Sponsors…..
A well-defined security plan? A document with “Security Plan” on the top of it
SURVEY SAYS
Identity & Access Management • Multi-Factor Authentication • Life Cycle Management • Network Access Control • Directory Management • Wireless Access Management • User Provisioning • Privileged User management • Identify Governance
SURVEY SAYS
Security Intelligence Solutions • • Log management Governance, Risk, Compliance • SIEM and Audit • Threat intelligence • Forensics • Predictive Analytics
SURVEY SAYS
Infrastructure Security UTM, Perimeter, Mobile, End-point • Next Gen Firewall • Managed Security Services • Email Security / Gateway • Mobile Security and • URL Filtering management • Advanced Anti-Virus & • MDM • System Monitoring, Patching & Malware • Network Segmentation Management • Sandboxing and APT • Encryption
SURVEY SAYS
Tested DR backups in the past 12 months? Actually spun a server and made sure it worked and had data…
SURVEY SAYS
You Are Not Alone
Being here today is a step forward
Together We Can Secure IT Wisconsinbly? • Engrain SECURITY into your Culture • Complexity, Change, Understand the Why • Identify and reduce our risk • Start internally with people, process, policies • Gain visibility into our environments • Systems, tools, partnerships – know the experts
How Do We Bridge the Gap Today?
Keynote Speakers AI-The Real Deal vs. SECURE I.T. WISCONSINBLY Marketing Hype Brett Scott Keith Rayle Director of Solutions Strategist Fortinet, Inc. Development for Tech Data
Security Breakout Sessions Employee Awareness Fortinet Security Data Privacy Laws Microsoft back-up Storage Physical Security Cisco Security Encryption Checklist Essentials Physical Security
Breakout Sessions IIoT Business Collaboration Intelligence Manufacturing RingCentral Smart Cities Public Sector AI & BI
Hands-On Opportunities Incident ent Dark W k Web eb Cyb yber r Respons nse Res esea earch ch Wa Warfare Tablet etop Ra Range Drill Dr
Security Framework • Posture Assessment to determine organization’s capability to manage its Discover defenses • Security remediation plan and future Fortify roadmap • Security intelligence, monitoring and Safeguard management
Together We Can Secure IT Wisconsinbly? • Engrain SECURITY into your Culture • Identify and reduce our risk • Gain visibility into our environments
Instrumental role in creating Cyber-Warfare Ranges Share with us today ways to fill in the Gaps in our Security Plan
Recommend
More recommend