Kansas City May 18

Kansas City May 18
Event on 2015-05-18 07:30:00
Program Description: This comprehensive seminar covers the increasingly related topics of private/public cloud architecture, security/compliance, storage/backup and wireless/vdi/byod. Angelbeat coordinates expert speakers from Cisco, Microsoft, Dell, HP, Kaspersky and other top firms – scroll down to see the agenda – who deliver concise, technical, educational and complementary talks. There is a special end user case study delivered by Ryan Branstetter, CIO at KC-based Murphy-Hoffman, one of the largest truck dealerships in the US with over 3,000 employees. Content is pre-approved by Angelbeat and past attendees to maximize learning; click here to download presentation guidelines that are followed by all speakers. Click here to read NY Times article on Kaspersky uncovering 0 million stolen from banks by hackers. As one Walmart attendee states, "Of all the seminars I attend, your format is by far the best. Brief informative talks from vendors, followed by one-on-one time at their booth to find out more. I am out of the office for less than a day yet I have access to all the different solutions. This year I will follow up with two vendors." As another IT Director commented, "Thanks for hosting a very informative meeting with vendors that tied in well; it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace." Join your peers from Sprint, YRC Freight, Hallmark, HNTB, Stinson Leonard, Acendas, Garmin, Mediware, Midwest Trust, Bank of America, Saint Luke's Health, State of Missouri, City of Olathe, County of McPherson, University of Kansas, University of Missouri KC, Topeka Schools, USDA, FAA and many more leading organizations who are confirmed attendees. Every attendee receives meals including a full hot lunch (click here to see the delicious menu), 6 month free subscription to Kaspersky's retail anti-virus software, complimentary self-parking and Wi-Fi, plus 4 CPE credit hours towards your CISSP or other certification. There are drawings for a tablet, gift cards and other prizes at the end. Given the recent Sony and Anthem breaches, you definitely want to attend and learn how to protect your confidential data, stored onsite or in the cloud, accessed via wired or wireless network, from any device, against the latest threats. 7:30 – 8:45: Registration, Breakfast, Exhibit Area Open, Peer Networking, Product Demonstrations 8:45 – 9:00: Top Five Tips for Educating Employees about Cybersecurity with Kaspersky Corporate cybercrime is usually blamed on outsiders, but sometimes employees can represent the biggest threat to your organization’s IT security. In his presentation, Kaspersky’s Mark Villinski will provide practical advice for educating your employees about cybersecurity, covering topics including: – How to create efficient and effective security policies – Overview and statistics of the current threat landscape – The importance of keeping your employees updated about the latest threats and scams – Security solutions that can help keep your systems updated and protected Kaspersky is the world's largest privately held, and among the top four security vendors, operating in 200 countries and protecting 400 million users. 9:00 – 9:15: Stopping Insider Threats, Attacks and Hacks with Varonis The recent spate of highly publicized breaches has drawn attention to the most challenging issue that keeps security professionals up at night – once an attacker is “inside” the network, their activities are often difficult to spot and recover from. This is true of outside attackers that compromise the credentials and systems of employees, as well as employees that are "breaking bad" or unwittingly exposing sensitive files. 9:15 – 9:30: Top Ten Checklist for Securing Your Network with Accelops: Anthem, Sony, JP Morgan Chase, Target … Seemingly every day, another large and sophisticated company suffers a major security breach. In this era of DevOps, software-defined everything, and the Internet of Things, current security tools are increasingly vulnerable and (as these examples demonstrate) cannot prevent attacks by sophisticated hackers. There is hope however….. During this session featuring Accelops, organizations of all sizes will learn how to prevent data center attacks and improve overall network/infrastructure performance by: – Cross-correlating security and performance events – Using synthetic transactions to proactively monitor business services – Creating baselines using machine learning to automate remediation – Using auto-remediation to correct known errors – Mapping hardware and software to your business services 9:30 – 9:45: Real-Time Breach Analysis with iScan iScan Online is a patented technology that deploys in minutes, quantifying the potential financial liability and impact of a data breach. It discovers sensitive data, detects threats and produces reports/analytics showing: – Liability exposure for C-level executives and board members tied to financial reporting – Clear prioritization of where to invest IT resources to prevent breaches and maintain shareholder value – Metrics that substantiate/validate efforts to reduce/mitigate the impact of a breach. – Calculations to help evaluate cybersecurity insurance iScan Online answers 3 hot questions; Where is your data? How will it be compromised? What will a breach cost? 9:45 – 10:05: Protection against DNS-based Attacks Including DDoS from Infoblox DNS servers are mission-critical infrastructure, and they have to continue to respond to queries even when they are under attack. If your external DNS server goes down, your entire network is shut off from the Internet. In the last year alone, DNS attacks have increased by more than 216 percent and growing. Attackers look for the weakest links in your network, and the Domain Name System (DNS) protocol is easy to exploit. As a result, attacks designed to bring down DNS servers and consume network bandwidth—and to interfere with or shut down critical IT applications such as email, web sites, VoIP, and software as a service (SaaS)—are on the rise.  Infoblox will look at these most common attacks and what you can do to provide superior protection to your critical DNS services. Infoblox (NYSE:BLOX) helps customers control their networks. Its solutions help businesses automate complex network control functions to reduce costs, increase security and maximize uptime. Infoblox technology enables automatic discovery, real-time configuration and change management and compliance for network infrastructure, as well as critical network control functions such as DNS, DHCP and IP Address Management (IPAM) for applications and endpoint devices. Leveraging patented Grid™ technology, Infoblox delivers higher availability, and an authoritative network database for real-time and historical reporting. As the market leader in Automated Network Control, Infoblox provides services and solutions to over 6,100 enterprises and service providers in 25 countries. Its integrated hardware and software solutions help businesses control data flow on their networks by making them more automated, more available and more secure; giving customers the ability to see what's connected to the network, configure and change what's there, and prevent malware from spreading across the enterprise. 10:05 – 10:25: BYOD/Bring Your Own Device, Cloud-based Management of High-Speed 802.11n/ac WiFi Networks, Access Point/Antennae Architecture, the "Internet of Things", with Cisco During the first weekend of sales, Apple sold over 10 million iPhone 6's. For 2014, there will be sales of ~100 million iPad's and ~400 million Android-powered smartphones and tablets. These devices are often employee-owned and are rapidly making their way to the workplace – the Bring-your-own-Device (BYOD) revolution – creating a new set of security and management challenges for IT departments. Plus each device creates exponential growth in network traffic and data – the Internet of Things. Attendees will learn about best practices for supporting tablet, laptop, smartphone and other devices on your network, which often run different operating systems and rely upon different security protocols. For instance, how can sensitive corporate data be segmented/separated/encrypted from personal information when using the same device? How can you integrate a Mobile Device Management (MDM) solution with existing end point/anti-virus security products? Should you create specialized apps for your employees and/or customers, or do smartphone browsers have sufficient functionality? What is the best approach for providing guest access to visitors on my corporate network, without any performance degradation or security risks? How can you create an integrated WiFi/cellular strategy that provides for secure and speedy access over any wireless network? Every tablet and smartphone shares a common feature – they can only connect to the Internet via wireless, which greatly increases the importance of a comprehensive wi-fi infrastructure and strategy. With unlicensed wireless device growth measured in the billions of units, combined with a growing role for machine-to-machine mobile communications (the "Internet of Things") and more wireless-based mission-critical applications, it is essential that IT professionals eliminate rf interference, ensure end user wi-fi performance and understand the next generation of standards including 802.11n and 802.11ac, which enables multi-station WLAN throughput of 1 gigabits per second. For instance, attendees will learn about rf antennae design and controller architecture, and why different vendor's access points, even if they all operate under the same 802.11 standard, nonetheless may have vastly different performance. This session concludes with a demonstration of cloud-based applications that let IT professionals remotely manage and configure WiFi networks anywhere in the world, securely and cost effectively. 10:25 – 10:40: Wide Area Network (WAN)/Fiber Optic Infrastructure Configuration/Redundancy from Telecomp and AT&T The exponential growth of cloud-based applications, many of which are bandwidth intensive such as video, places much greater emphasis/importance on an organization's Wide Area Network (WAN)/Fiber Optic Infrastructure. With mission-critical programs such as Email, ERP, CRM, eCommerce and others now hosted (versus on-site/local installation), IT professionals must pay very close attention to configuration of their WAN infrastructure, to meet the QoS/performance requirements of end users and support DR/BC objectives. Telecomp, one of AT&T's largest partners in the United States, will provide valuable insights on how they utilitize technology/services from AT&T and others to configure WAN architectures for their clients. Coffee/Refreshment Break, Product Demonstrations, Exhibit Area Open, Peer Interaction 11:20 – 11:45: Data Management in the Enterprise: Applying Modern Solutions with Eagle Technologies and CommVault, plus end user case study featuring Ryan Branstetter, CIO of Murphy-Hoffman Organizations of all sizes are struggling to manage the exponential growth of data. To address this trend, businesses must take a holistic view of data management, covering these related “data” topics: protection, value, integrity, accessibility, storage tiering and compliance. By adopting solutions that work seamlessly with each, IT managers can reap the benefits of improved performance, efficiency, business continuity and ROI in their datacenter. Representatives from Eagle Technologies and CommVault will be featured during this informative session. Then Ryan Branstetter from Murphy-Hoffman will discuss how they use Commvault technology and Eagle services to manage/secure their IT infrastructure supporting 3,000+ employers, working at 95 truck dealerships across 13 states. 11:45 – 12:05: Primary Storage and Flash Technology with Tegile Tegile is pioneering a new generation of flash-driven enterprise storage arrays that balance performance, capacity, features and price for virtualization, file services and database applications. Its hybrid arrays are significantly faster than legacy arrays and significantly less expensive than all solid-state disk-based arrays. Featuring both NAS and SAN connectivity, these virtual data storage systems are easy-to-use, fully redundant, and highly scalable, plus come with built-in snapshot, replication, near-instant recovery, and virtualization management features. 12:05 – 12:25: Data Aware Storage with Interwork and Data Gravity DataGravity helps organizations unlock the value of their data. The DataGravity Discovery Series is a data-aware storage platform that allows IT professionals and line-of-business users to store, protect, search and govern their data. Its patent-pending architecture, powered by the DataGravity Engine, analyzes data as it is ingested without impacting performance, so administrators and users can quickly and easily explore and use data more effectively to derive insights that increase productivity, efficiency and organizational success. 12:25 – 12:45: Dell Backup/DR/Data Protection for Physical, Virtual, Cloud Platforms with Concergent Disaster Recovery/Business Continuity is vitally important in today's always-on world. But when data can be at rest, in use or in motion – and stored on physical, virtual and/or private/public/hybrid clouds – a cost-effective and manageable solution can be very challenging. Dell and its partner Transcendent will discuss how organizations of all sizes can meet this challenge, through its broad portfolio of scalable solutions that protect data and deliver rapid recoverability across physical, virtual and cloud environments. Its automated processes for validating and verifying the integrity of data helps ensure the success of every recovery. They will also cover: – Trends in data protection/DR/backup and how cloud, offsite hosting, big data, security/compliance requirements and an increasingly mobile workforce affects business continuity plans – The value of a common data protection/DR/backup platform that seamlessly and consistently covers legacy physical servers plus data stored on virtual/cloud platforms Full Hot Lunch (click here to see the delicious menu), Exhibit Area Open, Peer Networking, Product Demonstrations 1:20 – 1:40: Next-Generation Data Center and Virtual Computing Platforms – Adapting Google's Architect/Strategy to your Infrastructure and Cloud Strategy – with Nutanix Nutanix delivers web-scale IT infrastructure – modeled after Google's, Amazon's and Facebook's architecture – to medium and large enterprises with its software-driven Virtual Computing Platform, natively converging compute and storage into a single solution to drive unprecedented simplicity in the datacenter. Customers can start with a few servers and scale to thousands, with predictable performance and economics. With a patented elastic data fabric and consumer-grade management, Nutanix is the blueprint for application-optimized and policy-driven cloud/data center infrastructure. 1:40 – 2:00: Cloud Case Study: Midwest Financial Institution and IP Pathways The world of technology is rapidly evolving and changing. Internal IT organizations are under increasing pressure to become from flexible, agile and in step with the business. No matter if private clouds, public clouds or hybrid clouds, workloads are moving to the cloud. IT is in a position to evolve into the broker of these services, sitting over the top to manage, secure and orchestrate. In this session, IP Pathways will discuss the journey to the Hybrid cloud and IT-as-a-Service, with a detailed case study example covering a large national financial institution based in the Midwest. Some of the topics address include buying (capex) versus renting (opex), managed versus outsourced, and the creation of a complete Hybrid Cloud solution. 2:00 – 2:20: HP: Simplify Your Network with Software Defined Networks (SDN) Software-defined networking (SDN) is an emerging architecture that is dynamic, manageable, cost-effective, and adaptable, making it ideal for the high-bandwidth, dynamic nature of today’s applications. This architecture decouples the network control and forwarding functions, enabling the network control to become directly programmable and the underlying infrastructure to be abstracted for applications and network services. In this session, you will learn about the layers of the SDN architecture, how a hybrid SDN deployment can enable you to slowly adopt SDN without the need to “rip and replace,” and how HP has developed an open SDN ecosystem that ensures choice and flexibility. You’ll see how SDN can lower your costs, improve availability and scale, and enable you to deliver services faster. 2:20 – 2:50 Microsoft: Azure Cloud and Infrastructure Services Microsoft's Azure is an open and flexible cloud platform that enables you to quickly build, deploy and manage applications across a global network of Microsoft-managed datacenters. You can build applications using any language, tool or framework. And you can integrate your public cloud applications with your existing IT environment. Here are some of the major features that will be discussed during this informative session: – Always On: 99.95% monthly SLA enables you to build and run highly available applications without focusing on the infrastructure. – Open: Use any language, framework, or tool to build applications. Features and services are exposed using open REST protocols. The Windows Azure client libraries are available for multiple programming languages, and are released under an open source license. – Unlimited Servers and Storage: Easily scale your applications to any size. It is a fully automated self-service platform that allows you to provision resources within minutes. Elastically grow or shrink your resource usage based on your needs. You only pay for the resources your application uses. Windows Azure is available in multiple datacenters around the world. – Powerful Capabilities: Azure is a flexible cloud platform that can satisfy any application need. It enables you to reliably host and scale out your application code within compute roles. You can store data using relational SQL databases, NoSQL table stores, and unstructured blob stores, and optionally use Hadoop and business intelligence services to data-mine it.  – Security, Identity and Access Management: Azure Active Directory delivers an enterprise ready cloud identity service enabling a single sign-on experience across cloud and on-premises applications. It allows multi-factor authentication for added security and compliance. End of Event, Raffle Prize Drawings for Gift Cards and other great items! FAQs What are Angelbeat's privacy and optin/optout policies Each attendee acknowledges/understands that financial support from Angelbeat sponsors allows him/her to attend this event at no cost, and that the sponsors will be given your contact information 2 days after the event for follow-up email and telephone communications. All sponsors are required to provide you with an opt-out option, allowing you to be removed from their database. However each attendee can opt-out of sponsor follow-up by informing Angelbeat staff at the event, or by emailing Angelbeat immediately after the event, but before Angelbeat releases the attendee list to the event sponsors. If you have any questions regarding Angelbeat's privacy policies and how your contact information is used, please contact CEO Ron Gerber directly at 516-277-2057 or at rgerber@angelbeat.com. Who is eligible to receive a free pass There is no charge to attend for an end user IT professional who works in the telecom/IT/networking/security/data center/desktop/purchasing departments of corporations (private and publicly-held, large and small), universities, school districts, government agencies, hospitals, manufacturers, retailers, banks, financial services firms, insurers, real estate/construction/property management, insurance/brokerage agencies, pharmaceutical companies, law/accounting/consulting firms, trucking/transportation/logistic firms, etc. and use, support, purchase and/or are involved in or influence the purchase of products and services offered by our sponsors. Systems integrators and consultants who attend with or are representing their enterprise clients are also eligible to receive a free pass. Full-time reporters from major newspapers, websites, television and radio stations can also attend as our guest. If you are a government employee and have limitations/restrictions on your ability to attend free events, then please contact the Angelbeat team by clicking below. For instance, some individuals simply reimburse Angelbeat for the cost of the meals, to avoid any perception of conflict-of-interest. As a general policy Angelbeat does not offer free passes to individuals at companies that are looking to sell their products/services to the end user personnel described above who attend our events at no charge. If you fall in this category and would still like to attend then the fee is 0/person. To sign up please click here, complete the pdf document that appears and fax it back to Angelbeat at 703-783-8015. All free attendees must be pre-approved in advance by Angelbeat and Angelbeat reserves the right to accept or reject a free pass request at its discretion. If you do not meet the above criteria and still try to register, then you will receive an automatic reply/confirmation from Eventbrite. However you will shortly receive another email from Angelbeat, rejecting and cancelling your registration. What are my transport/parking options getting to the event Detailed driving directions will be sent out to all attendees one week before the event. There is complimentary self parking. What is the dress code Suggested dress is business casual. What if you have special dietary needs/restrictions If you have special dietary needs/restrictions, then please email Angelbeat below. We will do our best to accommodate any and all requests.
at Corporate Woods Park (North)
North of College Boulevard
Overland Park, United States

FREE this week at our domain registration prices store:

Not Authenticated: 0093d4e2bd2fff2ce36683bf4e608030065ab3dfe774408be60e56410852fd90219523598f0a8b933f5fa7b6a4d48909e57d4d052585bbc7680a918de6a1b3b627/481cc3d227b4a14ff834f2402860bf8c89f84e939828d8558bced5805b0367a7cab89e52c5f7bc59e16a66527f754d9cab8f0e769f164871cf23422271a05a71
Tags: ,

Comments are closed.