Select Criteria: Tracks =

Monday, March 12
8:00 AM - 11:30 AM

  • Room:   007AB
  • Session Number:  AAP3
  • Monday, March 12, 8:00 AM - 11:30 AM
A strong incident response plan is a key component of any organization's cyber defense. Many organizations, however, have an ineffective, or no cyber response plan in place at all. We only need to look to the daily news to see the impact that an ineffective cyber response can have...
Speakers
Mr.  Devon Ackerman

Associate Managing Director, Cyber security and Investigations
Kroll
Instructor

Lucie Hayward

Senior Managing Consultant, Cyber security and Investigations
Kroll
Instructor

Stacy Scott

Managing Director, Cyber Security and Investigations
Kroll
Instructor

See More


Monday, March 12
2:10 PM - 3:10 PM

  • Room:   006AB
  • Session Number:  DCDM17
  • Monday, March 12, 2:10 PM - 3:10 PM
The new European General Data Protection Regulation (GDPR) goes into effect in May 2018 and applies to any company, anywhere in the world, that collects sensitive data about European customers or employees. GDPR also comes with onerous breach notification requirements and high penalties for failing to comply, and data center operators may...
Speaker
Kenneth Sanford

Lead Analytics Architect
Dataiku
Speaker

See More


Tuesday, March 13
12:40 PM - 1:40 PM

  • Room:   207AB
  • Session Number:  SEC5
  • Tuesday, March 13, 12:40 PM - 1:40 PM
Businesses are expected to spend over $101 billion by 2020 on cybersecurity. Yet, when it comes to protecting the very same data as IT equipment is decommissioned or migrated from the data center, they are willing to accept security strategies that merely mitigate data breach exposure. Even though a proven...
Speaker
Jim Harris

Vice President Data Center Services
ITRenew
Speaker

See More


Tuesday, March 13
1:50 PM - 2:50 PM

  • Room:   006AB
  • Session Number:  SEC13
  • Tuesday, March 13, 1:50 PM - 2:50 PM
A presentation by Associate Managing Director, Devon Ackerman of Kroll Cyber Security that focuses on five lanes of Cyber threats facing corporations and businesses around the globe. Broken down into Criminal, Terrorism, Hacktivists, Espionage, and Nation State, Devon guides the audience through real world scenarios and cyber threats through the...
Speaker
Mr.  Devon Ackerman

Associate Managing Director, Cyber security and Investigations
Kroll
Speaker

See More

  • Room:   207AB
  • Session Number:  SEC7
  • Tuesday, March 13, 1:50 PM - 2:50 PM
Is there a weak link in your security policy? Learn how systems and devices are exposing your enterprise to cyber threats – and what you can do to eliminate vulnerabilities. With a rise in cyberattacks, ransomware, and other threats, businesses have been shoring up their IT infrastructure defenses on many...
Speaker
Richard Dominach

Director of Product Management
Raritan, a brand of Legrand
Speaker

See More


Wednesday, March 14
9:10 AM - 10:10 AM

  • Room:   207AB
  • Session Number:  SEC8
  • Wednesday, March 14, 9:10 AM - 10:10 AM
During this session you'll learn how leveraging Network Access Control can deliver a Zero Trust approach to network segmentation and access control. We will discuss the attack vectors on the enterprise, how Network Access Control identifies all resources and users on the network, and how rules and policies can be...
Speaker
Mr.  Don O'Neil

Director, Network Security
PriceWaterhouse Coopers
Speaker

See More

  • Room:   205
  • Session Number:  CE6
  • Wednesday, March 14, 9:10 AM - 10:10 AM
Recent research has shown that over 60% of organizations have or are already planning on implementing an IoT solution. More and more business leaders are understanding the immediate requirements around IoT deployment. However, what are the biggest challenges? And, what actually makes up an IoT device? In this session, we...
Speaker
Mr.  Bill Kleyman

Director of Technology Solutions
EPAM Systems
Speaker

See More


Thursday, March 15
8:00 AM - 9:00 AM

  • Room:   Lila Cockrell Theater
  • Session Number:  KEY3
  • Thursday, March 15, 8:00 AM - 9:00 AM
In a very provoking and highly insightful manner, “The Art of Cyber Conflict” applies Sun Tzu's classic, “The Art of War,” to the issues of operating and defending in cyberspace. With a fresh perspective, it allows individuals and organizations get beyond the day-to-day and to think strategically about how to...
Speaker
Mr.  Henry Sienkiewicz

Chief Innovation & Revenue Officer
Secure Channels
Speaker

See More


Thursday, March 15
9:10 AM - 10:10 AM

  • Room:   006AB
  • Session Number:  DCDM21
  • Thursday, March 15, 9:10 AM - 10:10 AM
The data center comprehensive enterprise solution continues to transform in 2018. This includes considerations for cybersecurity. Learn the “elements” and fundamental concepts associated with the continued transformation. Understand What: Board of Directors, Senior Management, Stock Holders, Trustees, and Tax Payers are looking for in their data center solution. A vendor...
Speaker
Mr.  Mark Evanko

Principal - Engineer
BRUNS-PAK
Speaker

See More

  • Room:   207AB
  • Session Number:  SEC10
  • Thursday, March 15, 9:10 AM - 10:10 AM
Has your data center's safety responsibilities fallen on you? Afraid you don't know how to keep everyone safe from the dangers of data centers? Did you think data centers were completely safe workplaces? Worry not! In this session we will introduce you to the biggest safety hazards present in data...
Speaker
Ms  Yashira Frederick

Manager, Facilities and Continuity Management
Wyndham Hotel Group
Speaker

See More


Thursday, March 15
10:40 AM - 11:40 AM

  • Room:   207AB
  • Session Number:  SEC11
  • Thursday, March 15, 10:40 AM - 11:40 AM
As data hacks become more sophisticated, it’s important for data centers to not only secure their digital presence, but also their physical facility from potential intrusions. This session will engage attendees in a discussion around how advanced technology can prevent intrusion threats to data centers across three areas – external...
Speaker
Joe Morgan

Business Development Manager, Critical Infrastructure
Axis Communications
Speaker

See More