Automating Your Security Ecosystem with LogRhythm,
Fortinet, and Bradford Networks
This is a great opportunity to join your peers and industry leaders at events hosted by Carolina Advanced Digital covering Security Automation with Fortinet, LogRhythm, and Bradford Networks.
Trends and technologies covered:
• User and Entity Behavior Analytics (UEBA)
• Security Information Event Management (SIEM)
• Network Access Control (NAC)
• Next Generation Firewalls and integrated Security Fabric
• Security Automation roundtable discussion
Join us for the full day, or just a portion.
Dates and locations
• Tuesday, April 24th @ Childress Vineyards, Lexington, NC
• Wednesday, April 25th @ Chatham Hill Winery, Cary, NC
Agenda:
9:30-10:00 Registration and breakfast (breakfast provided)
10:00-10:20 Introduction by Carolina Advanced Digital
10:20-11:50 Fortinet Security
12:00-1:15 Lunch & Learn with LogRhythm (lunch provided)
1:25- 2:45 Bradford Networks
2:45- 3:15 Security Automation – Roundtable Discussion
3:25 Wine Tasting
Who should attend:
• Security analysts, internal testing, and incident response teams
• Firewall, network and wireless admins and managers
• Security professionals interested in the latest SIEM and UEBA technologies
• Professionals interested in the latest network access control (NAC) technologies
• Enterprise and mid-size organizations in all industries
• Technology Directors, CIOs, CTOs, CISOs
• Anyone with cyber security, networking, wireless, threat visibility, incident response, and security intelligence projects
Automating Your Security Ecosystem with LogRhythm,
Fortinet, and Bradford Networks
This is a great opportunity to join your peers and industry leaders at events hosted by Carolina Advanced Digital covering Security Automation with Fortinet, LogRhythm, and Bradford Networks.
Trends and technologies covered:
• User and Entity Behavior Analytics (UEBA)
• Security Information Event Management (SIEM)
• Network Access Control (NAC)
• Next Generation Firewalls and integrated Security Fabric
• Security Automation roundtable discussion
Join us for the full day, or just a portion.
Dates and locations
• Tuesday, April 24th @ Childress Vineyards, Lexington, NC
• Wednesday, April 25th @ Chatham Hill Winery, Cary, NC
Agenda:
9:30-10:00 Registration and breakfast (breakfast provided)
10:00-10:20 Introduction by Carolina Advanced Digital
10:20-11:50 Fortinet Security
12:00-1:15 Lunch & Learn with LogRhythm (lunch provided)
1:25- 2:45 Bradford Networks
2:45- 3:15 Security Automation – Roundtable Discussion
3:25 Wine Tasting
Who should attend:
• Security analysts, internal testing, and incident response teams
• Firewall, network and wireless admins and managers
• Security professionals interested in the latest SIEM and UEBA technologies
• Professionals interested in the latest network access control (NAC) technologies
• Enterprise and mid-size organizations in all industries
• Technology Directors, CIOs, CTOs, CISOs
• Anyone with cyber security, networking, wireless, threat visibility, incident response, and security intelligence projects
What’s Needed to Secure the IoT & IIoT
Mark Weatherford (vArmour) | Robert M. Lee (Dragos) | Jennifer Minella (Carolina Advanced Digital)
Watch the recording at http://bit.ly/2rKZjiW
Internet of Things devices are built with cost & convenience in mind, not security. This makes them easy targets for cybercriminals looking to exploit their vulnerabilities and infiltrate your systems. With IoT adoption on the rise, organizations are looking for ways to improve security at all levels and limit the damage IoT-powered cyber attacks can cause. The stakes are even higher for the Industrial Internet of Things (IIoT).
Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:
– IoT as a gateway to your systems
– Key factors for building a successful security strategy encompassing the IoT & IIoT
– Threats targeting the IoT / IIoT
– Industrial threat detection and response
– Recommendations for improving security
Speakers:
– Mark Weatherford, Chief Cybersecurity Strategist, vArmour
– Robert M. Lee, CEO, Dragos
– Jennifer Minella, VP of Engineering and Security, Carolina Advanced Digital
Security Innovation- It’s in the DNA
A special event for federal agency attendees.
When
Wednesday, July 18
10:00am-1:00pm
(lunch provided)
Where
The International Spy Museum
800 F Street, NW
Washington, DC 20004
About
Join Carolina Advanced Digital and HPI at the International Spy Museum for the
HP System and Printing Security Event.
You’re invited to a special event hosted by Carolina Advanced Digital and partner
HP Inc. featuring the HPI “SURE” family of system security solutions and the most
secure laptops and printing available today.
::: REGISTER OR GET MORE INFO :::
Federal attendees Register at https://conta.cc/2lfaMU0
Get more information https://conta.cc/2K2CEZu
::: ABOUT YOUR HOST :::
Carolina Advanced Digital, Inc. is a security-focused HP partner, with HP solutions
on both GSA and SEWP V GSS contracts.
Join our team at UNC Cause and see a special presentation. Carolina Advanced Digital will be sponsoring, exhibiting, and speaking at the UNC Cause 2018 conference.
Tuesday, October 2, 3:15pm – 3:45pm don’t miss our vendor-neutral wireless session:
“Is your campus WiFi ready for GenZ?”
How will networks evolve to support 802.11AX and IoT by 2020 and beyond? We will explore the benefits of 802.11AX and how to ensure your institution can recruit the Generation Z population who are fixated on WiFi performance.
With: Sr. Wireless Engineer, Paul Coulter
VP of Engineering, Jennifer Minella is a member of the RSAC Program Committee, and will be speaking at the RSA Conference.
https://www.rsaconference.com/speakers/jennifer-minella
2028 Future State: Long Live the Firewall?”
Tuesday, Mar 05 | 01:00 p.m. – 01:50 p.m. | Moscone West 3001
The threat landscape has changed since the invention of the firewall 30 years ago, but not because threat actors or their motivations have changed; our networks and how we need to protect them have changed. Not only do we need to start developing tools that adapt to the threats of today, but we need to threat model in a more sophisticated way and ask more questions about what can go wrong.
Learning Objectives:
1: Understand what the firewall of 2028 will look like, and if it will even exist as we know it today.
2: Examine the commercial tools market to see what best adapts to shifts in attack tactics and surface.
3: Learn how to adapt threat modeling to accommodate the actual threat landscape.
Join our VP of Engineering for sessions at Security Congress. As chair of the Board of Directors, Jennifer will be answering questions at the Town Hall panel session Monday afternoon. Join her Monday for a panel on diversity and inclusion.
Diversity, Equity and Inclusion: How to Create a Winning Security Company Culture
Monday, October 28
9:45 – 10:45 am
Tweet us at @cadinc with event tag #isc2congress.
About the Conference
(ISC)² Security Congress cybersecurity conference brings together over 1,900 industry colleagues, offers 100+ educational and thought-leadership sessions, and fosters collaboration with other forward-thinking companies. The goal of our conference is to advance security leaders by arming them with the knowledge, tools, and expertise to protect their organizations.
About (ISC)²
(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. (ISC)² is best known for the acclaimed CISSP®. Visit www.isc2.org.