read
August 16, 2018

The 7 VMworld 2018 Security Sessions You Can't Miss

0
Share!
 
 
 

Are you attending VMworld 2018?

If you’re attending VMworld 2018 and trying to weed through the 600+ sessions to decide what to attend it can be daunting. You only have a limited about of time to get the information you need.

To help, we’ve compiled the top seven presentations for anyone interested in application security, SecDevOps, and other security topics.

If you’re interested in these sessions, you can find them on the VMworld 2018 site. Follow the links to add them to your schedule and voilà! They’ll be added to create your own custom itinerary.

Related: DevSecOps vs. SecDevOps vs. DevOpsSec: Is there really a difference in these Secure DevOps terms?

Application Security Sessions

  • “Taming Security with Tools: Making Compliance a Reality”

Join two industry experts as they discuss their experiences with the digital transformation from IT to DevOps and a shift in the way IT and InfoSec operate. Key takeaways: how they have seen this play out in large corporations, how they have seen it solved, and some key strategies for you to take away to create a strategy that alleviates their compliance burden from the start.

Related: Automated Investigative Response: Rapid Breach Detection & Investigative Solution for Meeting PII Compliance Deadlines

  • “Great Power, Great Responsibility: Least Privilege Security with AppDefense”

Least privilege/app control is the powerful mechanism for building secure architecture. However, it can be operationally challenging. In this VMworld 2018 session, you will find out how VMware AppDefense has improved over legacy app control, including hearing directly from customers on their successful security deployments.

“Office of the CTO”

  • “Quantum Supremacy: Basics, Outlook, and Security Implications”

In this session, you will hear about the current outlook on quantum computing and what it will likely mean for enterprise computing in the future. Included in the discussion will be a quick review of quantum computing concepts, comments on application development hurdles and overall outlook, killer apps under development by researchers, and implications to widely used security (cryptography) standards. You will also find out about VMware’s initiatives addressing security readiness.

  • “Rethinking Financial Services: Adapting to a Digital Economy”

Customer centricity, competitive forces, profitability, and emerging technologies: These forces are driving financial services investment in digital change, transformation, and innovation.

In this panel discussion, our customers will discuss how they’re leveraging technology to deliver financial services at the speed of life by Adopting a modern infrastructure that's easily extensible to the public cloud with a consistent cross-cloud architecture and operating model across private and public clouds.

Secure DevOps

  • “Introduction to Container Networking and Security with NSX-T Data Center”

In this VMworld 2018 session, you will learn about VMWare NSX-T Data Center, a cloud-native platform for networking, securing, and monitoring both traditional and cloud-native apps on any compute infrastructure. Find out about common networking and security challenges faced by customers in their journey with containers. You will see how the NSX-T Data Center platform helps solve some of these challenges with its CNI integration with modern cloud-native application platforms.

  • “Mind the Gap: Building a Closer Relationship between Security and DevOps”

Today’s IT business model, rooted in enabling business agility, demands that cyber-security keep pace with the velocity of the cloud. Securing the speed of the cloud requires not only understanding what is technically different about today’s data center but also fully embracing and exploiting the benefits of DevOps as a means to codify cyber-security practices and controls.

Hear recent research findings from Enterprise Strategy Group on why decentralization and automation necessitate an evolved approach to securing hybrid clouds and how to build a closer relationship between security and DevOps.

Related: Interested in learning more about what makes CSPi solutions different? Download our white paper, “How to Secure DevOps Across Any Environment” or contact us today.

  • “NSX Design for Cloud-native Apps with Pivotal Cloud Foundry”

Pivotal Cloud Foundry is a suite of products specifically designed for the development and deployment of cloud-native apps. The integration with NSX-T provides many benefits, including the ability to create security policies across platforms, deep visibility into the network of these platforms, and the ability to automate the day 1 and day 2 operations across the entire stack.

But what about design? There are many choices to consider when designing and deploying the stack in production. Come two NSX cloud-native design experts to learn about designing NSX for the Pivotal Cloud Foundry suite of products (Pivotal Application Service & Pivotal Container Service), including the lessons we’ve learned from our work in the field.

Related: VMware and NSX: You Can’t Have Your Cake and Eat It Too

Don’t Miss Us at VMworld 2018!

In between sessions, we hope you can make time to visit with us. You’ll find us in booth #1632 in the North Hall at VMworld 2018.

You’ll have the chance to see how our cyber-security solutions protect an organization’s high-value, critical assets to minimize—or even eliminate—the impact of the inevitable data breach.

For example, you’ll see how our ARIA SDS platform solves the complexities associated with securing DevOps environments with a strong focus on application defense and providing valuable packet intelligence data.

You’ll also learn how our Myricom nVoy Series appliances provide instant, automated breach identification and notification for faster, more effective breach investigation and ultimately incident response, crucial for meeting data breach compliance requirements.

Don’t miss us to learn how these innovative new solutions successfully address today’s most complex security challenges.

 

Tags: data breach, secdevops, cybersecurity, data protection