What does productivity really look like today? 20 years ago, we were expecting flying cars by now. What we have is a delicate balance of enabling users to be productive while keeping them safe and secure. Join Bob Lincavicks, Partner Technology Strategist for this interactive discussion on the state the productivity nation. He’ll cover where we have been, how to make the most of where you are now, and how to best position yourself for the future – with or without flying cars.
Speaker: Bob Lincavicks, Partner Technology Strategist, Microsoft
In the mobile age, employees carry sensitive corporate data wherever they go – typically on devices you don’t own. Strategic mobility solutions can enhance your organizations’ productivity and competitive edge, but also generate a new set of security and infrastructure concerns. Learn how MaaS360 helps mitigate these challenges for quick mobile enablement and collaboration.
Speaker: Joseph Pappano, VP of Strategic Alliances, MaaS360 by Fiberlink, an IBM company
This panel discussion will engage four successful business leaders who have embraced innovation and offered the marketplace new products and services that build on the use of new technology in their industry. They will share their path to developing the product/service, offer the challenges that they faced along the way, and the important elements/tactics to think about as businesses innovate in their industry for the future.
Speakers: Joe Zwiebel, Hartford Business Journal with Panel Speakers Greg Gondek, The ACT Group; Paul Pita, Pita Group; Dana Finnegan, New England Mechanical Services
Advanced Threats are a growing concern in the security industry because they differentiate themselves from other types of hacking activities by targeting a specific organization for a specific target, often extremely high pay-off data. While no two advanced threats are the same, most follow a common lifecycle. This presentation will present each stage of an advanced threat lifecycles as evidenced by the log data trail left behind. The presentation will then outline a defense in depth strategy designed to detect, alert and respond to the earliest indicators of an advance threat against your network.
Speaker: Greg Foss, Senior Security Research Engineer, LogRhythm
“It’s not the progress I mind, it’s the change I don’t like.” – Mark Twain
Technology continues to change rapidly. Some of your co-workers, employees and clients love it and can’t wait for the next upgrade. Others break out in a cold sweat at the mere mention of the word. Join us to:
Understand the four stages of the change process.
Learn how to identify the unique needs that the four generations in today’s workforce have when dealing specifically with technological change.
Increase acceptance of and competence with new systems and decrease the stress that comes with change so employees can focus on the benefits and get back to work!
Speaker: Mark LaPlaca, Senior Training Specialist, Employers Association of the NorthEast
With over 6 billion smart phones, tablets and other “non-PC” devices expected to be in circulation by 2015, the landscape of the mobile user has changed at a radical pace. How do you implement, control and support applications that just 2 years ago were Windows based to a user base that does not run Windows? Do you understand MDM, MAM, SEM and MCM? You should! This presentation will outline options that can leverage your infrastructure, procedures and policies while allowing for end user flexibility. Remember: if an app isn’t mobile, is doesn’t work.
Speaker: Andy Powell, Partner Business Manager, VMWare
Many people feel that security is “someone else’s job”. In these times, it is important that we all make sure that we are keeping our assets, co-workers and business safe. In this seminar, you will learn about some of the important things that you should consider when building security protocols and what you can take forward as a “security ambassador” to accomplish your organizations security goals. The seminar will also touch on what options are available and several technologies that can assist when determining what is important to you including intrusion detection, access control, IP/Analog video and verified versus non verified audio and video detection.
Speaker: Brian Mulligan, Vice President Sales, Sonitrol
Technology has provided us access to a wealth of information, but left us in a poverty of attention. From one perspective, technology has enabled us to exceed many of our physical limitations; from another, technology is hampering our ability not just to work, but to live. The great myth about the products we consume today was their promise to make us capable of doing more things at once.
“Strong ability to multi-task” is one of the most common phrases found on the resumes of today’s graduating class. Yet the human brain has been scientifically proven to be incapable of successfully devoting its resources to more than one task at a time. The capabilities of technology may be limitless, but as people, we are not.
In this presentation, Christopher Luise will discuss the impact of these issues on organizations and the evolving needs of the workforce, from hiring and training to motivation and performance analysis. He will examine the historical evolution of the concept of “productivity”, and highlight the differences between the ability to multi task and the ability to balance competing priorities. Lastly, Chris will demonstrate the ways in which employers will need to adapt as technology progresses far beyond our capabilities to manage human behavior through policy and procedure alone.
Speaker: Christopher J. Luise, Executive Vice President, ADNET Technologies, LLC
Your network is under the constant threat of attack. Threats have transformed from connection-based to content-based. Traditional security technologies have not kept up with this evolution and cannot tell the difference between malicious and legitimate content. Threats can enter your network from common applications like email and web browsers as well as the latest social networking tools. Today’s sophisticated threats require complete content protection, which is more than simply identifying applications and allowing or denying the traffic–it is application control coupled with identity-based policy enforcement of all content.
Learn about Fortinet’s high-performance Unified Threat Management (UTM) solutions that provide the visibility you need to detect and mitigate hidden threats within legitimate content, even from trusted sources and authorized applications. During this session, we’ll discuss many of the core components of UTM, including:
Firewall / VPN
NGFW (IPS & Application Control)
Advanced Threat Protection (ATP) – Anti-Malware
Speaker: Dave Crockett, Sales Engineer, Fortinet
IT has more capacity to influence change within an organization more than ever before. In many companies, however, IT is still regarded as a cost center; a department which seemingly requires more resources, larger budgets and more elaborate technology each year. For those who work in IT, or wear the “IT Hat”, it can be challenging to communicate the real and measurable impact made by the department. This lack of understanding between IT and non-IT leaders can prevent the company from making the changes necessary to grow and provide the best possible service to its customers.
This panel discussion will be moderated by Ed Laprade, President & CEO, and Tim Weber, Manager, Infrastructure Services of ADNET Technologies. From the perspective of both the IT professional and the business owner, we’ll examine where the breakdowns in communication most frequently occur, discuss the importance of setting clear expectations from both sides and share tips for clearly demonstrating the value that IT brings to an organization.
Speakers: Edward D. Laprade, President & CEO, and Tim Weber, Manager, Infrastructure Services, ADNET Technologies, LLC
Software Defined Networking has become a hot topic over the past few years, with terms like SDN, OpenFlow, OpenStack, OpenDaylight, Network Function Virtualization, not to mention all the talk about the Control-Plane and the Forwarding-Plane. But what do they mean and how are will they ultimately affect your LAN infrastructure?
SDN-Central’s definition is short and precise, “Software-defined Networking (SDN) is a new approach to designing, building and managing networks. The basic concept is that SDN separates the network’s control (brains) and forwarding (muscle) planes to make it easier to optimize each.” SDN reduces CapEX & OpEX, increases Flexibility & Agility, and enables Innovation.
Please join Brocade for a quick SDN presentation that will help decipher the terms and the technologies of Software Defined Networking and help clarify how SDN will be making your network more intelligent, efficient and dynamic in the very near future.
Speaker: Tom Beggan, Northeast Channel Systems Engineer, Brocade Communications
The largest gaps in security practices often exist in places we don’t think to search in. Many companies believe that their infrastructure and their data are secure because they invest so much money protecting their perimeters. In reality, many organizations invest far too minimal time protecting their networks from internal weaknesses.
ADNET’s Eric Monda, Senior Systems Engineer and Certified Ethical Hacker and Michelle Syc, Senior Analyst, Advisory and Assurance Services will lead the discussion around:
An organization’s number one weakness – Employees
Common products and applications that create security nightmares for Systems Administrators
Protection for your company’s network with security software
Speakers: Certified Ethical Hackers Eric Monda, Senior Systems Engineer and Michelle Syc, Senior Analyst, Advisory and Assurance Services, ADNET Technologies
Technology is integrated into the DNA of business and of society itself. Some of the most recent entrants are Cloud Computing, Big Data, and Mobile. By putting these technologies together, we arrive at an intersection that creates a “sweet spot” where innovation can be enhanced within your organization. This session will put those pieces together and give you tools to move your organization toward that sweet spot.
Speaker: Michael Gendron, Professor, Central CT State University
We will be discussing the different technologies available to connect to the Cloud as well as a discussion on Diversity to minimize downtime.
Speaker: Dennis Mudry, Senior Sales Engineer, Comcast Enterprise Services
15th May 2014