Access the presentations by clicking on the links below. We will continue to update the links as we receive more presentations and recordings. 

 

Security Business Intelligence Collaboration Cloud IoT
TIME  
8:00-8:30 REGISTRATION | BREAKFAST 
8:30-8:45

Opening Remarks - Rimon Moses

Wausau & Superior Rooms

View Presentation

8:45-9:30

Keynote Speaker--Brett Scott

Wausau & Superior Rooms

9:30-9:45 BREAK
 

Madison Room

Chippewa Room

Portage Room

Sussex Room

Geneva Room

Wisconsin Room

9:45-10:30

Are Your Company's Digital Credentials for Sale?

-RMM- Mike Pape

IIoT

Manufacturing

-Tech Data- Tom Digsby

 

 

AI for the Hybrid Cloud

-HPE-

Simplify Cloud Communications

-RingCentral- Sean Donahoe 

Cisco Bundle

-Cisco-Rick

Cyber-Warfare Range

10:30-10:45 BREAK
 

Madison Room

Chippewa Room

Portage Room

Sussex Room

Geneva Room

Wisconsin Room

10:45-11:30

19 Tips to Protect Against Ransomware Attacks for 2019 

-Veeam- Troy Dunavan

Smart City Design

-Pandata-  Sunny Kulkarni

Business 365

-Microsoft-Erin Michaels

Cisco Video Conferencing

-Cisco- Jeff Schwoerer

Data Privacy  Law

-Ruderware- Emilu Starck

Cyber-Warfare Range
  Room?
11:30-1:00

Lunch

Keynote Speaker | Keith Rayle, Fortinet Strategist

AI – The Real Deal vs. Marketing Hype

 

 

Madison Room

Chippewa Room

Portage Room

Wisconsin Room

Geneva Room

Sussex Room

1:15-2:00

Innovation for a Smarter World

-Axis-John Stukenberg

AI and BI

-Pandata-Greg DeSautel

Modernize Your Data Center

-RMM- Arthur Corallo

Simplify Cloud Communications

-RingCentral- Sean Donahoe 

(repeat)

Incident Response Tabletop Drills

-RMM- Rimon Moses

Cyber-Warfare Range

2:00-2:15 BREAK
 

Madison Room

Chippewa Room

Portage Room

Sussex Room

Geneva Room

Wisconsin Room

2:15-3:00

Cyber-Security Landscape: Hackers vs. You

-RMM- Mike Pape

IIoT

Public Sector

-Tech Data- Tom Digsby

Aruba Central

-Aruba-  Jeff Trunk

Doesn't Microsoft take care of that?

-Veeam- Patrick Murray

Closing the Door

-Forinet-Andy Crocker

Cyber-Warfare Range

3:00-3:15 BREAK
 

Madison Room

Chippewa Room

Portage Room

Sussex Room

Geneva Room

Wisconsin Room

3:15-4:00

Employee Awareness

-KnowBe4- Rich Richardson

Open

-TBD-

Accelerating Transformation to Hybrid Cloud

-HPE- Hunter Almgren

Physical Security Checklist

-RMM-Patrick Bloczynski

Incident Response Tabletop Drills

-RMM-  Rimon Moses

Cyber-Warfare Range

4:15-5:00

Keynote--Art Corallo

Closing Remarks--Rimon Moses

Drawing Winners

Networking

 

Keynote Speaker: Brett Scott

 

Are Your Company's Digital Credentials for Sale? 

Speaker: Mike Pape, RMM Solutions Director of Sales

Find out the top ways an attacker can use compromised credentials. during this interactive session.
You will learn:

  • 4 ways digital credentials are compromised
  • What attackers can do with this information
  • Real-world examples (Yes, it can happen to anyone)

Ultimately, Mike will share with you actionable steps you can take to keep your companies credentials off the dark web. Don't miss this event.
EXTRA: All attendees will receive a Dark Web ID Scan to uncover if they have any digital credentials for sale.
Who should attend? Anyone responsible for the digital credentials within an organization. Anyone responsible or interested in digital security.


AI for the Hybrid Cloud

Speaker: Lionel Arcand, HPE Solution Architect

How to use infosight as Your AI for server, storage and networking. How can HPE and RMM help you more effectively manage your Hybrid Cloud. Demo's will be available. 


IIoT

Speaker: Tom Digsby

Simplifying the management and customer experience of cloud communications

For the 5th year in a row, RingCentral has been named a leader in the Gartner Magic Quadrant for Unified Communications as a Service (UCaaS). In this session we will highlight, through live demos, why RingCentral is winning in the cloud. We will cover the administrative experience including reporting and analytics. As well as dive into the user experience where we will show the single application for mobile and desktop that puts all your communication and collaboration needs in a single pane of glass.


Cisco Bundle

Speaker: Richard Brennan

Cyber-Warfare Range

The Wisconsin Cyber Threat Response Alliance will have the Mobile Cyber Range available throughout the day. The Mobile Range allows private and public organizations to sharpen their cyberwarfare skills on live targets and introduce future cyber warfighters to our craft. Interested in more details visit https://sites.google.com/wictra.org/wictra/home


Smart City Design

Speaker: Sunny Kulkarni

Masters in Applied Informatics with a focus on Urban Informatics--New York University

Smart City initiatives empower government to maximize benefits with minimal spending. The goal of a government is “social good” versus “maximize profit” for business. But the means to achieve these goals remain same. Cities today have the capability to collect tons of data. And to use it for insights in people’s lives and everyday decision-making makes sense to correctly allocate the limited on-hand resources.

Social good and government initiatives have a growing need to take advantage of modern data analytics and architecture ideas. From foundation layer of data lakes and warehouse to achieve advanced prescriptive and preventative AI based analytics. In my discussion, I will be sharing initiatives that other large cities and countries have embarked upon. We ‘ll also discuss how best such initiatives can be easily adopted in our cities with modern data architecture, cloud-based approach to minimize spending and an eye towards the advanced analytics road map that these data decisions offer in near future.


Business 365


Cisco Video Conferencing


Data Privacy Laws

Speaker: Emilu Starck, Ruderware

This discussion will provide an overview of Wisconsin’s data breach law and recent developments regarding proposed new legislation in Wisconsin.  It will also cover what to consider when negotiating data privacy and security provisions in contracts and other hot topics and trends in data privacy and cybersecurity.


KEYNOTE: AI-The Real Deal vs. Marketing Hype

Speaker: Keith Rayle, TechData

This session will open with a brief history and examination of the workings of Artificial Intelligence (AI) and using it for solving problems, to include current and future phases of AI development. We will then examine the use of AI in security tools implementations, and discuss strategies for deploying AI-based solutions. We will then take a look at AI deployment for ‘fingerprinting’ cybercrime rings to provide predictive capabilities based on attack patterns. We will briefly discuss cybercriminal uses of AI and what to expect from future attacks. We will close the session with an examination of what we should consider when deploying AI solutions within our IT  architectures.


Innovation for a Smarter World

Speaker: John Stukenberg, Axis

A presentation on how today’s technology can improve security and optimize business performance.


AI in BI-An overview of the next wave of Business Intelligence

Speaker: Greg DeSautel, Pandata

For decades the promise of business intelligence has been insight for the business user community. The third wave of BI innovation brings us to this point. Join us for a look at the history and challenges behind the first two waves and how the next wave delivers true business-driven data analytics powered by AI.


Modernize Your Data Center

Incident Response Communication-Tabletop Drill


Cyber-Security Landscape: Hackers vs. You

IT'S THE HACKERS VS. YOU IN THE CYBER SECURITY BATTLE.
If you are like many of us, it’s challenging to know what security measures will keep you ahead of the hackers. During this session, we will discuss the top tools you need to invest in to win the battle. Learn the latest threats on the horizon, what tools can identify the threats and how to take the correct action to win the security fight.

This session will cover:

  • Security training
  • End-point protection
  • Threat detection and intelligence
  • Multi-Factor Authentication
  • Cyber Security Monitoring
  • Remediation/Correct Action

 


Aruba Central

Speaker: Craig Busick & Jeff Trunk

As customers look for new ways to better utilize their IT resources, they're becoming increasingly open to Cloud-based solutions to help minimize the onsite . Aruba Central is a unified cloud-based network operations, assurance and security platform that simplifies the deployment, management, and optimization of wireless Instant APs, ArubaOS Switches and WAN Gateways.


Doesn’t Microsoft take care of that?

“Doesn’t Microsoft take care of that?” is a question often heard when discussing protection of O365, much to the chagrin of compliance officers, admins and users everywhere. In this presentation, we’ll discuss Microsoft’s shared responsibility model, why legal hold isn’t a backup solution, why it’s, arguably, more important for an organization to protect Exchange, SharePoint and OneDrive online than when it was still on-premises and how Veeam can help!

Bio: Patrick Murray is a System Engineer with Veeam Software specializing in security, data protection, infrastructure design and Microsoft technologies. Prior to joining Veeam, he worked in education, eDiscovery, the financial sector and IaaS, among others.


Closing the Door

Understanding how a breach occurs and what steps can be taken to prevent a breach is paramount.  We will take a journey down the pathway of understanding the process cyber criminals use to build and implement an attack.  We will discuss possible tools that could be used at each stage, and how they could help.  The presentation is designed to be informative and generic, yet provide insight into the process.


Employee Awareness Programs

Open


Accelerating Transformation to Hybrid Cloud

Digital transformation is about conducting business differently through the use of technology, and is disrupting every industry. The core of digital transformation is engaging with customers the way customers want to engage with you. Operating in this hybrid cloud world requires new considerations to be made, even outside of technology. People and processes are also key in enabling and implementing a successful transformation strategy. Regardless of where you are on your journey, HPE is right there with you. Come learn about the new ways HPE is enabling digital transformation for customers across industries.