When

Friday June 10, 2016 from 9:00 AM to 3:00 PM MDT
Add to Calendar 

Where

Silverstone Plaza - Training Room 2
3405 E. Overland Rd
Meridian, ID 83642


 
Driving Directions 

Contact

Heather Belliveau 
CompuNet, Inc. 
208-286-3050 
events@compunet.biz 
 

CompuNet's Information Security Workshop

Secure your data, your systems, and your reputation

Please join us for this very informative Security Workshop.  You will hear from our Senior Security (Cisco Certified) Architects on how we can help you understand your risks and develop an intelligent strategy to secure all aspects of your organization.  We will have 4 speaker tracks to choose from (see below).  You're welcome to attend them all or any many as you want.

Plus, we will be providing a continental breakfast and buffet lunch.  Attendees will also be able to participate in some fun raffle items & prizes!

In these sessions, we'll focus on the new threats that will impact all businesses, as well as the policies and technologies that can better prepare your organization from being a victim of these attacks.

Threats today require new methods of security protection, causing organizations to reorganize their security infrastructure to combat thesse new attacks.

Speaking Tracks and Overviews:

Track 1:  (9am - 10:30am) Enough With The Denial:  Attackers Do Want What You Have

 In today’s security landscape, hackers are using new methods to extract money from companies of all sizes, revenue amounts, and IT footprint.  This session will focus on the new threats that will impact all businesses at some point, as well as the policies and technologies that can better prepare an organization from being a victim of these attacks. 

Track 2:  (10:30am - 12noon) Security Strategy Darwinism:  If Your Network Strategy Doesn’t Evolve, Your Company May Not Survive

 Perimeter security, reliance on traditional anti-virus, local device logging, and inadequate mobility strategies are putting organizations at risk more than ever before.  The threats of today are requiring new methods of security protection, causing organizations to reorganize their security infrastructure to combat these new attacks.  This session will discuss technology, policy, and risk management changes that companies should look at adopting to meet today’s threats.

LUNCH served with Guest Speaker (12noon - 1pm)

Track 3:  (1:00 - 2:00pm) Winning The Identity Management Game: Do You Really Know Who Is On Your Network, What Device Is Being Used, and What That User Can Access?

In the network security days of old, active directory usernames and passwords were more than acceptable to allow a user access to data resources.  However, insufficient password-policies, combined with the attackers’ abilities to crack passwords and hashes faster than ever before, require administrators to implement extremely complex passwords or multi-factor authentication.  In addition, BYOD policies and IoT requirements, are putting more devices on the network that cannot support the rigid security tool requirements implemented on corporate devices.  This session will discuss policy creation and solution implementations that will allow organizations to control access to applications and information by who a user is, the device being utilized, and the type of traffic the user is generating.

Track 4:  (2:00pm - 3:00pm) Time To Stop Blaming “Stupid Users”: Expecting End Users To Do The Right Thing Without Training Will Only Encourage The Phishermen

End Users continue to be blamed for falling for scams, clicking malicious hyperlinks, bringing malware-infected devices into the network, and responding to fake email campaigns.  However, this session will show that end users are being targeted more than ever by very talented and convincing attackers.  Without proper security controls, policy changes, and thorough security training programs, organizations will continue to feel the pains of user-generated losses.