Sponsors.. A well-defined security plan? A document with Security - - PowerPoint PPT Presentation
Sponsors.. A well-defined security plan? A document with Security - - PowerPoint PPT Presentation
Sponsors.. A well-defined security plan? A document with Security Plan on the top of it SURVEY SAYS Identity & Access Management Multi-Factor Authentication Life Cycle Management Network Access Control
Sponsors…..
A well-defined security plan?
A document with “Security Plan” on the top of it
SURVEY SAYS
Identity & Access Management
- Multi-Factor Authentication
- Network Access Control
- Wireless Access Management
- Privileged User management
- Life Cycle Management
- Directory Management
- User Provisioning
- Identify Governance
SURVEY SAYS
Security Intelligence Solutions
- Log management
- SIEM
- Threat intelligence
- Predictive Analytics
- Governance, Risk, Compliance
and Audit
- Forensics
SURVEY SAYS
Infrastructure Security UTM, Perimeter, Mobile, End-point
- Next Gen Firewall
- Email Security / Gateway
- URL Filtering
- Advanced Anti-Virus &
Malware
- Network Segmentation
- Sandboxing and APT
- Managed Security Services
- Mobile Security and
management
- MDM
- System Monitoring, Patching &
Management
- Encryption
SURVEY SAYS
Tested DR backups in the past 12 months?
Actually spun a server and made sure it worked and had data…
SURVEY SAYS
You Are Not Alone
Being here today is a step forward
Together We Can Secure IT Wisconsinbly?
- Engrain SECURITY into your Culture
- Complexity, Change, Understand
the Why
- Identify and reduce our risk
- Start internally with people, process,
policies
- Gain visibility into our environments
- Systems, tools, partnerships – know
the experts
How Do We Bridge the Gap Today?
Keynote Speakers
AI-The Real Deal vs. Marketing Hype Keith Rayle Strategist Fortinet, Inc. SECURE I.T. WISCONSINBLY Brett Scott Director of Solutions Development for Tech Data
Employee Awareness Microsoft back-up Cisco Security Essentials
Security Breakout Sessions
Fortinet Security Storage Encryption Data Privacy Laws Physical Security Checklist Physical Security
IIoT Manufacturing Public Sector
Breakout Sessions
Business Intelligence Smart Cities AI & BI Collaboration RingCentral
Hands-On Opportunities Incident ent Respons nse Tablet etop Dr Drill Cyb yber r Wa Warfare Ra Range Dark W k Web eb Res esea earch ch
Discover
- Posture Assessment to
determine organization’s capability to manage its defenses
Fortify
- Security remediation
plan and future roadmap
Safeguard
- Security intelligence,
monitoring and management
Security Framework
Together We Can Secure IT Wisconsinbly?
- Engrain SECURITY into
your Culture
- Identify and reduce our
risk
- Gain visibility into our