IT Summit - Spring
Monday-Tuesday, May 1-2, 2017
SynerComm's 15th Annual IT Conference at Historic Lambeau Field
Upcoming Sessions
Information Subject to Change
Click on a track to filter the results below
Keynote: The Future of Compute, Storage, and Network Data Center Infrastructures
Monday • 1:45PM - 2:45PM
• Room: Johnny Blood/Willie Davis Room
- Title
- The Future of Compute, Storage, and Network Data Center Infrastructures
- Abstract
- This presentation by Dr. Jai Menon, IBM Fellow and Dell CTO Emeritus will discuss emerging trends for compute, storage, and network data center infrastructures as they evolve and incorporate new disruptive technologies to better meet your business needs. The pros and cons of both on-premise and cloud infrastructures will be discussed. Dr. Menon will take us on a journey to learn the lessons from the past and prepare us for the coming future when a new generation of application-centric composable infrastructures that deliver agility, scalability, low-cost and operational efficiency will become available.
- Speaker
- Dr. Jai Menon Details
- Presented by
Everyone Does It: Office 365 - Migration, Operations, and Security Considerations
Monday • 3:35PM - 5:30PM
• Room: Paul Hornung Room
- Title
- Everyone Does It: Office 365 - Migration, Operations, and Security Considerations
- Abstract
Organizations of all sizes are migrating to Office 365. Office 365 presents Microsoft Office applications and productivity services for purchase as a cloud service. So, what is the Office 365 hype all about? What are the compelling arguments for leveraging Office 365 and what are the benefits and risks of doing so? Join this session and participate in a dialog on Office 365. If you are considering Office 365, have recently migrated, or consider yourself an early adopter, we want to hear from you. SynerComm will facilitate this interactive discussion sharing our experiences and listening to yours.
- Note: Information gathered during this session will feed into a comprehensive dive into Office 365 which will be scheduled for the SynerComm Fall 2017 IT Summit as well as input in SynerComm's popular "Live Hacking of Evil Crop – Office 365 edition".
Suggestion of discussion topics:
- Deployment and migration considerations
- IT Infrastructure Readiness
- WAN/Internet Connectivity Readiness
- User and Organization Readiness
- Securing your deployment (Who secures what, when and how?)
- Identity & Access Management options
- Key security controls Microsoft provides
- Top recommended controls you should employ
- Continuous validation (Still secure? How do you know?)
- User behavior
- Performance monitoring
- Security incident & event monitoring
- Speaker
- Bill Curtis - Senior Information Security Consultant, Marc Spindt - VP of Services, Drew Hjelm - Information Assurance Consultant, Nate Ressel - Solutions Architect, Mitch Jurisch - Systems Administrator, Aaron Howell - Systems Engineer Details
- Presented by
Keynote: Empower Your Business Using Zero Trust Architecture
Tuesday • 8:45AM - 9:45AM
• Room: Johnny Blood/Willie Davis Room
- Title
- Empower Your Business Using Zero Trust Architecture
- Abstract
In this presentation, John Kindervag, creator of the revolutionary Zero Trust Model of Cybersecurity, will discuss the concept of Zero Trust and explain how it can not only transform network security but function as a business enabler. Zero Trust is revolutionizing network security architecture because it is data-centric and designed to stop data breaches. Additionally, Zero Trust adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world.
- Speaker
- John Kindervag Details
- Presented by
Agile IT & SDN - Here today or still light years away?
Tuesday • 10:00AM - 10:40AM
• Room: Bart Starr Room
- Title
- Agile IT & SDN - Here today or still light years away?
- Abstract
Today's world of IT is highly dynamic in nature. We have all heard the term "Agile", but it is difficult to grasp the scope of it and what it means to our overall integration and security. With "Shadow IT", the Cloud, IOT, and workloads moving all over in your datacenter, your toolsets and staff are stretched to the limit. You have 26 different management systems, and you keep hearing of this mythical SDN that's going to fix everything. Not to mention the sea of data you have to wade through every day to audit everything and ensure that you are really "secure".
Join Juniper to learn how to begin integrating your current systems, having them work together, ensuring security, and creating a highly-agile compute environment to support your business needs.
- Speaker
- Oliver Schuermann Details
- Presented by
DDoS Myths
Tuesday • 10:00AM - 10:40AM
• Room: Johnny Blood Room
- Title
- DDoS Myths
- Abstract
In this session we will discuss what we thought we knew about DDoS attacks no longer has feet - it's time to revisit our assumptions about existing security perimeters, typical service provider cadence, CDN capabilities and the severe consequences of experiencing an attack:
- What makes today's DDoS attacks more complex than ever before
- How to ensure your service provider's traffic scrubbing capabilities are a match for your needs
- Why DDoS vulnerability risk is more severe than you may have considered
- How DDoS is used as a diversionary tactic during advanced threat campaigns
- Speaker
- Tom Bienkowski Details
- Presented by
"Cloud-First" Malware and Ransomware
Tuesday • 10:00AM - 10:40AM
• Room: Paul Hornung Room
- Title
- "Cloud-First" Malware and Ransomware
- Abstract
Cloud services have emerged as the preferred attack vector of some of the most dangerous and innovative cloud malware exploits over the past six months. Why? Because many organizations don't inspect their cloud traffic for malware, and the same cloud service functionality that dramatically increases productivity (sync, share, etc.) also provides malicious actors with the perfect medium for faster delivery of malware payloads to more targets.
- Speaker
- Sean Hittel Details
- Presented by
Leveraging Your Security Solutions to Improve Your Security Posture
Tuesday • 10:45AM - 11:25AM
• Room: Bart Starr Room
- Title
- Leveraging Your Security Solutions to Improve Your Security Posture
- Abstract
- Are you getting the most of your security solution today? Is there more you can be doing to prevent a breach, data exfiltration or ransomware from hitting your organization. With new and integrated security solutions being developed all the time, we will look at the roles and responsibilities of many of the malware protection features, why decrypting SSL should be a serious consideration and why authentication/user-id should be used in your security policy. We will also look at why you should be looking at threat information sharing in your security solutions.
- Speaker
- Thomas Heideman Details
- Presented by
End Point - The Next Generation
Tuesday • 10:45AM - 11:25AM
• Room: Johnny Blood Room
- Title
- End Point - The Next Generation
- Abstract
- The endpoint is a very volatile technology space. Legacy tools are ineffective and bloated. Definition of THE NEXT GENERATION is happening now. I will explain what industry experts (SANS, GARTNER…etc) are saying about features now required to sufficiently protect organizations against adversaries and ultimately prevent attacks from becoming breaches.
- Speaker
- Kris Yach Details
- Presented by
Network Security Architecture Evolution
Tuesday • 10:45AM - 11:25AM
• Room: Paul Hornung Room
- Title
- Network Security Architecture Evolution
- Abstract
- The foundations on which networks, and the security of those networks have been architected are shifting. The data and the users are migrating. The applications are transforming. These fundamental environmental changes will drive enterprise architecture further towards a public model of communications. Where is this journey taking us, and how do we maintain operational sanity while leaning forward to take advantage of this new landscape.
- Speaker
- Mike Richard Details
- Presented by
Sidestepping Common Defenses
Tuesday • 11:30AM - 12:00PM
• Room: Bart Starr Room
- Title
- Sidestepping Common Defenses
- Abstract
- Attackers routinely dip into their bag of tricks to bypass an organization's defenses. Attackers may be able to use stealthy techniques knowing that it's better to move around a defensive control rather than attempt to disable it. This talk will show you some of those tricks.
- Speaker
- Jason Lang Details
- Presented by
Security Strategies That Work
Tuesday • 11:30AM - 12:00PM
• Room: Johnny Blood Room
- Title
- Security Strategies That Work
- Abstract
- A shallow dive into security strategies that have been proven to be effective. This will include insight into building a security culture and people to run it. This session will be given from a perspective of a seasoned (cynical) security professional. Come hear stories about common organizational missteps and simple changes that will bring real change to your security posture.
- Speaker
- Scot Berner Details
- Presented by
SD-WAN, an SDN Win?
Tuesday • 11:30AM - 12:00PM
• Room: Paul Hornung Room
- Title
- SD-WAN, an SDN Win?
- Abstract
- Software Defined Networking (SDN) has been a promise for years but practical applications have been slow to develop. SD-WAN has been rapidly developing in recent years as a real, practical application of SDN. Join us in learning how SD-WAN may be useful to your organization today and what we might expect from it tomorrow.
- Speaker
- Nate Ressel Details
- Presented by
I, Robot: Using Orchestration & Automation
Tuesday • 11:30AM - 12:00PM
• Room: Willie Davis Room
- Title
- I, Robot: Using Orchestration & Automation
- Abstract
- Orchestration and automation is here. Let's explore use cases together that can benefit your organization today.
- Speaker
- William Kiley Details
- Presented by
Hitting Moving Targets:
How to Protect the Evolving Datacenter in a Changing Threat Landscape
Tuesday • 1:30PM - 2:10PM
• Room: Bart Starr Room
- Title
- Hitting Moving Targets: How to Protect the Evolving Datacenter in a Changing Threat Landscape
- Abstract
Today's datacenter is undergoing major transformation to enable IT's agility, efficiency, and effectiveness at supporting new cloud-based business models.
At the same time, the constantly evolving threat landscape demands new approaches to preventing disruptions and safeguarding sensitive data.
- Speaker
- Michael Weinstein Details
- Presented by
Ransomware, Phishing and APTs - Avoid Falling Victim to These Cyber Threats
Tuesday • 1:30PM - 2:10PM
• Room: Johnny Blood Room
- Title
- Ransomware, Phishing and APTs - Avoid Falling Victim to These Cyber Threats
- Abstract
- Email security is no longer just about preventing excessive spam and viruses – the attacks are real, they are sophisticated, and they are costly. Nearly every day there is a new story about malware – and a lot of it is ransomware, which can cost you dearly.
- Speaker
- Charles Kunkel Details
- Presented by
Providing Secure Access for People, Devices and Things – Anywhere, Anytime – IOT Authenticated Via The Pulse Secure Access Suite
Tuesday • 1:30PM - 2:10PM
• Room: Paul Hornung Room
- Title
- Providing Secure Access for People, Devices and Things – Anywhere, Anytime – IOT Authenticated Via The Pulse Secure Access Suite
- Abstract
As Northwestern Mutual Life's Karl Gouverneur elegantly stated at Synercomm's IT Summit - Fall 2016, "the success and or failure of IOT is predicated on Secure Access." With the next five-years of estimated growth being quantified between $11 and $19 trillion by Gartner, CNBC, Poneomon and the Wall Street Journal, the Pulse "Secure Access Suite" is a right-time, right place technology for premiere partner Synercomm and all of its valued partners, customers and cyber-end-user communities.
In this fascinating and evolving presentation, Pulse Secure Global Marketing Lead Phil Montgomery joins Ninja Architect and 25-Year Air Force cybersecurity expert Mike Riemer (and Synercomm alumnus) for this overview that defines Pulse's RSA "cut-through-the-clutter" Secure Access Suite solution and how its innovative Unified Access Code is providing enterprise organizations and SMB security leaders best-in-science security, monitoring and downstream performance segmentation and enhancements unseen before. The Pulse Secure Profiler is also making inroads as a BIA tool from the front-edge of the network down to the firewall.
- Speaker
- Phil Montgomery Details
- Presented by
The Security Transformation of the Modern Data Center
Tuesday • 1:30PM - 2:10PM
• Room: Willie Davis Room
- Title
- The Security Transformation of the Modern Data Center
- Abstract
- Learn how technologies like cyber deception and micro-segmentation can simplify your architecture, reduce your threat surface, and improve your security with or without network transformation.
- Speaker
- Brian Morris Details
- Presented by
Nextgen Web, Lastgen Vulns
Tuesday • 2:15PM - 2:45PM
• Room: Bart Starr Room
- Title
- Nextgen Web, Lastgen Vulns
- Abstract
- A brief look into JS apps, vulnerabilities, and I suppose some preventative measures... I mean, if there's time.
- Speaker
- Sam Link Details
- Presented by
Taking Notes from the CIA: 5 Persistence Techniques Disclosed on WikiLeaks
Tuesday • 2:15PM - 2:45PM
• Room: Johnny Blood Room
- Title
- Taking Notes from the CIA: 5 Persistence Techniques Disclosed on WikiLeaks
- Abstract
- Recent leaks coming out of the CIA uncovered 5 methods they use to establish and maintain persistence (ongoing command and control) on Microsoft Windows systems. These techniques are commonly used by both malware and penetration testers. This talk will review the CIA's techniques and what you can do to detect, prevent, and remove them.
- Speaker
- Hans Lakhan Details
- Presented by
Quiet RIOT: Revisiting the Internet of Things
Tuesday • 2:15PM - 2:45PM
• Room: Paul Hornung Room
- Title
- Quiet RIOT: Revisiting the Internet of Things
- Abstract
- The Internet of Things is rapidly becoming the Internet of Everything. What does this mean for your organizations operations, infrastructure and security? Come to this session to learn what you should be doing now to prepare.
- Speaker
- Aaron Howell Details
- Presented by
Cloud CIA – Using the Cloud to Enable Confidentiality, Integrity and Availability
Tuesday • 2:15PM - 2:45PM
• Room: Willie Davis Room
- Title
- Cloud CIA – Using the Cloud to Enable Confidentiality, Integrity and Availability
- Abstract
- Still avoiding the cloud because of concerns over the security of your data? Many yet believe their data is more secure within the perimeter established by their firewall. That perimeter is long gone. Attend this session and you may be interested to learn how you should be leveraging the cloud to enable the security of your data.
- Speaker
- Lisa Niles Details
- Presented by
Leveraging the CIS Critical Security Controls
Tuesday • 2:50PM - 3:20PM
• Room: Bart Starr Room
- Title
- Leveraging the CIS Critical Security Controls
- Abstract
- The center for Internet Security (CIS) has published a list of 20 critical security controls. During this session we will explore how your organization can leverage these controls to mature your information security program.
- Speaker
- Bill Curtis Details
- Presented by
Teach Me How to Hack: llmnr & nbt-ns Attacks
Tuesday • 2:50PM - 3:20PM
• Room: Johnny Blood Room
- Title
- Teach Me How to Hack: llmnr & nbt-ns Attacks
- Abstract
- Ever wanted to know your bosses password... I mean, how attackers are silently stealing credentials in networks? In this talk, we'll show you how to perform the attack and how to mitigate it.
- Speaker
- Casey Cammilleri Details
- Presented by
Check one, Check two, is this Thing On? Continuous "checking" and "acting"; ongoing operational and security effectiveness
Tuesday • 2:50PM - 3:20PM
• Room: Paul Hornung Room
- Title
- Check one, Check two, is this Thing On? Continuous "checking" and "acting"; ongoing operational and security effectiveness
- Abstract
- Effective and useful visibility and environment validation is crucial to smooth operations and good security. We all know that yet so many organizations struggle to identify, select, justify and implement solutions that work. In this session, we will walk through the most critical controls every organization should have, and how you might actually make them work for you.
- Speaker
- Andrew Piche Details
- Presented by