We believe the network will play an even more critical role in enabling customers to aggregate, automate, and draw actionable insights from highly distributed data, where there is a premium on security and speed.Register now
|1.00PM - 1.50PMTime||Empowering Defenders with Cisco Threat Response||Mr. Lewis Tan,
|Security defenders are struggling with the orchestration of a mix of security products and that, by itself, may obfuscate rather than clarify the security landscape. Cisco Threat Response is the key pillar of our integrated security architecture, built to rapidly detect, investigate and remediate threats, thus empowering security analysts with effective weapons to defend their organizations.
In this demo, we will utilize an environment that models after many enterprise networks to show you how your own environments get compromised, how security breaches get detected, and how to respond with maximum effectiveness.
|1.50PM - 2.40PMTime||Secure Data Center||Mr. Kwai Seng Lai,
Technical Solutions Architect,
|Data is currency. Data centers need protecting because that is where the money is. The modern Data Center is incredibly complex especially in a multicloud environment. Learn how to secure your data center by having:
- the right security considerations for a hybrid cloud strategy
- application insights with AppDynamics; understanding application behavior with Cisco Tetration Analytics; and visibility across the entire network with Stealthwatch
- Microservices/Application segmentation to reduce the attack surface with NGFW, ACI and Tetration
- threat protection by strategically deploying sensors north-south, east-west with Stealthwatch, Tetration/ACI and AMP
|2.40PM - 3.10PM Time||Unlock the Value of Data with Cisco Kinetic||Khun Bovornwut Chaiyakul,
Sales Business Development Manager,
|The data produced by all your things is a high-value asset that can change the trajectory of your business - if you can make full use of it. But that can be challenging when you’re working with disparate things and a variety of applications that may live in edge or fog nodes, your data center, private clouds and/or public clouds. This session discusses how Cisco Kinetic makes it easy to connect distributed devices (“things”) to the network — then extract, normalize, and securely move data from those devices to distributed applications to drive business outcomes|
|3.10PM - 3.40PMTime||Break|
|3.40PM - 4.20PMTime||From Chasing Alerts to Hunting Threats: What Makes an Effective SOC is Evolving||Mr. Nadhem Al-Fardan,
Security Technical Leader, Cisco Customer Experience,
|Whether you call it a SOC, a CSOC, a SIRC, a Cyber Defense Center, or something else, security operation centers have the same fundamental mission – to help organizations detect, analyze, respond to, report on, and prevent cyber security incidents. But what it takes to do that effectively has changed in this ever-evolving threat landscape and has put an even greater burden on analysts.
Most SOCs take a reactive approach - when an alert is triggered, they investigate. But today, SOCs must also take a automated and proactive approach, automating SOC tasks and engaging in investigation and threat-hunting, with the aim of breaking the cyber kill chain. Advances in technology, intelligence, and analytics used in concert are making this shift in approach possible, helping to focus limited available analyst effort to provide greater value.
|4.20PM - 5.00PMTime||Next Generation Cloud Managed Solutions, Simply Managed by Meraki||Khun Tia Handley,
Product Sales Specialist,
Khun Nara Plitponkarnpim,
|Meraki prides itself on keeping IT simple, even when the industry is innovating at a very fast pace. Come see the latest product and cloud managed solutions, including routing, switching, wireless, security, analytics and API’s. See how Meraki’s next generation physical security cameras now include IOT sensor and analytics capabilities to support your business objectives. Hear how Meraki’s API First development strategy has accelerated cross architecture integration as well offered our customers and partners an open platform for increase automation and solution development.|
|5.00PM - 5.30PMTime||Closing & Lucky Draw @Ballroom B, Level 23|
Sorry, no results matched your search criteria(s). Please try again.