Resources | SecureWorld

Secure and Scale Your Hybrid Infrastructure: Playbook for Analysts and CISOs

Written by SecureWorld News Team | 11 PM Z

Join SecureWorld, Gigamon, and partners as we bring you an educational online summit on today's hybrid infrastructure—taking you from complexity to confidence.

This free, half-day event will cover what you and your organization need to know about managing network and cloud security in a hybrid environment. Our industry experts will place special emphasis on cybersecurity best practices and scaling for efficiency and cost savings. Get the playbook, know the playbook, and then execute it for success!

Attendees are eligible to receive 4 CPE credits.

Opening Keynote

12:00 PM EDT / 9:00 AM PDT
Ransomware: Today's Cyber Weapon of Choice

This year, ransomware groups have gone after it all: the fuel supply chain, the meat supply chain, the IT management supply chain. They have also targeted many other organizations. We can no longer think of these as individual cyberattacks. Instead, Col. Leighton says we must think of them as a broader strategy that our digital adversaries use against us. And they are leveraging multiple attack vectors to do so. Join this keynote to look at the actors, the motivations, and the steps both governments and private industry might take to mitigate risk from today's cyber weapon of choice.

Colonel Cedric Leighton
CNN Military Analyst and Cyber Thought Leader
U.S. Air Force (Ret.)

 
 
 

Network Security (Track A)

Breakout Session #1 | 12:45 PM EDT / 9:45 AM PDT
Find and Fix Your Security Blind Spot

With rapid digital transformation, IT teams have been overwhelmed with broader and new attack surfaces. To add to this hurdle, enterprise mobility and shadow IT (or remote workforce) contribute to security blind spots. To have a strong security posture, you need to have a complete view of your network, tools, and the users. Is it possible to mitigate this problem? Yes.

Giri Radhakrishnan
Technical Marketing Engineer
Gigamon

 

Muhammad Durrani
Partner, Technology Marketing Engineering
Gigamon

Breakout Session #2 | 1:30 PM EDT / 10:30 AM PDT
Security Starts with Visibility: A 7-Step Implementation Plan

Delivering security in the cyber-physical era. Learn the nature and reason for the need for cloud-to-ground visibility and network control in the hyper-converged IoT world of digital business. We will explore the cause and effect of hyper convergence and some industry examples of how and why cloud-to-ground is used. Finally, leaving you with seven steps to implement a convergence plan in your enterprise.

Jamison Utter
Sr. Director, Product and Solutions Evangelism
Ordr Inc.

 

 

Breakout Session #3 | 2:30 PM EDT / 11:30 AM PDT
Network Detection and Response 101

We've found an active threat in our infrastructure; how many other hosts are infected? That’s an unpleasant but an all too common situation. Join this session to see a real-world scenario on how to detect, investigate and respond to threats using ThreatINSIGHT.

Gene Berger
Sr. Sales Engineer
Gigamon

 

 

Cloud Security (Track B)

Breakout Session #1 | 12:45 PM EDT / 9:45 AM PDT
Gain Visibility into the Performance and Security of Your Network with AWS and Gigamon

Having visibility into your network is a foundational item that is needed to help ensure that your network is secure and functional. This is no different for customers who are running workloads on Amazon Web Services. In this session we will provide an overview of how you can gain visibility into your AWS network traffic, leverage Gigamon to help with analytics and management of your traffic, and gain more confidence around the operations and security of your network traffic.

Ananda Rajagopal
Principal GTM Leader,
EC2 Networking
AWS

 

Breakout Session #2 | 1:30 PM EDT / 10:30 AM PDT
Multi-Cloud and Container Visibility

OpenShift, K8s, Mesh Service... huh? What language is this? In this session, we'll review the not-so-new-but-very-confusing world of software containers that have accelerated digital transformation (DX) and decoupled OS and programing languages, and share how you can maintain consistent, pervasive visibility in a very dynamic environment.

Baseer Balazadeh
Sr. Technical Marketing Engineer
Gigamon

 

Breakout Session #3 | 2:30 PM EDT / 11:30 AM PDT
Enabling Zero Trust: Review of an Actual Large-Scale Deployment Reference Architecture

Zero Trust has become a high priority for both government and commercial organizations. Whether you are implementing Zero Trust or planning a ZT-based next-gen security model, learn how Gigamon enables the critical components of a ZT architecture.

Martyn Crew
Sr. Director, Product Marketing
& Partner Technologies
Gigamon

 

Matt Ashton
Systems Engineer,
Public Sector, DoD
Gigamon

 

Closing Keynote

Panel Discussion | 3:15 PM EDT / 12:15 PM PDT

IT and Security management is facing a complex set of challenges with the need to accelerate digital confirmation with flat or declining budget. At the same time, they need to address Return To Office (RTO) and hybrid environments for employees and protect against the continued threat of rising ransomware attacks. Our distinguished panel will discuss challenges of cloud migration including monitoring and security, trends in ransomware attacks and best practices to protect your organizations, and recommendations for the new hybrid work environment.

Bring your questions for this interactive group discussion.