Agenda

Cloud Connect Summit Agenda (Subject to Change)

12:30 p.m. Registration
1 p.m. Opening Remarks
1:10 p.m.

“Getting SASE – The Evolution and Future of Secure Access Service Edge”

Mark Kouyoumjian, Technical Solutions Architect, Cisco

Secure access service edge, or SASE, is all the rage as a technology that combines VPN, SD-WAN, and security to transform cloud computing. By 2024, Gartner says 40% of companies will look to adopt SASE. But does SASE live up to its promises? What is the future of this technology, how is it implemented, and how will it evolve? Hear insights from Cisco’s Mark Kouyoumjian, Technical Solutions Architect and expert on SASE, on the future of this new technology.

1:40 p.m.

“Modern Ransomware Trends and How to Keep Hackers at Bay”

Rick Vanover, Senior Director of Product Strategy, Veeam

News stories abound nearly every week regarding a new ransomware attack or cyber threat. Veeam has just released one of its most comprehensive studies on cyberattack trends surveying more than 1,000 IT leaders from organizations of all sizes and countries. Learn how organizations are protecting themselves and what needs to change, and how to best defend your organization from attack. Learn the latest about remediation methods, organizational alignment between administration and security staff, best practices in data immutability, and more.

2:30 p.m.

“Best Practices for Achieving a Zero Trust Deployment”

Edwin Koehler, Distinguished Principal Engineer, Office of the CTO, Extreme Networks​

The term “zero trust” is a popular catchphrase in the cybersecurity industry. Much like proper security postures, zero trust must become embedded into an organization for it to work. Technology certainly plays an important role, but Extreme’s Ed Koehler maintains that it is secondary to the establishment of a “zero trust practice” or organizational mindset. What exactly is zero trust? How does it become established and what products and solutions help to support the overall practice?

 

3:00 p.m.

“Cyberthreats and Remedies”

Richard F. Rossi, Cybersecurity Advisor, Cybersecurity and Infrastructure Security Agency, U.S. Department of Homeland Security

As a cybersecurity advisor for the U.S. Department of Homeland Security and having earned a Master of Science degree in Strategic Intelligence from the National Intelligence University, Richard Rossi knows a thing or two about ransomware attacks and defenses, and how hackers think. Learn what you need to know about the latest threats and red flags, along with warning signs that an attack has occurred, could occur, or is in process.

3:40 p.m.

“How and Why Hackers Hack and How To Defend Yourself and Your Organization”

James McQuiggan, Security Awareness Advocate, KnowBe4

A 20-year cybersecurity veteran, James McQuiggan is a Security Awareness Advocate for KnowBe4, where he is responsible for amplifying the organization’s messaging related to the importance of, effectiveness of, and the need for new-school security awareness. James will discuss the motivations of hackers and how today’s real-world mix of malware and human-directed attacks like ransomware happen. The presentation will include a video demonstration by world renown hacker Kevin Mitnick, getting around multifactor authentication like it wasn’t even there. It’s an attack that would work against over 90% of today’s multifactor solutions. Learn the four best computer security practices that will significantly lower your risk of being a cyber victim.

4:30 p.m.

“Data Center Security: Maintaining a Fortress for Your Data”

Robert Rivas, Vice President, Data Center and Cloud

There’s a deep sense of trust that must be nurtured before an IT manager agrees to place his or her organization’s data in an off-premises data center. A data center must have physical security, expert personnel, redundancy in connectivity, power, and HVAC, and meet minimum compliance standards. Robert Rivas manages FirstLight’s 15 geo-diverse data centers, and will discuss the latest data center security trends, as well as industry standards and compliance requirements for SOC 2, Type 2, PCI, HIPAA, and other certifications.

5:00 p.m. Networking Cocktail Reception