October 7

1:00 pm

to

1:50 pm

Hewlett Packard Enterprise & Nth Generation

​​HPE + Nth Labs

__

Arctic Wolf

Enhancing Your Security Posture for Today, Tomorrow and the Future

Organizations everywhere are struggling with detecting and responding to modern cyberthreats efficiently. While many IT departments have deployed security tools in an attempt to address this, the lack of 24x7 coverage, extensive security operations expertise, and a well-staffed security team means many threats go unnoticed and can linger in the environment for months. Many high-profile data breaches occur not because the security tool failed to raise an alert—they fail because the alert isn’t addressed, or is overlooked. Join this session led by Lane Roush, VP of Presales Engineering at Arctic Wolf, and learn how the industry’s only cloud-native platform to deliver security operations as a concierge service, the Arctic Wolf® Managed Detection and Response (MDR) solution, eliminates alert fatigue and false positives to promote a faster response with detection and response capabilities tailored to the specific needs of your organization.

__

Aruba Networks

__

iland

The two sides of data protection in the age of cybercrime and ransomware

Data Protection means many things to many people. The reality is that in the face of ransomware, what is needed is a multi-pronged approach that includes both security with defense-in-depth and recovery with backups and IT resilience. A comprehensive solution can protect your organization no matter what challenges come along.
 
 In this session, learn how both security and recovery solutions from iland and Nth Generation can mitigate the challenges of ransomware and other data outages.
 
 Learn:
 - The dual sides of data protection
 - How to create a robust security posture with defense-in-depth and critical control frameworks to mitigate the risk of ransomware, data loss, and downtime
 - Complete IT resilience with Disaster Recovery as a Service (DRaaS) solutions
 - How the cloud can accelerate your security and IT initiatives

October 7

2:00 pm

to

2:50 pm

Hewlett Packard Enterprise & Nth Generation

Cares Act Part II

__

Security.ai

Rethinking Data Discovery with a Privacy Lens

The convergence of exploding data volumes and increasing data privacy regulations are creating unique challenges for businesses. Traditional data discovery methods, such as DLP, are limited to simply classifying data in various categories, such as sensitive, financial, or PII. They were not designed for privacy, and are not effective for providing rights to individuals in an automated fashion aligned with the latest regulations. Data discovery for privacy requires accurately identifying personal data, which may be broad in scope, and mapping that data back to the individual owner. It also requires data associated with individuals to be automatically discovered in a way that does not create PD sprawl by storing PD in indexes. Delivering this at scale requires automation. This interactive workshop will feature insights on best practices for data discovery with a privacy compliance lens and is relevant for professionals across data management, information technology, data privacy, compliance, and information security.
 
 Key takeaways:
 - Understanding data discovery requirements for privacy
 - Harnessing bot technology and AI to accurately identify personal data
 - Optimizing business processes across stakeholders in

__

Nth Generation

Nth Solution Architect Panel Part II

__

Proofpoint

4 Steps to Reducing Insider Risk in the New Work Reality

Digital transformation has been reshaping work for years. 2020 has accelerated global reliance on remote work and cloud-based technologies at a pace we’ve never seen before. From a cybersecurity perspective, many organizations have been caught flat-footed by insider threats.
 According to Verizon, 30% of data breaches are insider driven. The cost of these insider breaches has risen by 31% in two years to $11.45 million. Whether negligent, malicious or criminal, insider threats present a major financial and reputational risk to organizations. Insiders can be anyone from a trusted employee, to a third-party contractor, to a supply chain vendor. Yet, most organizations still rely on defending outside attacks to a “perimeter” that no longer exists – especially in our new work reality. Modern security programs complement traditional “outside-in” security solutions with a people-centric approach to insider threats. Only an approach that blends people, process, and technology can successfully prevent data loss.
 
 In this session you will learn:
 - The new realities of how a distributed workforce and third-party workers access systems and data
 - The unique risks of insider threats and how to protect against data loss
 - How to take a people-centric approach to strengthen resilience and reduce insider risk

October 7

3:00 pm

to

3:50 pm

Hewlett Packard Enterprise & Nth Generation

Around the Storage Block

The latest innovations from HPE Storage l Hewlett Packard Enterprise & Nth Generation

__

Cohesity

Transform Data Management
 

 Key takeaways:
 - Understanding data discovery requirements for privacy
 - Harnessing bot technology and AI to accurately identify personal data
 - Optimizing business processes across stakeholders in

__

AMD

AMD EPYC™

 

The New Leader for the Modern Data Center

__

Nutanix

Nutanix Hybrid Cloud is Here

 

October 7

4:00 pm

to

4:50 pm

Hewlett Packard Enterprise

Compute

The World’s most secure Industry Standard Server, keeps getting more secure

__

Extreme Networks

Digital Transformation Business drivers with Extreme's Fabric Connect

__

Veeam

Two big questions you should ask about O365 and ransomware recovery

__

Hewlett Packard Enterprise

HPE Containers

 

If you are a public sector employee, it is critical that you verify the ethics code, laws and/or regulations that govern your ability to accept items of value from companies with whom you conduct business.  Employees of a U.S. K-12 public or private educational institution or any U.S. library should ensure compliance with the FCC’s E-rate gift rules (47 CFR Part 54) in addition to their local rules, regulations, and policies. Please obtain the necessary approval from your organization before accepting any item of value from HPE.

  • LinkedIn - Black Circle
  • Twitter - Black Circle
  • YouTube - Black Circle
  • Facebook - Black Circle

© 2018 - 2020 by Nth Generation  Questions?  Contact us at Symposium@nth.com