Blog iconCalendar

Carolina Advanced Digital, Inc. > Calendar
May
15
Mon
NCHICA Spring Forum on Cybersecurity @ Holiday Inn Resort
May 15 @ 12:30 pm – 7:00 pm
NCHICA Spring Forum on Cybersecurity @ Holiday Inn Resort | Wrightsville Beach | North Carolina | United States

NCHICA Spring Forum on Cybersecurity
with Workshop on Planning for Digital Transformations & IoT in Healthcare by HPE & Carolina Advanced Digital

  • Monday, May 15th Carolina Advanced Digital is a sponsor of the NCHICA Spring Forum on Cybersecurity.
  • Tuesday, May 16th, Carolina Advanced Digital is presenting a technical workshop with HPE and Aruba following the NCHICA event.

You can register for Monday and/or Tuesday at the link provided on NCHICA’s website.

Apr
24
Tue
Security Roadshow Series- Lexington, NC @ Childress Vineyards
Apr 24 @ 9:30 am – 4:00 pm

Automating Your Security Ecosystem with LogRhythm,
Fortinet, and Bradford Networks

 

This is a great opportunity to join your peers and industry leaders at events hosted by Carolina Advanced Digital covering Security Automation with Fortinet, LogRhythm, and Bradford Networks.

Trends and technologies covered:
• User and Entity Behavior Analytics (UEBA)
• Security Information Event Management (SIEM)
• Network Access Control (NAC)
• Next Generation Firewalls and integrated Security Fabric
• Security Automation roundtable discussion

Join us for the full day, or just a portion.

Dates and locations
• Tuesday, April 24th @ Childress Vineyards, Lexington, NC
• Wednesday, April 25th @ Chatham Hill Winery, Cary, NC

Agenda:
9:30-10:00 Registration and breakfast (breakfast provided)
10:00-10:20 Introduction by Carolina Advanced Digital
10:20-11:50 Fortinet Security
12:00-1:15 Lunch & Learn with LogRhythm (lunch provided)
1:25- 2:45 Bradford Networks
2:45- 3:15 Security Automation – Roundtable Discussion
3:25 Wine Tasting

Who should attend:
• Security analysts, internal testing, and incident response teams
• Firewall, network and wireless admins and managers
• Security professionals interested in the latest SIEM and UEBA technologies
• Professionals interested in the latest network access control (NAC) technologies
• Enterprise and mid-size organizations in all industries
• Technology Directors, CIOs, CTOs, CISOs
• Anyone with cyber security, networking, wireless, threat visibility, incident response, and security intelligence projects

Apr
25
Wed
Security Roadshow Series- Cary, NC @ Childress Vineyards
Apr 25 @ 9:30 am – 4:00 pm

Automating Your Security Ecosystem with LogRhythm,
Fortinet, and Bradford Networks

 

This is a great opportunity to join your peers and industry leaders at events hosted by Carolina Advanced Digital covering Security Automation with Fortinet, LogRhythm, and Bradford Networks.

Trends and technologies covered:
• User and Entity Behavior Analytics (UEBA)
• Security Information Event Management (SIEM)
• Network Access Control (NAC)
• Next Generation Firewalls and integrated Security Fabric
• Security Automation roundtable discussion

Join us for the full day, or just a portion.

Dates and locations
• Tuesday, April 24th @ Childress Vineyards, Lexington, NC
• Wednesday, April 25th @ Chatham Hill Winery, Cary, NC

Agenda:
9:30-10:00 Registration and breakfast (breakfast provided)
10:00-10:20 Introduction by Carolina Advanced Digital
10:20-11:50 Fortinet Security
12:00-1:15 Lunch & Learn with LogRhythm (lunch provided)
1:25- 2:45 Bradford Networks
2:45- 3:15 Security Automation – Roundtable Discussion
3:25 Wine Tasting

Who should attend:
• Security analysts, internal testing, and incident response teams
• Firewall, network and wireless admins and managers
• Security professionals interested in the latest SIEM and UEBA technologies
• Professionals interested in the latest network access control (NAC) technologies
• Enterprise and mid-size organizations in all industries
• Technology Directors, CIOs, CTOs, CISOs
• Anyone with cyber security, networking, wireless, threat visibility, incident response, and security intelligence projects

Jun
12
Tue
What’s Needed to Secure the IoT & IIoT [Keynote Panel] @ BrightTalk
Jun 12 @ 1:30 pm – 2:30 pm

What’s Needed to Secure the IoT & IIoT

Mark Weatherford (vArmour) | Robert M. Lee (Dragos) | Jennifer Minella (Carolina Advanced Digital)

Watch the recording at http://bit.ly/2rKZjiW

Internet of Things devices are built with cost & convenience in mind, not security. This makes them easy targets for cybercriminals looking to exploit their vulnerabilities and infiltrate your systems. With IoT adoption on the rise, organizations are looking for ways to improve security at all levels and limit the damage IoT-powered cyber attacks can cause. The stakes are even higher for the Industrial Internet of Things (IIoT).

Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:
– IoT as a gateway to your systems
– Key factors for building a successful security strategy encompassing the IoT & IIoT
– Threats targeting the IoT / IIoT
– Industrial threat detection and response
– Recommendations for improving security

Speakers:
– Mark Weatherford, Chief Cybersecurity Strategist, vArmour
– Robert M. Lee, CEO, Dragos
– Jennifer Minella, VP of Engineering and Security, Carolina Advanced Digital

 

 

 

May
10
Fri
NC TECH State of Technology @ Raleigh Convention Center
May 10 @ 8:00 am – 2:30 pm
NC TECH State of Technology @ Raleigh Convention Center

Carolina Advanced Digital is involved with the SoT planning committee and will be attending the event.

In today’s technology-dependent world, the importance of Cyber Security continues to come to the forefront. Cyber attacks are a threat at all levels, from individuals, to government agencies, to businesses of all sizes and industries. At NC TECH’s 2019 State of Technology Conference, we will explore Cyber Security and how it impacts all facets of our lives, and look to future trends and how we can prepare ourselves.

More than 600 security, IT and business leaders from across sectors and functional roles will gather May 10 at our flagship tech conference for a day of engaging keynotes, interactive panel discussions, a fast paced pitch competition from tech startups and an exhibit showcase. A pre-conference reception will be held the evening prior, on May 9.

BREAKOUT SESSIONS

  • Artificial Intelligence + Cyber Security – How to use AI to Prevent, Detect & Contain Threats?
  • Cyber Security Readiness – Is Your Business Cyber Resilient?
  • Data Breaches Are a Matter of When, Not If – Lessons Learned from Real Cyber Attacks
  • From the C-Suite to the Front Lines – Is Cyber Security a Priority for Your Organization?
  • Human Risk + Vulnerability – Can You Close the Human Gaps in Your Security Plan?
  • The Cyber Security Talent Gap – Can You Find the Right Security Team?

STARTUP SHOWCASE

NC TECH will incorporate a STARTUP SHOWCASE by selecting 6 tech startup companies with innovative security technologies to present on stage. Selected companies will be given a 5 minute timeslot to present to general attendance, 2 complimentary registrations, exhibit space and lots of visibility leading up to the event. Event attendees will vote to select one startup to win a prize package consisting of cash and in-kind services.

Date and Time

Thursday, May 9
Pre-Conference Cocktail Reception
5:30 pm – 7:00 pm

Friday, May 10
Conference
8:00 am
 – 2:30 pm

Jan
23
Thu
Cybersecurity Dinner – Zero Trust Networking @ The Capital City Chop House
Jan 23 @ 4:30 pm – 8:30 pm
Cybersecurity Dinner - Zero Trust Networking @ The Capital City Chop House

Contact sales at cadinc com or your account manager for an invitation or to RSVP

Join us with Fortinet for dinner at The Capital City Chop House on January 23rd as we cover a broad range of vital cybersecurity topics such as:

  • Why protecting the perimeter is not sufficient
  • Micro–segmenting your network to block malicious or unauthorized lateral movement
  • Protecting your data from identity thieves and compromised devices
  • Avoiding complex deployment and inherent security gaps caused by adding point solutions
  • Empowering Zero Trust implementation with threat prevention and centralized security management
  • How to determine if zero day threat enabled intruder onto network?
getcomixxx.com