuss seven profiles of highly risky users, outline how unified security solutions help organizations reduce insider risk, and present a real-world case study of how a software organization protected themselves.
- Speaker
- Doug Copley Details
- Presented by
Hack the Planet: repairing the broken security industry
Wednesday • 11:15AM - 11:55AM
• Room: Serenity Room
- Title
- Hack the Planet: repairing the broken security industry
- Abstract
- The security world is in fast-evolution. Unlike its mature brothers (routing, switching, compute, and storage) there are very few actual standards. What are manufacturers doing to fix this. How are the implementing standards and why is it important? Explore the stuttering beginnings of an interoperability initiative and laugh about the inequities and challenges of an engineer trying to make a difference.
- Speaker
- James Cabe Details
- Presented by
Assessing The Maturity Of Your Security Program
Wednesday • 1:30PM - 1:55PM
• Room: Harmony Room
- Title
- Assessing The Maturity Of Your Security Program
- Abstract
- Information assurance is the practice of managing risks pertaining to information and data processing environments. Effectively managing risk requires a deep understanding of the weaknesses that leave assets vulnerable and the controls that protect them. Over time, organizations will be required to assess the maturity of their information security program. An effective information security program will include elements of leadership commitment and participation, well designed and communicated policies and standards, effective and meaningful controls, an engaged user population, evidence of continuous improvement, and risk and compliance management.
- Speaker
- Bill Curtis & Paul Hendler Details
- Presented by
Attacking Microsoft Productivity Applications
Wednesday • 1:30PM - 1:55PM
• Room: Progress Room
- Title
- Attacking Microsoft Productivity Applications
- Abstract
- A poignant voyage in to the into the fun world of active directory linked, public, single-factor authentication endpoints. This talk will show why having a public Microsoft productivity application can end in disaster. Attendees will see the major security flaws possible with Sharepoint, Lync, and Outlook Web Access. Simple flaw mitigations will also be shared.
- Speaker
- Scot Berner Details
- Presented by
Hybrid Infrastructure 1: Overview of Hybrid Infrastructure Strategies – Your Competition Has One, You Should Too
Wednesday • 1:30PM - 1:55PM
• Room: Prosperity Room
- Title
- Hybrid Infrastructure 1: Overview of Hybrid Infrastructure Strategies – Your Competition Has One, You Should Too
- Abstract
- The "Cloud" is more than just a concept. Cloud solutions are real and adoption is rapidly growing. Learn about the most common types of Clouds companies utilize, how they are integrated with existing infrastructure and how they are leveraged to drive business initiatives.
- Speaker
- Nate Ressel Details
- Presented by
Agile Security 1: Tactical vs Strategic – What Approach is Your Business Taking
Wednesday • 1:30PM - 1:55PM
• Room: Serenity Room
- Title
- Agile Security 1: Tactical vs Strategic – What Approach is Your Business Taking
- Abstract
- Mobility, IoT, cloud computing, Agile work schedules and locations... company security perimeters have dissolved and are harder to define. Learn what IT organizations are doing to adapt to this changed reality.
- Speaker
- Lisa Niles Details
- Presented by
5 Audit Controls That Many Organizations Neglect
Wednesday • 2:00PM - 2:25PM
• Room: Progress Room
- Title
- 5 Audit Controls That Many Organizations Neglect
- Abstract
- IT auditors examining your environment are looking for how your organization is implementing standards, but several controls are found lacking in many organizations. We will look at several examples of policies, procedures, and plans to implement in your environment to have a more successful IT audit.
- Speaker
- Drew Hjelm Details
- Presented by
Defensive Wins That Drive Pentesters Crazy
Wednesday • 2:00PM - 2:25PM
• Room: Harmony Room
- Title
- Defensive Wins That Drive Pentesters Crazy
- Abstract
- Receiving penetration test results can be brutal. You've patched your systems, AV is up to date, but the tester took it all. How did this happen and how could you prevent it? This talk will look at simple yet effective defensive wins which will leave penetration testers (and attackers) spinning their wheels. Through the experience of a seasoned penetration tester, we'll take a detailed look at what organizations can do to create secure networks.
- Speaker
- Travis Kaun Details
- Presented by
Hybrid Infrastructure 2: Operating and Managing Hybrid Infrastructure – Operational Efficiency and Effectiveness
Wednesday • 2:00PM - 2:25PM
• Room: Prosperity Room
- Title
- Hybrid Infrastructure 2: Operating and Managing Hybrid Infrastructure – Operational Efficiency and Effectiveness
- Abstract
- Hybrid infrastructure environments are supporting the rapid changes in business needs. How can you keep up? Learn about solutions that help organizations manage and control these fast changing environments and avoid costly traps.
- Speaker
- Nate Ressel Details
- Presented by
Agile Security 2: Identity Based Security – Employee Satisfaction AND Improved Security
Wednesday • 2:00PM - 2:25PM
• Room: Serenity Room
- Title
- Agile Security 2: Identity Based Security – Employee Satisfaction AND Improved Security
- Abstract
- Identity vulnerabilities are 4 of the top 6 risks we find. Learn how usernames and passwords are your weakest link and how you can help your business address it.
- Speaker
- Lisa Niles Details
- Presented by
Are You Doing Continuous Penetration Testing?
Wednesday • 2:30PM - 2:55PM
• Room: Harmony Room
- Title
- Are You Doing Continuous Penetration Testing?
- Abstract
- Business practices change, IT migrations occur regularly,and the marketing team just stood up a new WordPress without notifying security. Many companies undergo a pentest once a year, but networks, services, and applications are always changing. This talk will highlight the benefits of continuous security testing and will debunk false assumptions and myths.
- Speaker
- Casey Cammilleri Details
- Presented by
PowerShell: Fear But Don't Lose Hope
Wednesday • 2:30PM - 2:55PM
• Room: Progress Room
- Title
- PowerShell: Fear But Don't Lose Hope
- Abstract
- You've heard the AssureIT team rant and rave about PowerShell. Maybe you've even seen PowerShell show up in your pentest report findings. If you're curious to see exactly what harm can be wrought in your environment at the hands of powershell.exe, this talk is for you. You won't leave too depressed; defensive measures will also be demonstrated including how to audit and collect the correct events for detecting malicious PowerShell activity.
- Speaker
- Jason Lang Details
- Presented by
Hybrid Infrastructure 3: Cap and Grow with Hybrid Infrastructure – Quick Wins for Your Business
Wednesday • 2:30PM - 2:55PM
• Room: Prosperity Room
- Title
- Hybrid Infrastructure 3: Cap and Grow with Hybrid Infrastructure – Quick Wins for Your Business
- Abstract
- Ready or not, clouds are here and being integrated with existing on-premises infrastructure to form solutions. Join us to discuss approaches to you can take today to deliver timely, agile solutions with hybrid infrastructure to meet your business demands.
- Speaker
- Nate Ressel Details
- Presented by
Agile Security 3: Smart Segmentation – Isolate and Protect Your Business Assets
Wednesday • 2:30PM - 2:55PM
• Room: Serenity Room
- Title
- Agile Security 3: Smart Segmentation – Isolate and Protect Your Business Assets
- Abstract
- It is not a matter of "if," it is a matter of "when" a security incident will happen to you. In this session, we will discuss force multiplier concepts, strategies and tools to help you minimize the blast radius and more quickly identify and address security issues.
- Speaker
- Lisa Niles Details
- Presented by
Let's Get Kraken: Why You Should Test Account Passwords
Wednesday • 3:15PM - 3:40PM
• Room: Harmony Room
- Title
- Let's Get Kraken: Why You Should Test Account Passwords
- Abstract
- Self managed password cracking and auditing provides insight into your organization of previously unknown business practices and potentially weak/dormant accounts. This talk will cover real world examples identified over the past few years and provide access to a free, open source tool specially developed to help manage your password cracking needs.
- Speaker
- Hans Lakhan & Casey Cammilleri Details
- Presented by
Fantastic Data and Where to Find It: A Look Into The Socially Accepted Perpetual Profiling
Wednesday • 3:15PM - 3:40PM
• Room: Progress Room
- Title
- Fantastic Data and Where to Find It: A Look Into The Socially Accepted Perpetual Profiling
- Abstract
- Join information assurance consultant Sam Link as he demonstrates how attackers and.. well anyone, can readily aggregate information from public sources and leverage it to craft targeted attacks. This talk will investigate OSINT (Open-Source Intelligence) tools and techniques used for the collection and interpretation of your publicly available information.
- Speaker
- Sam Link Details
- Presented by
Hybrid Infrastructure 4: Tuning Enterprise Class Wireless
Wednesday • 3:15PM - 3:40PM
• Room: Prosperity Room
- Title
- Hybrid Infrastructure 4: Tuning Enterprise Class Wireless
- Abstract
- In this session you will learn how and when to create SSIDs, custom radio profiles, look at signal to noise ratios, co-channel interference to tune power and channels.
- Speaker
- Andy Piche Details
- Presented by
Agile Security 4: Configuration Assurance – Tune and Use What You Already Have
Wednesday • 3:15PM - 3:40PM
• Room: Serenity Room
- Title
- Agile Security 4: Configuration Assurance – Tune and Use What You Already Have
- Abstract
- As you consider investing in new solutions, learn how you can also make the highest and best use of the investments you have already made.
- Speaker
- Lisa Niles Details
- Presented by