IT Summit - Spring
Monday-Tuesday, May 1-2, 2017

SynerComm's 15th Annual IT Conference at Historic Lambeau Field

Registration Closed

Click on a track to filter the results below


Back to Top

Title
The Future of Compute, Storage, and Network Data Center Infrastructures
Abstract
This presentation by Dr. Jai Menon, IBM Fellow and Dell CTO Emeritus will discuss emerging trends for compute, storage, and network data center infrastructures as they evolve and incorporate new disruptive technologies to better meet your business needs. The pros and cons of both on-premise and cloud infrastructures will be discussed. Dr. Menon will take us on a journey to learn the lessons from the past and prepare us for the coming future when a new generation of application-centric composable infrastructures that deliver agility, scalability, low-cost and operational efficiency will become available.
Speaker
Dr. Jai Menon Details
Presented by

Back to Top

Title
Everyone Does It: Office 365 - Migration, Operations, and Security Considerations
Abstract

Organizations of all sizes are migrating to Office 365. Office 365 presents Microsoft Office applications and productivity services for purchase as a cloud service. So, what is the Office 365 hype all about? What are the compelling arguments for leveraging Office 365 and what are the benefits and risks of doing so? Join this session and participate in a dialog on Office 365. If you are considering Office 365, have recently migrated, or consider yourself an early adopter, we want to hear from you. SynerComm will facilitate this interactive discussion sharing our experiences and listening to yours.

  • Note: Information gathered during this session will feed into a comprehensive dive into Office 365 which will be scheduled for the SynerComm Fall 2017 IT Summit as well as input in SynerComm's popular "Live Hacking of Evil Crop – Office 365 edition".

Suggestion of discussion topics:

  • Deployment and migration considerations
    1. IT Infrastructure Readiness
    2. WAN/Internet Connectivity Readiness
    3. User and Organization Readiness
  • Securing your deployment (Who secures what, when and how?)
    1. Identity & Access Management options
    2. Key security controls Microsoft provides
    3. Top recommended controls you should employ
  • Continuous validation (Still secure? How do you know?)
    1. User behavior
    2. Performance monitoring
    3. Security incident & event monitoring
Speaker
Bill Curtis - Senior Information Security Consultant, Marc Spindt - VP of Services, Drew Hjelm - Information Assurance Consultant, Nate Ressel - Solutions Architect, Mitch Jurisch - Systems Administrator, Aaron Howell - Systems Engineer Details
Presented by

Back to Top

Title
Empower Your Business Using Zero Trust Architecture
Abstract

In this presentation, John Kindervag, creator of the revolutionary Zero Trust Model of Cybersecurity, will discuss the concept of Zero Trust and explain how it can not only transform network security but function as a business enabler. Zero Trust is revolutionizing network security architecture because it is data-centric and designed to stop data breaches. Additionally, Zero Trust adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world.

Speaker
John Kindervag Details
Presented by

Back to Top

Title
Agile IT & SDN - Here today or still light years away?
Abstract

Today's world of IT is highly dynamic in nature. We have all heard the term "Agile", but it is difficult to grasp the scope of it and what it means to our overall integration and security. With "Shadow IT", the Cloud, IOT, and workloads moving all over in your datacenter, your toolsets and staff are stretched to the limit. You have 26 different management systems, and you keep hearing of this mythical SDN that's going to fix everything. Not to mention the sea of data you have to wade through every day to audit everything and ensure that you are really "secure".

Join Juniper to learn how to begin integrating your current systems, having them work together, ensuring security, and creating a highly-agile compute environment to support your business needs.

Speaker
Oliver Schuermann Details
Presented by

Back to Top

Title
DDoS Myths
Abstract

In this session we will discuss what we thought we knew about DDoS attacks no longer has feet - it's time to revisit our assumptions about existing security perimeters, typical service provider cadence, CDN capabilities and the severe consequences of experiencing an attack:

  • What makes today's DDoS attacks more complex than ever before
  • How to ensure your service provider's traffic scrubbing capabilities are a match for your needs
  • Why DDoS vulnerability risk is more severe than you may have considered
  • How DDoS is used as a diversionary tactic during advanced threat campaigns
Speaker
Tom Bienkowski Details
Presented by

Back to Top

Title
"Cloud-First" Malware and Ransomware
Abstract

Cloud services have emerged as the preferred attack vector of some of the most dangerous and innovative cloud malware exploits over the past six months. Why? Because many organizations don't inspect their cloud traffic for malware, and the same cloud service functionality that dramatically increases productivity (sync, share, etc.) also provides malicious actors with the perfect medium for faster delivery of malware payloads to more targets.

Speaker
Sean Hittel Details
Presented by

Back to Top

Title
Leveraging Your Security Solutions to Improve Your Security Posture
Abstract
Are you getting the most of your security solution today? Is there more you can be doing to prevent a breach, data exfiltration or ransomware from hitting your organization. With new and integrated security solutions being developed all the time, we will look at the roles and responsibilities of many of the malware protection features, why decrypting SSL should be a serious consideration and why authentication/user-id should be used in your security policy. We will also look at why you should be looking at threat information sharing in your security solutions.
Speaker
Thomas Heideman Details
Presented by

Back to Top

Title
End Point - The Next Generation
Abstract
The endpoint is a very volatile technology space. Legacy tools are ineffective and bloated. Definition of THE NEXT GENERATION is happening now. I will explain what industry experts (SANS, GARTNER…etc) are saying about features now required to sufficiently protect organizations against adversaries and ultimately prevent attacks from becoming breaches.
Speaker
Kris Yach Details
Presented by

Back to Top

Title
Network Security Architecture Evolution
Abstract
The foundations on which networks, and the security of those networks have been architected are shifting. The data and the users are migrating. The applications are transforming. These fundamental environmental changes will drive enterprise architecture further towards a public model of communications. Where is this journey taking us, and how do we maintain operational sanity while leaning forward to take advantage of this new landscape.
Speaker
Mike Richard Details
Presented by

Back to Top

Title
Sidestepping Common Defenses
Abstract
Attackers routinely dip into their bag of tricks to bypass an organization's defenses. Attackers may be able to use stealthy techniques knowing that it's better to move around a defensive control rather than attempt to disable it. This talk will show you some of those tricks.
Speaker
Jason Lang Details
Presented by

Back to Top

Title
Security Strategies That Work
Abstract
A shallow dive into security strategies that have been proven to be effective. This will include insight into building a security culture and people to run it. This session will be given from a perspective of a seasoned (cynical) security professional. Come hear stories about common organizational missteps and simple changes that will bring real change to your security posture.
Speaker
Scot Berner Details
Presented by

Back to Top

Title
SD-WAN, an SDN Win?
Abstract
Software Defined Networking (SDN) has been a promise for years but practical applications have been slow to develop. SD-WAN has been rapidly developing in recent years as a real, practical application of SDN. Join us in learning how SD-WAN may be useful to your organization today and what we might expect from it tomorrow.
Speaker
Nate Ressel Details
Presented by

Back to Top

Title
I, Robot: Using Orchestration & Automation
Abstract
Orchestration and automation is here. Let's explore use cases together that can benefit your organization today.
Speaker
William Kiley Details
Presented by

Back to Top

Title
Hitting Moving Targets: How to Protect the Evolving Datacenter in a Changing Threat Landscape
Abstract

Today's datacenter is undergoing major transformation to enable IT's agility, efficiency, and effectiveness at supporting new cloud-based business models.

At the same time, the constantly evolving threat landscape demands new approaches to preventing disruptions and safeguarding sensitive data.

Speaker
Michael Weinstein Details
Presented by

Back to Top

Title
Ransomware, Phishing and APTs - Avoid Falling Victim to These Cyber Threats
Abstract
Email security is no longer just about preventing excessive spam and viruses – the attacks are real, they are sophisticated, and they are costly. Nearly every day there is a new story about malware – and a lot of it is ransomware, which can cost you dearly.
Speaker
Charles Kunkel Details
Presented by

Back to Top

Title
Providing Secure Access for People, Devices and Things – Anywhere, Anytime – IOT Authenticated Via The Pulse Secure Access Suite
Abstract

As Northwestern Mutual Life's Karl Gouverneur elegantly stated at Synercomm's IT Summit - Fall 2016, "the success and or failure of IOT is predicated on Secure Access." With the next five-years of estimated growth being quantified between $11 and $19 trillion by Gartner, CNBC, Poneomon and the Wall Street Journal, the Pulse "Secure Access Suite" is a right-time, right place technology for premiere partner Synercomm and all of its valued partners, customers and cyber-end-user communities.

In this fascinating and evolving presentation, Pulse Secure Global Marketing Lead Phil Montgomery joins Ninja Architect and 25-Year Air Force cybersecurity expert Mike Riemer (and Synercomm alumnus) for this overview that defines Pulse's RSA "cut-through-the-clutter" Secure Access Suite solution and how its innovative Unified Access Code is providing enterprise organizations and SMB security leaders best-in-science security, monitoring and downstream performance segmentation and enhancements unseen before. The Pulse Secure Profiler is also making inroads as a BIA tool from the front-edge of the network down to the firewall.

Speaker
Phil Montgomery Details
Presented by

Back to Top

Title
The Security Transformation of the Modern Data Center
Abstract
Learn how technologies like cyber deception and micro-segmentation can simplify your architecture, reduce your threat surface, and improve your security with or without network transformation.
Speaker
Brian Morris Details
Presented by

Back to Top

Title
Nextgen Web, Lastgen Vulns
Abstract
A brief look into JS apps, vulnerabilities, and I suppose some preventative measures... I mean, if there's time.
Speaker
Sam Link Details
Presented by

Back to Top

Title
Taking Notes from the CIA: 5 Persistence Techniques Disclosed on WikiLeaks
Abstract
Recent leaks coming out of the CIA uncovered 5 methods they use to establish and maintain persistence (ongoing command and control) on Microsoft Windows systems. These techniques are commonly used by both malware and penetration testers. This talk will review the CIA's techniques and what you can do to detect, prevent, and remove them.
Speaker
Hans Lakhan Details
Presented by

Back to Top

Title
Quiet RIOT: Revisiting the Internet of Things
Abstract
The Internet of Things is rapidly becoming the Internet of Everything. What does this mean for your organizations operations, infrastructure and security? Come to this session to learn what you should be doing now to prepare.
Speaker
Aaron Howell Details
Presented by

Back to Top

Title
Cloud CIA – Using the Cloud to Enable Confidentiality, Integrity and Availability
Abstract
Still avoiding the cloud because of concerns over the security of your data? Many yet believe their data is more secure within the perimeter established by their firewall. That perimeter is long gone. Attend this session and you may be interested to learn how you should be leveraging the cloud to enable the security of your data.
Speaker
Lisa Niles Details
Presented by

Back to Top

Title
Leveraging the CIS Critical Security Controls
Abstract
The center for Internet Security (CIS) has published a list of 20 critical security controls. During this session we will explore how your organization can leverage these controls to mature your information security program.
Speaker
Bill Curtis Details
Presented by

Back to Top

Title
Teach Me How to Hack: llmnr & nbt-ns Attacks
Abstract
Ever wanted to know your bosses password... I mean, how attackers are silently stealing credentials in networks? In this talk, we'll show you how to perform the attack and how to mitigate it.
Speaker
Casey Cammilleri Details
Presented by

Back to Top

Title
Check one, Check two, is this Thing On? Continuous "checking" and "acting"; ongoing operational and security effectiveness
Abstract
Effective and useful visibility and environment validation is crucial to smooth operations and good security. We all know that yet so many organizations struggle to identify, select, justify and implement solutions that work. In this session, we will walk through the most critical controls every organization should have, and how you might actually make them work for you.
Speaker
Andrew Piche Details
Presented by