Automating Your Security Ecosystem with LogRhythm,
Fortinet, and Bradford Networks
This is a great opportunity to join your peers and industry leaders at events hosted by Carolina Advanced Digital covering Security Automation with Fortinet, LogRhythm, and Bradford Networks.
Trends and technologies covered:
• User and Entity Behavior Analytics (UEBA)
• Security Information Event Management (SIEM)
• Network Access Control (NAC)
• Next Generation Firewalls and integrated Security Fabric
• Security Automation roundtable discussion
Join us for the full day, or just a portion.
Dates and locations
• Tuesday, April 24th @ Childress Vineyards, Lexington, NC
• Wednesday, April 25th @ Chatham Hill Winery, Cary, NC
Agenda:
9:30-10:00 Registration and breakfast (breakfast provided)
10:00-10:20 Introduction by Carolina Advanced Digital
10:20-11:50 Fortinet Security
12:00-1:15 Lunch & Learn with LogRhythm (lunch provided)
1:25- 2:45 Bradford Networks
2:45- 3:15 Security Automation – Roundtable Discussion
3:25 Wine Tasting
Who should attend:
• Security analysts, internal testing, and incident response teams
• Firewall, network and wireless admins and managers
• Security professionals interested in the latest SIEM and UEBA technologies
• Professionals interested in the latest network access control (NAC) technologies
• Enterprise and mid-size organizations in all industries
• Technology Directors, CIOs, CTOs, CISOs
• Anyone with cyber security, networking, wireless, threat visibility, incident response, and security intelligence projects
What’s Needed to Secure the IoT & IIoT
Mark Weatherford (vArmour) | Robert M. Lee (Dragos) | Jennifer Minella (Carolina Advanced Digital)
Watch the recording at http://bit.ly/2rKZjiW
Internet of Things devices are built with cost & convenience in mind, not security. This makes them easy targets for cybercriminals looking to exploit their vulnerabilities and infiltrate your systems. With IoT adoption on the rise, organizations are looking for ways to improve security at all levels and limit the damage IoT-powered cyber attacks can cause. The stakes are even higher for the Industrial Internet of Things (IIoT).
Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:
– IoT as a gateway to your systems
– Key factors for building a successful security strategy encompassing the IoT & IIoT
– Threats targeting the IoT / IIoT
– Industrial threat detection and response
– Recommendations for improving security
Speakers:
– Mark Weatherford, Chief Cybersecurity Strategist, vArmour
– Robert M. Lee, CEO, Dragos
– Jennifer Minella, VP of Engineering and Security, Carolina Advanced Digital
Presentation and exhibiting sponsor at NCHICA’s annual conference.
About the conference
The NCHICA Annual Conference provides an excellent opportunity to learn about the latest developments and best practices in healthcare IT. The theme of this year’s conference is Securing the Future of Healthcare through Collaboration, and the agenda is packed with 4 plenary sessions, 21 breakout sessions, and 3 half-day forums. Special events include a Tailgate Party in the exhibit hall and a Durham Gourmet Restaurant Tour on Monday evening. Click on the links below for further details:
VP of Engineering, Jennifer Minella is a member of the RSAC Program Committee, and will be speaking at the RSA Conference.
https://www.rsaconference.com/speakers/jennifer-minella
2028 Future State: Long Live the Firewall?”
Tuesday, Mar 05 | 01:00 p.m. – 01:50 p.m. | Moscone West 3001
The threat landscape has changed since the invention of the firewall 30 years ago, but not because threat actors or their motivations have changed; our networks and how we need to protect them have changed. Not only do we need to start developing tools that adapt to the threats of today, but we need to threat model in a more sophisticated way and ask more questions about what can go wrong.
Learning Objectives:
1: Understand what the firewall of 2028 will look like, and if it will even exist as we know it today.
2: Examine the commercial tools market to see what best adapts to shifts in attack tactics and surface.
3: Learn how to adapt threat modeling to accommodate the actual threat landscape.
Yes, you read correctly, join Carolina Advanced Digital and SentinelOne and get a $50 Amazon card just for listening in. We are partnering with SentinelOne to talk about why legacy anti-virus consistently fails to recognize these new threats, and how next-gen antivirus is designed to future proof your security investment. Only a select group of our customers are invited, so you will have an opportunity to talk with others about pain points and ask our expert the tough questions. Lucky you!
About SentinelOne Demo of Next-gen Antivirus solution:
- Real Time Endpoint Protection
- Active Detection Response
- Cloud Delivered IoT Discovery & Control
- Native Cloud Security
Hurry, spots are limited and registration link is provided by invitation only or upon request from qualifying organizations.
Join Tech Talk episode 4 with the Carolina Advanced Digital crew. In this episode, Jen along with Dan and Mark (or whoever she can grab) will take a look back at the chaos of COVID-19 as organizations scrambled to work through remote access and the cleanup we need to do afterwards. Hosted by Jennifer Minella.
Join us for this special invite-only event
to learn about our new SOC-as-a-Service
Ensuring your organization is free from threats is important now more than ever. Come together with Carolina Advanced Digital, Arctic Wolf and other cybersecurity leaders through a virtual whiskey tasting experience. After a quick introduction by Arctic Wolf and Carolina Advanced Digital, our whiskey expert will lead you through a tasting of a variety of different labels, discussing the flavor profile, production style, and aging characteristics.
Whisky Tasting and Webinar
February 18th, 2021 | 4:00pm ET
This is a special invite-only event with registration limited to 20 attendees. Please do not forward this invite. If there’s a colleague at your organization that’s more appropriate to attend let us know.
Join us to learn about the key elements of SOC-as-a-Service (monitoring, response, and vulnerability management), calculating buy vs. build TCOs, and intro to our new offering with 24x7x365 unlimited SOC services and NOC consulting.
|
|
Security incidents are on the rise, and running a SOC isn’t a part-time job. Even if your organization can afford the top-of-the-line SIEM, SOAR, and vulnerability management tools, chances are your already over-extended sys admin and networking teams simply can’t dedicate the time and energy to managing and monitoring them all.
That’s the story we’ve heard over and over for the past 18 months, and the issue we’ve been striving to solve. With our partner, Arctic Wolf, we’re able to give customers a truly holistic SOC-NOC experience with unlimited security services and network consulting for a flat fee that’s less than ¼ the price of building and managing a SOC in-house. If you need more immediate assistance, reply, contact your account manager, or visit https://cadinc.com/services/security. |
Join us for this special lunch & learn event:
How to Select a Cybersecurity Service: Examining MDR, MSSP, and SIEM
Join us for a discussion on some of the most common managed security services available and find out their key differences as you identify the right fit for your organization. Attendees will receive a Domino’s Pizza gift card for lunch during the event. Registration is limited to 30 attendees.
At this webinar you’ll learn:
- Distinctions between MDR, MSSP, and SIEM and details on their benefits and drawbacks
- Key cybersecurity learnings from over 30 years of industry experience
- How to solve today’s most prominent security operations challenges, including a lack of talent, shrinking budgets, and incompatible tools
Lunch & Learn Webinar
June 15th, 2021 | 12:00pm ET
Register by June 14 at https://bit.ly/3ftaAxi