About
A 1.5 day, on-site event comprised of security, cloud, and infrastructure discussions from Industry Leading solutions experts, including SynerComm’s consultants. With dozens of the industry’s top solutions represented we can help alleviate the challenges you and your organization face on a daily basis.
Session attendance qualifies for Continuing Professional Education (CPE) credit.
Who should attend?
Attendance is free of charge and limited to qualified attendees only.
When
7:30am-4:30pm
When
1721 W Canal St, 3rd Floor, Milwaukee, WI 53233
Highlights
Learn. Discuss. Network. Earn CPE Credits.
Mentalism & Magic
Luka
Deception Artist
A Deception Artist uses the same techniques as magicians, pickpockets, card cheats, mind readers and psychics. However, rather than exploiting people for personal gain, a deception artist presents these skills as a form of entertainment. In other words a deception artist is an honest con artist.
Schedule
Sept 13th, 12:15pm-7:30pm
12:15pm
Doors Open
Solution Fair
12:15pm-7:30pm
Visit SELECT and GOLD business partners who are on-site and available to share the latest in IT solutions..
1:00pm
⭐ Keynote Thought Leadership Panel (Industry Leaders)
1:00pm-2:20pm in Serenity Room
A panel-driven discussion
2:20pm
2:30pm
MDR, MSSP, XDR: SecOps Alphabet Soup
2:30pm-3:10pm in Serenity Room
by Expel
Who has time for Threat Hunting, anyway?
2:30pm-3:10pm in Clarity Room
by Arista
Out of Sight, Out of Control: Asset Intelligence
2:30pm-3:10pm in Prosperity Room
by Armis
3:15pm
Thought Leadership Roundtable
3:15pm-5:30pm in Harmony Room
Multi-Cloud Security (Part-1): Pitfalls
3:15pm-3:55pm in Serenity Room
by SynerComm
Attacks on AD CS Explained
3:15pm-3:55pm in Clarity Room
by SynerComm
4:00pm
🏴☠️ 2nd Annual Capture the Flag Competition
4:00pm-5:30pm in Inspire Room
Sponsor: Palo Alto Networks
Continuous Attack Surface Management and Continuous Pentesting
4:00pm-4:40pm in Clarity Room
by SynerComm
Multi-Cloud Security (Part-2): Best Practices
4:00pm-4:40pm in Serenity Room
by SynerComm
4:45pm
What State are you in? Don’t be so immature!
4:45pm-5:25pm in Prosperity Room
by SynerComm
Attack Surface Management – An Evaluators Guide Tour
4:45pm-5:25pm in Clarity Room
by SynerComm
5:30pm
Food & Refreshments
5:30pm-7:30pm
Sponsor: Check Point
Sept 14th, 7:30am-4:30pm
7:30am
Doors Open
Solution Fair
8:15am
Opening Remarks
8:15am-8:35am in Serenity Room
8:35am
⭐ Thought Leadership Panel (SynerComm Practice Leaders)
8:35am-9:20am in Serenity Room
9:25am
QR Codes in a Post Pandemic World
9:25am-10:05am in Serenity Room
by CyberArk
Threat Hunting In Practice: How to Protect Critical Assets Through Systematic, Proactive Threat Intelligence
9:25am-10:05am in Prosperity Room
by Cybersixgill
Session
9:25am-10:05am in Harmony Room
by CrowdStrike
10:05am
Break
10:05am-10:15am
10:15am
Bringing Artificial Intelligence to Access and Wireless Networking
10:15am-10:55am in Clarity Room
by Juniper Networks
Transforming customers from manual to automated network management
10:15am-10:55am in Prosperity Room
by NetBrain
Connection vs Control: How Partnerships can help overcome obstacles and accelerate the pace of digital transformation
10:15am-10:55am in Harmony Room
by Rapid7
⭐ Keynote: Emerging Technologies Panel
11:00am-12:00pm in Serenity Room
A panel-driven discussion featuring Roger Grimes, Karl Gouverneur & more guests
12:00pm
Lunch
12:00pm-1:30pm in Legacy Room
1:30pm
Preventing DNS-based Data Exfiltration
1:30pm-2:10pm in Clarity Room
by Infoblox
Empowering Digital Transformation For The Infinite Enterprise
1:30pm-2:10pm in Serenity Room
by Extreme Networks
Armchair Cyberwarriors: The First 100 Days of Cybercriminal and Hacktivist Activities Related to the Russian War in Ukraine
1:30pm-2:10pm in Prosperity Room
by Recorded Future
2:15pm
🛠️ 2nd Annual DNS Pi-Hole Workshop
2:15pm-3:40pm in Inspire Room
Sponsor: SynerComm
Multi-Cloud Security (Part-1): Pitfalls
2:15pm-2:55pm in Clarity Room
by SynerComm
Global Procurement and Logistics – What you need to know
2:15pm-2:55pm in Serenity Room
by SynerComm
Attacks on AD CS Explained
2:15pm-2:55pm in Prosperity Room
by SynerComm
3:00pm
Multi-Cloud Security (Part-2): Best Practices
3:00pm-3:40pm in Clarity Room
by SynerComm
Attack Surface Management – An Evaluators Guide Tour
3:00pm-3:40pm in Prosperity Room
by SynerComm
Identity & Authentication Strategies Update – What you need to know
3:00pm-3:40pm in Harmony Room
by Roger Grimes
3:45pm
🎟️ Business Partner Raffle
3:45pm-4:30pm in Serenity Room
Must be present to win!
Select Partners
Select partners are top-tier sponsors of it summit who present sessions and are on-site and available for more information in the solution fair.
Gold partners
Gold partners are sponsors of it summit who are on-site and available for more information in the solution fair.
Sessions
Keynote: Thought Leadership Panel (Industry Leaders)
Time
Tuesday, September 13, 2022
1:00pm-2:20pm in Serenity Room
Theme
Digital Transformation initiatives driven by the Pandemic
Abstract
In this moderated session the panel will discuss the following:
Enabling New Business Models
- Getting closer to customers and enabling your team
Enabling Technology Paradigm Shifts
- Transforming your organization’s infrastructure capabilities from delivering traffic to a location to delivering applications to a user.
- Transforming your organization’s access-control infrastructure to a Zero Trust security model.
Building & Maintaining Company Culture in the New Normal Workforce/Workplace
- Workforce: skill sets, recruiting, retaining, and career growth.
- Workplace: work from anywhere, hybrid, and work from home (WFH).
Panelists:
Adam Furger – Sr. Directory Information Security @ Foot Locker
Adnan Ramji – VP – Network Service, Infrastructure & Cloud Services @ Northwestern Mutual
Chris Fadrowski – Director of IT Infrastructure/Technology @ ProHealth Care
CSO – Regional Financial Institution
Thought Leadership Roundtable
Tuesday, September 13, 2022
3:15pm-5:30pm in Harmony Room
Theme
Digital Transformation initiatives driven by the Pandemic
Abstract
In this follow-up session, building on the Thought Leadership Customer Panel, we will discuss the following:
Enabling New Business Models
- Getting closer to customers and enabling your team
Enabling Technology Paradigm Shifts
- Transforming your organization’s infrastructure capabilities from delivering traffic to a location to delivering applications to a user.
- Transforming your organization’s access-control infrastructure to a Zero Trust security model.
Building & Maintaining Company Culture in the New Normal Workforce/Workplace
- Workforce: skill sets, recruiting, retaining, and career growth.
- Workplace: work from anywhere, hybrid, and work from home (WFH).
* This session is reserved for qualified attendees only.
Join our Panelists
- Adam Furger – Sr. Directory Information Security @ Foot Locker
- Adnan Ramji – VP – Network Service, Infrastructure & Cloud Services @ Northwestern Mutual
- Chris Fadrowski – Director of IT Infrastructure/Technology @ ProHealth Care
- CSO – Regional Financial Institution
Keynote: Emerging Technologies Panel
Time
Wednesday, September 14, 2022
11:00am-12:00pm in Serenity Room
Theme
Preparing for Emerging Technologies & Regulations – Business Impact and Security Risks
Abstract
In this moderated session the panel will discuss the impact of emerging technologies and risks:
- Web 3.0
- Blockchain
- Cryptocurrency & Alt Coins
- Quantum Computing – An Emerging Threat To Data Encryption And Cybersecurity
- Public and Hybrid Cloud
- ML/AI
- Privacy while enabling your business – Legal and Security Teams Working Together
Panelists
Roger Grimes – Cybersecurity Author & Data-Driven Defense Evangelist @ KnowBe4
Karl Gouverneur – CTO @ Struxtion
2nd Annual DNS Pi-Hole Workshop
by
Time
Wednesday, September 14, 2022
2:15pm-3:40pm in Inspire Room
Abstract
Our AssureIT pentesters would be happy to help you build and test drive your new pi-hole. Join our AssureIT pentesters in this fun and informative hands-on DNS sinkhole workshop. We’ll configure Raspberry Pi minicomputers to block internet ads and telemetry data leakage using basic DNS services. The first 20 registrants (max 2 per company) will receive a complimentary Raspberry Pi to keep.
Speakers
Ryan Zagrodnik – Information Assurance Consultant @ SynerComm
2nd Annual Cloud Capture the Flag Competition
Sponsored by
Tuesday, September 13, 2022
4:00pm-5:30pm in Inspire Room
Abstract
Mission:
Identify security issues and misconfigurations in a public cloud environment using Palo Alto Networks Prisma Cloud to identify as many of these issues as possible in the time limit.
Objectives:
Travel around the world in this 90-minute interactive virtual Capture The Flag session using Palo Alto Networks Prisma Cloud as your weapon to solve the most challenges and achieve the highest score.
Win:
Score the most points and claim the prize!
Cloud security is changing quickly, and organizations around the world struggle to implement and integrate the shifting pieces of the puzzle – threat detection, visibility, misconfiguration management and risk remediation – all while complying with industry standards.
With all these things to consider, how can you be sure you have what you need to keep your organization secure in the public cloud? Join cloud cybersecurity peers and experts for our Capture The Flag event to hone your skills and knowledge to help you combat future cloud threats.
We are looking for partner engineers of all experience levels to accept the mission and solve the most challenges.
The winning team/player is the one that solved the most challenges thus having scored highest!
Limited seats available. Claim your spot when registering for IT Summit before they’re gone!
Speakers
Lisa Niles – Director of Solutions Integration @ SynerComm
Who has time for Threat Hunting, anyway?
by
Tuesday, September 13, 2022
2:30pm-3:10pm in Clarity Room
Abstract
Given the increasing sophistication of today’s cyber attacks, Threat Hunting is an absolute necessity, yet few organizations are able to make time for it. In this presentation, Joe will start with some exciting stories from threat hunting over the past few years to illustrate why so many tools fail to detect advanced threats, and then elaborate on how to make time each week for Threat Hunting. A preliminary step is to analyze the Signal-to-Noise Ratio (SNR) of your current tools to tune or replace those that cause you to 1) waste time on high-rates of false positives, 2) suffer the devastating effects of false negatives, and 3) erode at the morale of your security team due to alert fatigue. The next step is to identify methods to facilitate faster, more effective hunts, including how to automate everything from enhanced device identification to more advanced threat detections. The final step is to leverage integrations across your toolset for remediation and response.
Speakers
Joe Malinka – Arista Awake Specialist @ Arista
Joe Malinka manages the pre-sales engineering team for Arista’s security division. He’s a veteran infosec engineer with a penchant for cybersecurity startups, innovation, and rapid adoption of new technologies. He has provided engineering, consultative, and architectural expertise in many different security domains, working extensively with organizations of all sizes and verticals. He has received numerous industry and security certifications, and has a degree in Applied Physics.
Out of Sight, Out of Control: Asset Intelligence
by
Tuesday, September 13, 2022
2:30pm-3:10pm in Prosperity Room
Abstract
If you cannot see it, you cannot secure it. We will review the purpose and history of asset management, how it impacts cybesecurity, what works, what does not work and discuss how to gain control of your assets through visibility and intelligence.
Speakers
Michael A. Atkinson – Principal Sales Engineer, Public Sector @ Armis
Mike started his career in IT in his teens, dressing up in a suit and tie to go downtown and fix Macs for graphic design firms. After graduating from Northwestern University, Mike realized that his degree in Psychological Services was only useful for more school or welfare, and so found a job at the same school as a network administrator. Mike grew the College of Arts and Sciences IT team from two to seven full-time employees and about twenty part-time student employees before leaving for consulting. He spent fourteen years in consulting before moving over to the sales side as a manufacturer’s SE. His current role is as the lead SE for the US and Canadian Public Sector team, training and mentoring the team while also supporting the account managers directly. The best part of the role is that nobody reports to him, but everybody does what he says. While at FireEye, Mike helped to lead the Election Security initiative that provided consulting, managed detection and response, incident response, and technology to approximately thirty US jurisdictions. Moving over to Mandiant, he then led Election Security delivery efforts for both of the major US political conventions and the general election in 2020. Mike has been married to Rebecca for twenty-six years. They have four children, two dogs, and five hermit crabs.
Threat Hunting In Practice: How to Protect Critical Assets Through Systematic, Proactive Threat Intelligence
by
Time
Wednesday, September 14, 2022
9:25am-10:05am in Prosperity Room
Abstract
Today’s organizations face unprecedented challenges in battling cyber threats. Between increasingly sophisticated cybercriminals, rapidly expanding digital assets and attack surfaces, and a legal landscape that threatens to punish those companies that fail to adequately protect their customers’ privacy rights, it’s not hard to see why cybersecurity professionals are buckling under the mounting pressure. Within this complex new cyber threat battleground, organizations cannot afford to continue relying on passive, reactive defense, and instead, must leverage the tools and methodologies to facilitate a truly proactive and preemptive cyber defensive program.
Threat hunting is a powerful tool enabling companies to take a proactive approach to build organizational cyber resilience. By seeking out the highest-priority potential cyber threats rather than waiting for evidence of them to appear, threat hunting provides a proven, systematic way for an organization to defend itself from the most concerning risks, reducing dwell times and accelerating remediation and response.
In this session, Michael-Angelo Zummo, Senior Threat Intel Specialist at Cybersixgill, will discuss the best practices for performing an effective threat hunt.
Attendees will learn and understand:
- How to effectively prepare for and plan the threat hunt, with detailed explanations of the tools and information needed.
- How to set priorities and build a threat hunting road map.
- The five steps involved in a threat hunt and how to perform them effectively.
- Insights necessary to make the most of the information gathered through threat hunting.
Speakers
Michael-Angelo Zummo – Cyber Threat Intelligence Specialist @ Cybersixgill
Michael-Angelo Zummo is a Cyber Threat Intelligence Specialist at Cybersixgill. He is a US Marine Corps veteran that started his career as a cryptologic linguist and intelligence analyst. He served at the NSA (National Security Agency) where he supported national security efforts against foreign threats. Zummo earned his Masters in Cybercrime Investigations and Cybersecurity from Boston University, where he transitioned from national security to digital forensics, dark web intelligence, and law enforcement.
QR Codes in a Post Pandemic World
by
Time
Wednesday, September 14, 2022
9:25am-10:05am in Serenity Room
Abstract
QR codes were all but dead until smartphone companies started incorporating QR code scanners into their mobile phones back in 2017. Enter the COVID19 pandemic and the rise of the contactless economy, and the QR code is making a massive comeback. From advertising and restaurant menus to healthcare and agriculture – the use cases for QR codes are infinite.
QR Code Scanners: Beware
QR codes are accessible, easy to produce and seemingly, here to stay. They’re also a perfect way for cyber criminals to snag your employee’s personal information.
Join Len Noe, CyberArk White Hat/BioHacker in this live webinar as he shares his latest research on QR code attacks and the risks facing enterprises. Attendees of this session will walk away with
- Examples of 3 simulated QR code attacks
- Tactics, Techniques, and Procedures (TTPs) used by QR code attackers
- Ways to protect yourself and your employees
- Implications for enterprise security teams and controls to have in place to prevent privilege escalation and lateral movement within the IT estate
Speakers
Len Noe – SE-Technical Enablement, Infrastructure & Operations @ CyberArk
MDR, MSSP, XDR: SecOps Alphabet Soup
by
Tuesday, September 13, 2022
2:30pm-3:10pm in Serenity Room
Abstract
Is EDR enough today, or do you need XDR? Can you manage your own security solutions, or do you need MDR—or MXDR? When is MDR technically XDR, and does it need to incorporate ITDR? When is a SIEM a SOAR—and vice versa? Do you have the SaaS you need to protect AD, or are you SOL? The cybersecurity landscape is growing increasingly complex, and the never-ending sea of solutions, categories, and corresponding acronyms isn’t helping. Let’s break down a few of the most confusing terms that pervade today’s cybersecurity landscape and try to make sense of what organizations actually need to combat today’s threats.
Speakers
Matt Peters – Chief Product Office @ Expel
Matt Peters is the chief product officer (CPO) at Expel, a cybersecurity firm located in the Washington, DC area. As CPO, Matt focuses on robust dialogue, encouragement of his team as they grow their own careers, and the relationships between all aspects of the business.
He comes to the company with 20 years of experience in the tech world. Before joining Expel, Matt was vice president of worldwide operations at FireEye for the managed services offering, FireEye as a Service.
Before FireEye, Matt was the director of technical operations at Mandiant for Mandiant Managed Defense, one of the first managed detection and response (MDR) services. He was responsible for the design and delivery of the application platform that powered analyst detection and investigation.
Before getting into the managed services space, Matt worked at a number of Silicon Valley computer networking technology startups before joining Check Point Software where he led the security analytics group, which applied machine learning and data science to network and firewall data.
Matt has a B.S. in computer engineering from the University of Kansas.
Bringing Artificial Intelligence to Access and Wireless Networking
by
Time
Wednesday, September 14, 2022
10:15am-10:55am in Clarity Room
Abstract
Mist Systems has brought AI to wireless networking. We have combined data scientists and cloud architects with decades of wireless domain expertise to build the first truly innovative WLAN platform in over a decade. At the core of our solution is the Mist cloud, purpose-built on a microservices architecture for rapid deployment of new services without impacting existing services. Mist is now part of Juniper and is extending its AI platform to the network at large.
Companies of all sizes can take advantage of Mist’s AI-driven solution that delivers the following:
– Wi-Fi and access networking that is predictable, reliable and measurable
– Wired and Wireless operations that are simple and cost effective
– Location services that deliver amazing new wireless experiences
Speakers
Tom Wilburn – VP Worldwide Sales @ Juniper Networks
Tom Wilburn is responsible for Mist’s global field operations. He has extensive experience in the wireless and networking industry.
Tom had earlier served as Vice President of Cisco’s global enterprise networking sales organization, responsible for routing, switching and wireless products. Tom was part of the leadership team for Airespace, a wireless company acquired by Cisco in 2005. Tom led sales for Cisco’s wireless business which at its peak achieved global share of 65% of the enterprise wireless market. In 2012, Tom was part of the team that acquired Meraki and was responsible for go-to-market of the combined Cisco-Meraki portfolio.
Tom previously held sales leadership roles at startups Xylan and CrossComm and served as Senior Vice President of Alcatel’s North American Enterprise Business.
Connection vs Control: How Partnerships can help overcome obstacles and accelerate the pace of digital transformation
by
Wednesday, September 14, 2022
10:15am-10:55am in Harmony Room
Abstract
Digital Transformation was a challenging undertaking prior to the pandemic accelerating the need and simultaneously exacerbating the obstacles associated with this move. The interdependent nature of society and markets create dependencies for businesses that exist outside of their sphere of control. Moving past these obstacles and accomplishing these goals will require two things of leaders: a willingness to “drop their tools” and a new perspective on the role partnership plays in decision making
Speakers
Michael Mckinley – Channel Solutions Engineer @ Rapid7
Michael Mckinley is Channel Solutions Engineer at Rapid7. Michael provides a unique perspective on digital transformation based on a background that includes physical security while serving in the Marine Corps, technology and analyst research, even touring as a professional musician as well as various roles in cyber security. What motivates Michael in the work he does is seeing the way better experiences with technology can provide material improvement to peoples’ lives and happiness. When not working, you can usually find Michael blasting down the side of a mountain on his bicycle, enjoying a local IPA, or out camping enjoying the outdoors.
Armchair Cyberwarriors: The First 100 Days of Cybercriminal and Hacktivist Activities Related to the Russian War in Ukraine
by
Wednesday, September 14, 2022
1:30pm-2:10pm in Prosperity Room
Abstract
Beginning on February 24, 2022, Recorded Future observed the rise—and, in some cases, downfall—of over 250 cybercriminal and hacktivist groups that became indirectly involved in the Russian war in Ukraine. This talk will cover the Conti and Trickbot leaks, the formation of the IT Army of Ukraine and Killnet, the operations of Anonymous and its allies, such as Distributed Denial of Secrets, AgainstTheWest, Network Battalion 65, GhostSec, and much more. Following the daily monitoring of approximately 100 active cybercriminal groups—with varying ideologies, motivations, nation-state allegiances, and hacktivist alliances—700,000 references in the Recorded Future Platform®, and regular threat actor engagements on dark web and special-access sources, this talk will document, summarize, and analyze the “armchair cyberwar” that took place over the first 100 days of the Russian war in Ukraine.
Speakers
Alexander Leslie – Associate Threat Intelligence Analyst @ Recorded Future
Alexander Leslie is an Associate Threat Intelligence Analyst with the Advanced Cybercrime & Engagements Team (ACE) at Recorded Future.
Preventing DNS-based Data Exfiltration
by
Wednesday, September 14, 2022
1:30pm-2:10pm in Clarity Room
Abstract
Theft of sensitive or regulated data and intellectual property is one of the most serious risks to an enterprise. According to a recent DNS security survey of businesses based in North America and Europe, 46% of respondents experienced DNS exfiltration and 45% experienced DNS tunneling. DNS port 53 is frequently used as a pathway for data exfiltration because it’s not inspected by common security products such as firewalls, intrusion-detection systems (IDSs), and proxies.
Speakers
Tony Velada – Sr. Solutions Architect @ Infoblox
Transforming customers from manual to automated network management
by
Wednesday, September 14, 2022
10:15am-10:55am in Prosperity Room
Abstract
Organizations of all kinds are experiencing problems with manual network management. On the one hand, they lack enough network experts on their teams and on the other hand, they are seeing an increase in infrastructure complexity due to adoption of SD-WAN, SD-Networks(like Cisco ACI and VMware), and adoption of the public cloud. They are battling more complex problems- with less people, which is a “perfect storm”. SynerComm leverages NetBrain to transform customers burdened with manual network management into customers benefiting from network automation. This not only saves time and money- it opens up possibilities only limited by… imagination.
Speakers
Brian Howard – Channel Account Manager @ NetBrain
Identity & Authentication Strategies Update – What you need to know
by
Time
Wednesday, September 14, 2022
3:00pm-3:40pm in Harmony Room
Abstract
In this session we will discuss the most common authentication types, their common use cases and potential pitfalls:
- Authentication Types
- Password-based, MFA, Biometric, Token-based, Passwordless
- Common misconceptions:
- MFA by default solves 95% of your authentication issues
- Key Use Cases:
- Privileged Account Management
- 3rd Party & Supply Chain API(s) and Users
Speakers
Roger Grimes – Cybersecurity Author & Data Driven Defense Evangelist @ KnowBe4
Empowering Digital Transformation For The Infinite Enterprise
by
Wednesday, September 14, 2022
1:30pm-2:10pm in Serenity Room
Abstract
Daily life has recently changed for millions across the globe and entire industries have been upended. To meet today’s business needs, networking infrastructure must deliver effortless, flexible, always-on, and secure network connectivity, coupled with a robust, automated centralized management solution. Join us for a live presentation to learn about the benefits of Extreme’s secure, end-to-end, cloud-driven Wired/Wireless portfolio, and understand how businesses can take the lead in the new world of the Infinite Enterprise in order to gain a competitive advantage.
- Learn about the benefits of cloud-driven network management, from Cloud to Air-Gapped On-Premises
- Understand the business benefits of detailed network data analytics powered by AI/ML
- Reduce the cost and complexity of your enterprise edge to data center infrastructure
- Explore how Extreme’s XIQ Solution Suite, Universal Licensing & Universal Hardware are powering the Infinite Enterprise.
Speakers
Jarrod Washington – Cloud Sales Leader @ Extreme Networks
Jarrod Washington is a passionate, technical, & experienced Cloud Executive who leverages distributed Wired & Wireless Networking in tandem with 4th Gen Cloud Management, ML, and AI to radically simplify and secure the Access Network for Customers and Prospects across the nation. A recent President’s Club Winner, Jarrod came to Extreme via the Aerohive Acquisition, and is going on his 5th Year here between two companies. He has also recently been certified as an AWS Cloud Practitioner. Jarrod loves spending all the time he can with his 2 Boys – Elliott (1YR) and Bryson (5YR) as well as his amazing Wife Robin. Hobbies include Biking, Musical Theatre, playing the saxophone, and Watersports.
Global Procurement and Logistics – What you need to know
by
Wednesday, September 14, 2022
2:15pm-2:55pm in Serenity Room
Abstract
In this session we will discuss the common global procurement and logistics strategies and potential pitfalls:
- Global Technology Procurement, Deployment and Maintenance/Support Contract Lifecycle
- Shipping
- International
- National
- Strategies
- Common misconceptions
- Potential Pitfalls
Speakers
Gary Mirkin – VP – Importer of Record (IOR) and Customs Compliance @ TecEx
Marc Spindt – VP – ImplementIT @ SynerComm
Multi-Cloud Security (Part-1): Pitfalls
by
Tuesday, September 13, 2022
3:15pm-3:55pm in Serenity Room
Wednesday, September 14, 2022
2:15pm-2:55pm in Clarity Room
Abstract
The 1st part of our Multi-Cloud Security series: Join our Cloud experts in a discussion and demonstration of potential security pitfalls in Multi-Cloud Architectures (Microsoft 365, Azure, and AWS). See real-time simulated attacks, including SSFR, metadata enumeration, and potential access methods. Gain a deeper understanding of what it takes to execute these attacks and what it means for a company that may be susceptible. Join us in the 2nd part, where we discuss remediation configuration to prevent these certain attacks.
Speakers
Aaron Howell – Managing Consultant – Multi-Cloud Architecture and Innovations @ SynerComm
Multi-Cloud Security (Part-2): Best Practices
by
Time
Tuesday, September 13, 2022
4:00pm-4:40pm in Serenity Room
Wednesday, September 14, 2022
3:00pm-3:40pm in Clarity Room
Abstract
2nd part of our Multi-Cloud Security series: Join our Cloud Experts and talk about security best practices in the cloud. Learn more about integrated tools in cloud environments that can help security compliance and visibility. See real-time best practices configurations in Multi-Cloud Architectures (Microsoft 365, Azure, and AWS). Come away with a better understanding of compliance standards, vendor best practices, and how to understand and avoid common cloud security pitfalls.
Speakers
Aaron Howell – Managing Consultant – Multi-Cloud Architecture and Innovations @ SynerComm
Attacks on AD CS Explained
by
Time
Tuesday, September 13, 2022
3:15pm-3:55pm in Clarity Room
Wednesday, September 14, 2022
2:15pm-2:55pm in Prosperity Room
Abstract
Attacks against Active Directory Certificate Services (AD CS) have become a popular target for adversaries. During this presentation, SynerComm’s Information Assurance Consultants (IACs) will explain common vulnerabilities that can be introduced while configuring certificate templates. Attendees will gain a better understanding of the technical aspects of these attack paths while watching the penetration testers exploit common vulnerable templates.
Speakers
Dylan Webb – Lead Pentester @ SynerComm
Isaac Trzebiatowski – Informance Assurance Consultant @ SynerComm
What State are you in? Don’t be so immature!
by
Time
Tuesday, September 13, 2022
4:45pm-5:25pm in Prosperity Room
Abstract
This talk touches on:
- basing your program on a framework
- what are the levels of maturity for aspects of the ISP
- what are the key components
- how to attain the next maturity level
Speakers
Jeffrey Lemmermann – Sr. Information Assurance Consultant @ SynerComm
Continuous Attack Surface Management and Continuous Pentesting
by
Time
Tuesday, September 13, 2022
4:00pm-4:40pm in Clarity Room
Abstract
Defense-in-Depth Strategies to Safeguard your Digital Assets. What you need should know, what you can’t afford to miss…with key use cases.
Speakers
Brian Judd – VP Information Assurance (AssureIT) @ SynerComm
Attack Surface Management – An Evaluators Guide Tour
by
Time
Tuesday, September 13, 2022
4:45pm-5:25pm in Clarity Room
Wednesday, September 14, 2022
3:00pm-3:40pm in Prosperity Room
Abstract
In this session we cover different elements and functionality requirements of attack surface management – what you need should know, what you can’t afford to miss… featuring SynerCommm’s CASM®Engine
Speakers
Brian Judd – VP Information Assurance (AssureIT) @ SynerComm
Bill Kiley – Software Architect @ SynerComm
Lodging
Online:
- Visit Potawatomi Hotel Online
- Enter Group Code “SYN06262022” for a discounted room rate.
- Book a room, using this group code, by August 27, 2022 to lock in the discount rate.
Note: Space Limited
By Phone:
- Call 1-800-729-7244
- Mention group room block code: SynerComm IT Summit 2022 for a discounted room rate.