1 Seminole Way
Davie, FL 33314
USA
Click here to register
Hosted by: Mission Critical Systems and 12 Manufacturers
Join Mission Critical Systems for a day focused on information security. Hear 30-minute TECHNICAL presentations from leading security manufacturers. Have hands-on access to products. Enjoy food, fun and prizes!
Agenda |
|
---|---|
Time | Description |
07:30a – 08:30a | Registration, Breakfast & Exhibition Hall |
08:30a – 08:50a | Aruba Networks Presentation |
09:00a – 12:00p | Sessions I through VI 30-Minutes Each |
12:00p – 01:30p | Lunch, McAfee Presentation & Exhibition Hall |
01:30p – 04:30p | Sessions I through VI 30-Minutes Each |
04:30p – 05:30p | Check Point Happy Hour, Prizes & Exhibition Hall |
Sessions I through VI |
|
---|---|
Salon I | Salon II |
Check Point | Fortinet |
McAfee | AlgoSec |
Aruba Networks | FireEye |
Websense | Gigamon |
ForeScout | Palo Alto Networks |
Imperva | Rapid7 |
Aruba Networks Breakfast Sponsor Presents: “Bring Your Own Device (BYOD) Security & Strategies”
Today’s growing demand for anytime, anywhere network access has expanded to include the use of personal mobile devices such as laptops, tablets, smartphones, e-readers and more. This bring-your-own-device phenomenon is changing the way IT organizations and users address network access security. For IT organizations, BYOD means supporting a variety of devices and their operating systems, and maintaining an expected level of service. To keep costs low, it must be easy to securely onboard new devices and quickly identify and resolve problems.
Whether embedded within the access layer infrastructure and/or deployed as an overlay solution, Aruba Networks offers the most comprehensive solution to enable your BYOD strategy.
McAfee Lunch Sponsor Presents: “Security Tomorrow: The next 5 Years of Security Evolution”
This presentation will discuss how the challenges security professionals face over the next five years will become increasingly complex. The cyberthreat landscape is evolving so rapidly that it is a challenge for IT to keep up. Not only has the threat growth curve shifted from a linear to an exponential one, but threats have become increasingly sophisticated and evasive. With the growth of cyberthreats putting extra pressure on your IT infrastructure and budget, your security needs to work more intelligently.
Check Point Sponsored Happy Hour: No presentations, just libations – after all, you have been working hard all day.