Wednesday, July 27, 2016

Baltimore July 28

Baltimore July 28
Program Description:This comprehensive seminar covers the increasingly related topics of IT Security/Ransomware/DDoS Attacks, Network Infrastructure, Storage/Backup, Hadoop/Big Data and Private/Public/Hybrid cloud. There is an Amazon keynote, Fannie Mae and AOL end user case studies, plus expert speakers from Dell, Red Hat and many more technology leaders - scroll down to see the agenda and click on links to see speakers' biographies - who deliver concise, technical, educational and complementary talks.Content is pre-approved by Angelbeat and past attendees to maximize learning; click here to download presentation guidelines that are followed by all speakers, which makes the program so worthwhile for IT Directors, Security Analysts, Enterprise Architects, Network & System Administrators, Data Center/Storage/Infrastructure Managers, CISO/CIO's, etc.As one Walmart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, "Thanks for hosting a very informative meeting with vendors that tied in well; it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace."Join your peers from Johns Hopkins, Lockheed Martin, AstraZeneca, Exelon, Fannie Mae, Northrop Grumman, SGT, Unitec, ARINC, MedStar Health, Medifast, M&T Bank, Columbia Association, University of Maryland System, University of Maryland Baltimore, Towson University, Harford Community College, Wicomico Schools, State of Maryland, NSA, Navy, USDA, Social Security, State plus other federal agencies, and many more organizations who are confirmed attendees.Every attendee receives meals including a full hot lunch (click here to see the delicious menu), complimentary self-parking and Wi-Fi, plus 4 CPE credit hours towards your CISSP or other certification. There are drawings for gift cards. UDI Drone with HD Camera, and other prizes at the end.7:30 - 8:40: Registration, Full Hot Breakfast, Exhibit Area Open, Peer Networking, Product Demonstrations8:40 - 9:00: Modern Warfare, End-to-End Security in the New World with Dell SecurityWe have moved far beyond the traditional parameter defense that embodied security. Now the treats are adaptive, they are masquerade inside legitimate traffic; and the attackers have evolved their business models from straight consulting fees to royalties and blackmail.This presentation featuring Dell and its partner Mavenspire will discuss the current state of security, how next generation architectures and products address the next wave of attack vectors, and look at new strategies when addressing/evaluating organizational security models.9:00 - 9:20: Understanding and Preventing DDoS Attacks with Arbor NetworksDistributed Denial of Service (DDoS) attacks attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from consumer-facing financial and news websites, to internally-oriented employee intranet links, and present a major challenge in today's cloud-based world to making sure people can access important information and mission-critical applications.Arbor Networks, the security division of NETSCOUT, helps secure the world's largest enterprise and service provider networks from these DDoS attacks and advanced threats. Its advanced threat solution delivers complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of attack campaigns, malware and malicious insiders. Daniel Scarberry, one of their top  consulting engineers working on Arbor's Advanced Threat Platform, will be the featured speaker.9:20 - 9:40: The Enterprise Immune System - A New Approach to Cyber Defense with Darktrace
Fast-evolving cyber-threats call for a change in the way we protect our most critical information assets, in a digital world more interconnected than ever. Understand from Darktrace how new self-learning technology, known as the "Enterprise Immune System," marks a fundamental transition in cyber defense, allowing organizations to gain indispensable visibility into their network, and detect emerging cyber-threats that bypass traditional security controls.Thanks to fundamental advances in mathematics and unsupervised machine learning developed at the University of Cambridge, UK, Darktrace's technology is capable of learning what is normal and abnormal within an organization, detecting genuine behavioral anomalies, without using rules or signatures. More than 250 organizations across the world rely on its Enterprise Immune System to defend against novel cyber-threats, including insider threat, and protect themselves in today's changing threat landscape.Beth Lustgarten, one of Darktrace's top cyber security experts, will cover the following subjects during this session: - Learn why "immune system" technologies represent a fundamental innovation for cyber defense - Discover how to apply machine learning and mathematics to detect advanced, internal threats - Understand how to gain 100% network visibility to investigate emerging anomalies in real time - Hear real-world examples of threats detected by the Enterprise Immune System 9:40 - 10:00: Unlock the Key to Repel Ransomware with KasperskyYour screen freezes and a dialogue box pops up to tell you that your computer is locked and your files will all be gone forever if you don't pay up. Since many victims are willing to pay the ransom, this type of cryptomalware is on the rise, netting millions of dollars for cybercriminals looking for a substantial return on their minimal investment.During this session you will hear from Mark Villinski of Kaspersky Lab, on what they as a major security vendor are seeing in this growing area of focus for both security vendors and cybercriminals. Areas of focus will include: - Common ransomware scenarios and delivery mechanisms- Trends in this growing form of cybercrime- Recommendations to help your organization avoid being a victimKaspersky is the world's largest privately held, and among the top four security vendors, operating in 200 countries and protecting 400 million users.10:00 - 10:20: The Need for an Inline Security Fabric from IxiaWhat was once a firewall now also includes a next-gen firewall, web-application firewall (WAF), intrusion detection and prevention system, forensics tools and more. Security tools are purchased to protect your network, but what can be done, to protect these tools?Vendors recommend that enterprises place security tools inline of the traffic flow to inspect live traffic. However, every network architect knows that daisy-chaining a series of tools one after the other creates a mess, if any of them should freeze, reboot and/or require maintenance. So serial inline deployment is dangerous; network traffic would stop in the event that any single tool fails.According to a report from Dimension Data 1, 42% of network incidents are due to hardware failure. A resilient Inline security framework ensures tool failures do not become network failures. During this informative session, you will learn how a basic intelligent inline security architecture includes a high-speed bypass switch and a network packet broker. Rather than going directly to your security tools, the bypass switch acts as a failsafe mechanism between the security tools and the network traffic. Should a tool fail for any reason, the bypass switch is programmable to keep your network traffic flowing.10:20 - 10:40: Evaluating and Rating IT Security Vendors: Insights from Fannie MaeFannie Mae is one of the world's largest financial organizations and the dominant player in the United States' mortgage marketplace. Given that trillions of dollars flow through its operations, IT Security is obviously critically important.During this informative session Karin Moore, Fannie Mae's Manager of Information Security and Systems, will describe its methodology to evaluate 3rd party vendors. Her comments will be both technical and practical, offering great value to her peers in the audience.Coffee/Snack Break, Exhibit Area Open, Peer Networking, Product Demonstrations11:20 - 11:40 Hyperconvergence Data Center/Infrastructure Architecture with SimplivityHyperconvergence is a computing infrastructure for virtual workloads. Specifically, it's one that seamlessly combines all of the IT components and services below the hypervisor into an x86 building block. Hyperconvergence means there are no silos of independent IT components. There's no need to manage discrete devices or have specialized training in component-level technology, such as storage area networks (SANs). Hyperconvergence greatly simplifies IT infrastructure, which makes operations more efficient. It improves the speed and agility of deploying resources for virtual workloads. And, importantly, hyperconvergence significantly reduces costs.SimpliVity's presentation will discuss how organizations of all sizes can implement hyperconvergence within their IT infrastructure. Its offerings eliminate the complexity and cost of deploying and running virtualized workloads, delivering signicant cost savings while reducing time to deploy workloads to minutes, not months.11:40 - 12:00: Software Defined DR-as-a-Service (DRaaS) for Hybrid IT Data Protection, with TierPointEmbracing Hybrid IT means organizations must also embrace the hybrid complexities that accompany it. Disaster Recovery-as-a-Service (DRaaS) is commonly highlighted as one of the first steps to successfully implementing the cloud. However, the intricacies involved are unnaturally slowing organizations down as they look to protect varying types of workloads, with differing RPO/RTO objectives, while also exploring how public cloud platforms can provide added benefits. Enter Software Defined DRaaS.Featuring real-life examples, Tierpoint's Matt Tabor will illustrate how Software Defined DRaaS, a managed resilience approach, enables businesses to adopt Hybrid IT while simultaneously maintaining existing technology investments and adopting new innovative ones.12:00 - 12:20: Next Generation Network Monitoring for Virtual/Cloud Environments with ExtrahopThe spread of virtualization, cloud computing, agile development practices, and service-oriented architectures has made traditional monitoring technologies obsolete. A new, simpler approach is needed, to provide visibility into these complex, hyperdynamic environments.In this educational session, ExtraHop will demonstrate how its Operational Intelligence platform meets these requirements, with its "real-time wire data analytics" tracking all L2–L7 communications, including full bidirectional transactional payloads. This innovative approach provides the correlated, cross-tier visibility, which is essential for application performance, availability, and security in today's complex/dynamic IT environments.Extrahop will be raffling off a UDI Drone with HD Camera at the end of the seminar.12:20 - 12:40: Integrated Cloud and Colocation Strategies with ExpedientJason Charlton, a solutions architect, will provide practical recommendations and technical insights on integrating cloud and colocation strategies. For instance decisions to deploy a private, public and/or hybrid cloud must complement and work seamlessly with related decisions to expand internal data centers and/or utilize third-party colocation facilities.Full Hot Lunch (click here to see the delicious menu), Exhibit Area Open, Peer Networking, Product Demonstrations1:20- 2:00: Running Docker Containers at Scale on Amazon Web ServicesAs companies of all sizes begin to leverage docker containers for building and running applications, it is important to provide a scalable and reliable platform to run containers seamlessly on the cloud without administrative overhead.This talk featuring Prahlad Rao, Solutions Architect with Amazon Web Services (AWS), will provide insights into running docker containers on AWS using ECS, capabilities and benefits, ECS integration with container registries like ECR, docker registry, service discovery mechanisms and CI/CD solutions. The talk includes a live demonstration of building/shipping/running docker on AWS ECS.2:00 - 2:30: AOL Big Data/Cloud Case Study: Migrating 2 PB Hadoop Cluster to Amazon Web ServicesGaurav Agrawal is a Senior Software Engineer in AOL's Data Warehousing Group. Gaurav will provide technical insights and real-world insights on how AOL migrated its in-house 2 PB Hadoop Cluster to AWS within two months. Some of the technologies discussed include Hive, Presto, Python, AWS EMR, AWS Lambda, AWS S3, AWS DynamoDB and AWS SQS/SNS; here are specific topics:- Overview of AOL architecture to process Big Data using transient clusters- Usage of Spot Instances to reduce costs by 70-80%- Deployment of AWS Lambda for serverless architecture- Optimal platforms for loosely coupled applications- Utilization of process and scale clusters across multiple regions/AZ's for BC/DR- Best practices for EMR- Monitoring of transient clusters and operational troubleshooting- Hybrid cloud design and Integration with database architecture, within the overall Data Center- Review of operational and financial statistics to verify technical and business benefits from cloud migration2:30 - 2:50: Open Clouds: The Evolution of Private Cloud, Containers, and CloudForms with Red HatCloud Computing – what does it mean? Is it an economic model, an outsourcing plan, or simply the ability to promote innovation within organizations? The answer – all of the above.We are in the middle of a revolution – where concepts like Infrastructure as Code, Micro-services development, and Machine Learning are driving the next generation of adaptive computing and business environments.This session featuring Red Hat will discuss the evolution of technologies to address private cloud, bi-modal computing, hybrid automation and orchestration, with specific insights on how containers, PaaS and these hot/emerging technologies are really about merging business outcomes and technology.2:50 - 3:10: Backup/Disaster Recovery/Business Continuity with DellData is exploding! From LED lighting to ERP, to data at rest, in use or in motion, the gathering and storing of information is creating oceans that need to be accessible, available and recoverable.There is also a lot of change happening in IT architectures. Cloud computing, software defined data centers, and big data initiatives continue to drive change in organizations and the needs of their clients and end users.This session will cover the types of backup technologies available today and how these technologies are evolving to stay in sync with the needs of the market.End of Event, Raffle Prize Drawings for gift cards and other great items!FAQsWhat are Angelbeat's privacy and optin/optout policiesEach attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database. However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors. If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at rgerber@angelbeat.com.Who is eligible to receive a free passThere is no charge to attend for an end user IT professional who works in the telecom/IT/networking/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals, manufacturers, retailers, banks, financial services firms, insurers, real estate/construction/property management, insurance/brokerage agencies, pharmaceutical companies, law/accounting/consulting firms, trucking/transportation/logistic firms, etc. and use, support, purchase and/or are involved in or influence the purchase of products and services offered by our sponsors. If you are a government employee and have limitations/restrictions on your ability to attend free events, then please contact the Angelbeat team by clicking below. For instance, some individuals simply reimburse Angelbeat for the cost of the meals, to avoid any perception of conflict-of-interest.All free attendees must be pre-approved in advance by Angelbeat and Angelbeat reserves the right to accept or reject a free pass request at its sole discretion. As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above who attend our events at no charge. If you fall in this category and would still like to attend then the fee is 0/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015. If you are a non-sponsoring vendor/integrator/consultant and would like to attend but avoid paying this 0 fee, then you must be accompanied by one of your clients who has not previously registered, and is a CIO, CISO or IT Director that meets the end user criteria above. Full-time reporters from major newspapers, websites, television and radio stations can attend as our guest, but again must be approved in advance.If you do not meet the above criteria and still try to register, then you will receive an automatic reply/confirmation from Eventbrite. However you will shortly receive another email from Angelbeat, rejecting and cancelling your registration.What are my transport/parking options getting to the eventDetailed driving directions will be sent out to all attendees one week before the event. There is complimentary self parking.What is the dress codeSuggested dress is business casual.What if you have special dietary needs/restrictionsIf you have special dietary needs/restrictions, then please email Angelbeat below. We will do our best to accommodate any and all requests.

at Hilton Washington DC/North Gaithersburg
1739 West Nursery Rd
Gaithersburg, United States

Orignal From: Baltimore July 28

No comments:

Post a Comment