Security is top of mind for IT leaders. As it should be. Today’s landscape of threat actors is evolving faster than ever before. To mitigate against these constantly evolving threats security needs to be on the top of EVERYONE’s mind! That’s right. Network admins, virtualization engineers, storage managers, and application developers should all be equally as concerned with security. THIS, is the Security Mindset.
At this exclusive invite only event we will explore industry trends in cybersecurity, analyze the anatomy of cyber attack, discuss the necessity of risk profiling and then finally show off a few of the easiest and quickest ways to buy down risk against an attack. And here’s a hint, the way to do this is not micro segmentation. While micro segmentation might be a good long term goal in your security strategy it is far from being the best place to start your journey into controlling lateral movement in the data center. To find out just how easy and quick it is to be protected, register for and attend the Security Mindset event.
Whether you’re a security professional or a vSphere lifer, you don’t want to miss this session. Don’t miss your chance to gain deep insight into the most effective first steps in developing a cyber defense strategy.
Please note there are limited spots available for the Security Mindset Roadshows. We recommend you submit your interest early, and as spots become available, you will be notified by the VMUG Team that your ticket is confirmed. You can contact the VMUG team at firstname.lastname@example.org with any questions in the meantime.
|10:00 – 10:55 AM
|Keynote: Security Mindset: The Secret Weapon to Cyber Risk Mitigation
The opening Security Mindset keynotewill showcase the importance of developing a Security Mindset for yourself as well as for your organization. will dig into the sophistication, and lack thereof, of hacker’s and their tool sets. The session will explore why it is difficult for us as humans to readily adopt the shift in mindset that is required in order for enterprises to be truly resilient to cyber threats.
|10:55 – 11:10 AM
|11:10 – 11:30 AM
|Controlling Lateral Movement
This session will cover strategies for designing and implementing security policies to combat a hacker’s most common behaviors. Through presentations and demonstrations our subject matter experts will prove that being a critical part of your organizations cybersecurity solution doesn’t require sophisticated tools and decades of knowledge on the MITRE attack framework. You just have to be willing to step up and play your part with a Security Mindset.
|11:30 – 11:50 AM
|Protecting Against Malicious Use of Remote Desktop Protocol
|11:50 – 12:15 PM
|Securing DNS Name Resolution Traffic
|12:15 – 1:00 PM
|1:00 – 1:15 PM
|Securing Microsoft Active Directory
|1:15 – 1:30 PM
|Controlling Access to Legacy Operating Systems
|1:30 – 2:00PM