Carolina Advanced Digital will be sponsoring and exhibiting at the FLGISA conference.
About FLGISA
The Florida Local Government Information Systems Association is an organization for CIO’s, IT Managers, and technology decision makers from the state’s local government agencies. We welcome all jurisdictions to become a member. The FLGISA can benefit your organization no matter how big or small.
Carolina Advanced Digital’s VP of Engineering and (ISC)2 Board of Directors member will be speaking at the (ISC)2 Security Congress conference, co-located with ASIS in Anaheim, CA.
Presenters
- Jennifer Minella, VP of Engineering and Consulting CISO and (ISC)² Board Secretary, Carolina Advanced Digital, Inc.
- Galina Antova, Team8
- Shirley Pierini, Vice President, KMS Security
- Christina Duffey CPP, President, Anderson Security Age
Date: Wednesday, September 30, 2015
Time: 1:45PM – 2:45PM
Join our partner Fortinet for an in-depth four hour technical training followed by a network cocktail reception.
Carolina Advanced Digital is a Platinum Fortinet Partner offering consulting and integration of a breadth of security solutions.
Agenda
10:30am- Registration on the FortiExpress
11:00am-3:00pm- 5.4 Boot Camp Training; Customers and Partners Welcome; Lunch will be served (boxed or catered inside truck)
3:00pm-5:00pm – Networking Cocktail Reception at Brier Creek Beer Garden with appetizers (other local venue)
FortiOS 5.4 delivers Faster Time to Resolution through visibility and control enhancements, new security integrations and services, and performance boosting improvements to enable internal segmentation firewall deployments.
Seats are limited!
Section 1 – Basics
• TFTP Boot Process
• Switching changes in FortiOS
• New FlatUI overview and VDOM changes
• Transparent vs NAT mode changes
• Lab
Section 2 – Policy
• Policy changes and enhancements
• The New Internet Services Database- ISDB
• Revamped Traffic Shaping
• Vwire
• SSL Inspection
• Lab
Section 3 – ATP
• Lifecycle of a Virus
• Compact Pattern Recognition Language (CPRL)
• Proxy Mode vs Flow Mode
• ATP Integration
• Botnet Mitigation
• Test Your Metal
• Lab
Section 4 – Advanced
• FortiView
• ADVPN
• DNS Profiles
• WAF
• Link Load Balancing
• Lab
**Please bring a laptop with wired ethernet port, DB9 serial port and terminal software.
Join our VP of Engineering for sessions at Security Congress. As vice chair of the Board of Directors, Jennifer will be answering questions at the Town Hall panel session Monday afternoon. Join her Tuesday for a session on “A Snapshot of Women in Cybersecurity”
5115 – A Snapshot of Women in Cybersecurity
Tuesday, September 26
10:30 AM – 11:30 AM central
Tweet us at @cadinc with event tag #isc2congress.
About the Conference
(ISC)² Security Congress cybersecurity conference brings together over 1,900 industry colleagues, offers 100+ educational and thought-leadership sessions, and fosters collaboration with other forward-thinking companies. The goal of our conference is to advance security leaders by arming them with the knowledge, tools, and expertise to protect their organizations.
About (ISC)²
(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. (ISC)² is best known for the acclaimed CISSP®. Visit www.isc2.org.
Join our VP of Engineering for sessions at Security Congress. As chair of the Board of Directors, Jennifer will be answering questions at the Town Hall panel session Monday afternoon. Join her Monday for a panel on diversity and inclusion.
Diversity, Equity and Inclusion: How to Create a Winning Security Company Culture
Monday, October 28
9:45 – 10:45 am
Tweet us at @cadinc with event tag #isc2congress.
About the Conference
(ISC)² Security Congress cybersecurity conference brings together over 1,900 industry colleagues, offers 100+ educational and thought-leadership sessions, and fosters collaboration with other forward-thinking companies. The goal of our conference is to advance security leaders by arming them with the knowledge, tools, and expertise to protect their organizations.
About (ISC)²
(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. (ISC)² is best known for the acclaimed CISSP®. Visit www.isc2.org.
See what the buzz is about! If you haven’t heard of Mist (now a Juniper company) you should join us Tuesday, May 19th for a free half-day bootcamp on the new Mist technology including topics on security, remote access, and more. I’ve highlighted a few of our team’s recommended don’t-miss sessions in bold for you.
Carolina Advanced Digital is a Mist Masters partner. Join us for this half-day bootcamp featuring everything you need to know to break free from the shackles of your legacy network architecture.
- 15 engaging and entertaining workshops
- Jam-packed with FREE GEAR! We’re giving away a free AP + other prizes at every “drill”
- Bonus: Send us your controller config and we’ll send you a Mist Cloud Org with YOUR config replicated, so you can see it in action by the end of the day. You’ll even get a free Mist AP with your newly created Org.* (restrictions apply)
Sessions include
• Transitioning Your Controller Network to cloud? (30min)
• Remote Worker 101 (30min)
• What is the Self-Driving Network? Let’s get real about it! (30min)
• API Automation Customer Examples – Day 0, Day 1, Day 2 (30min)
• Mist Architecture – A behind the scenes look at Mist cloud (30min)
• Marvis Deep Dive & Roadmap (30min)
• How to Measure Wireless Experience w/ Service Levels (30min)
• Wired Experience Service Levels & Roadmap (30min)
• EX ZTP & Configuration with Mist Dashboard (30min)
• Guest Access (15min)
• Policy Configurations and Interoperability with Aruba Clearpass and Cisco ISE (15min)
• Auto provisioning with Mist (15min)
• Bonjour Gateway & Other Exciting Roadmap Elements (15min)
• Wireless IDS / IPS Security (15min)
• AI-Powered Radio Resource Management (15min)
You’re invited to join Carolina Advanced Digital and Zscaler for our “It Starts with Zero” webinar on Thursday. May 19 at 10:00am ET
Zero trust is based on the principle that no entity—user, device, or application—should be inherently trusted. Instead, access is granted using identity and business policy, and it changes based on context. By removing access and security from the constructs of the network, zero trust reduces complexity and increases security.
Join us for a discussion on the topics below:
- Modernizing your network to reduce technical debt and cut networking costs for internet-bound traffic
- Strengthening security posture by implementing a zero trust approach
- Empowering work from anywhere with a better user experience and more visibility
- Securely providing corporate access to any user on any device from any location
- Promoting alignment between IT objectives and business initiatives
Thursday, May 19, 2022, 10:00am-11:00am ET
Register Today: https://bit.ly/3iUHY1d