AT&T Business Summit is virtual Oct. 27-28 and free!

September 27, 2021 | Kate Brew

We know that many of us couldn't wait to reconnect in person.

However, the health and safety of our guests will always be our top priority. Given the continued uncertainties around the pandemic, the AT&T Business Summit will be exclusively virtual this year. And it’s jam-packed with cybersecurity talks! Given how critical security is to digital transformation and our ability to innovate, we’ve got a robust line-up of cybersecurity topics – from SASE to zero trust and the technologies you need to help protect your business.

Rest assured, you will be able to experience the magic of the AT&T Business Summit through our virtual program. We will explore how businesses are creating entirely new realities by uniting technology and human ingenuity to deliver customized, unique and safe experiences for their customers and employees.

Be prepared to hear from the same great visionaries, gain access to global decision-makers, and dive into the technology that is shaping the future.

We hope that you join us as we take this journey together.

Join us from October 27-28, 2021 by registering. Event is FREE!

Here are the key Cybersecurity breakout sessions:

Securing the edge with Zero Trust and SASE Breakout

Speakers: Todd Waskelis and Dan Solero

Description:

PERSPECTIVE: Many companies embrace mobile, video, cloud, and IoT technologies to stay competitive and relevant amidst ever-growing demands from customers and partners. They want to embrace next-generation security frameworks like SASE and Zero Trust, but don’t know where to start.

CHALLENGE:  An ever-expanding edge is synonymous with new cybersecurity demands. Threats and compromises at the edge may lead to problems even more severe than service disruptions. And edge applications and devices will be targets due to increased data and processing. Trust and security are the drivers for digital economy and innovation at the edge.

LEARNING: In this session, we’ll level set the popular SASE and Zero Trust frameworks and see a typical journey towards implementing those approaches. We’ll explain implementation, starting with any current investments already in place to help empower, enable, and protect the edge and help build trust within a Zero Trust context.

Securing your supply chain in a 5G world

Speaker: Theresa Lanowitz

Description:

PERSPECTIVE: Today’s supply chains are global. We have more partners in our ecosystems than ever, and each partner plays an important role in getting our customers the best products possible.

CHALLENGE: With so many different components encompassing the modern supply chain, how do you make sure you’re working with trusted partners? How do you make sure your trusted partner’s supply chain is secure? Challenges born from neither securing nor understanding your supply chain represent enormous risks to your business, your brand, and your customers.

LEARNING: A fireside chat with Alfonso Rivera, CISO of Grupo Bimbo, this session will outline the complexities of managing and securing a global supply chain that must deliver safe materials for human consumption; types of security frameworks used to undertake a global requirement; plus, best practices for assessing and securing your own supply chain.

Cybersecurity and edge networking: Delivering the next level of enterprise protection

Speaker: Rupesh Chokshi

Description:

PERSPECTIVE: As businesses adopt new technologies and adapt to fluctuating social and economic conditions, their cybersecurity priorities change. With remote work, created by the COVID-19 pandemic, becoming more manageable, companies are shifting their focus to more robust and comprehensive ways of protecting their data, IT infrastructure, and human assets. This shift requires them to re-think their approach to secure-edge networking, and connected endpoints.

CHALLENGE: Increasing number of ransomware and DDoS attacks, new vulnerabilities introduced by work-from-home, and the need to protect rapidly growing volumes of IoT devices, has put many enterprise security organizations at a crossroads. New technologies and solutions are available in the market today, but what’s the right formula for deploying them and what are the right skillsets needed for executing top initiatives?

LEARNING: Join our panel and hear how industry leaders are tackling their critical cybersecurity projects.

Cybersecurity and edge networking: Delivering the next level of enterprise protection

Speaker: Rupesh Chokshi

Description:

PERSPECTIVE: Digital transformation is creating cybersecurity risks as businesses embrace new technologies and expand ecosystems of partners and suppliers. Companies that want to take advantage of delivering fully protected and optimized access to distributed information and applications must consider a new holistic framework for securing endpoints, data, and connectivity across key IT environments – the network, the edge, and the cloud.

CHALLENGE: The increasing complexity of IT and the explosive growth of connected devices are exposing companies to even greater cybersecurity threats. As digital transformation accelerates, building a comprehensive platform, that seamlessly connects and protects your entire business, can be difficult without understanding the forces driving the convergence of cybersecurity and edge networking.

LEARNING: In this session, industry experts will discuss the trends, vision, and use cases behind the intersection of cybersecurity, edge, fiber, and 5G connectivity.

Zero Trust, SASE, and XDR: Aligning these emerging trends to work best for your business

Speaker: Mary Blackowiak and Rakesh Shah.

Description:

PERSPECTIVE: The necessity for digital transformation is clear among many of today's modern businesses. Cloud-based applications offer organizations the ability to innovate and remain nimble. And allowing employees to work from anywhere helps businesses attract and retain the industry's best talent.

CHALLENGE: These emerging trends create a landscape where users and data are increasingly distributed, and many legacy network and security infrastructures are struggling to keep up. Businesses need visibility into where their sensitive data is being stored and how it is being shared, and they need to provide consistent, highly secure experiences to their users, wherever they may be located.

LEARNING: We will compare three of the industry's most popular architecture models: Zero Trust, Secure Access Service Edge (SASE), and Extended Detection and Response (XDR) to identify where they overlap, their key differences, and the unique value each offers businesses that want to modernize network

Top three ways to prepare for a ransomware event

Speaker: Geoff Mefford and Alex Waterman

Description:

PERSPECTIVE: Ransomware is a cyberattack that restricts access to parts of an organization's system until certain financial demands are met. In addition to the economic impact, companies exposed to a ransomware attack may experience severe downtime, loss of reputation, critical data loss, and damage to systems.

CHALLENGE: The total impact of a ransomware attack is much greater than the ransom fee itself. Does your cybersecurity strategy address the unique factors required for protecting against ransomware? 

LEARNING: This session will help you understand your organization's vulnerabilities and how to improve resiliency in response to ransomware. Join our team of security experts to understand the continued evolution of ransomware attacks and quickly identify red flags that put organizations at risk.

Build your SASE strategy

Speaker: Derrick Johnson and Robbie Harrell

Description:

PERSPECTIVE:  This is a two-part series. Be sure to sign up for Part 2 for the full benefit of the workshop. SASE has quickly gained mindshare across industries and is creating significant opportunities for evolving the network and security landscape within your enterprise.

CHALLENGE: A strategic approach is needed to help sort through the noise in the industry and define a step-by-step program for SASE adoption tuned to your specific business needs.

LEARNING: In this interactive workshop format, learn from experts and your peers on how to approach practical SASE adoption with guidance around planning, strategy, solutioning, integration, and holistic deployment.

And the Keynote speaker!

Indra Nooyi

Indra Nooyi is the former Chairman and CEO of PepsiCo (2006-2019); a Fortune 50 company with operations in more than 180 countries.

In this role, Mrs. Nooyi was the chief architect of Performance with Purpose, PepsiCo’s pledge to do what’s right for the business by being responsive to the needs of the world around us. As part of Performance with Purpose, PepsiCo was focused on delivering sustained growth by making more nutritious products, limiting its environmental footprint and protecting the planet, and empowering its associates and people in the communities it serves. During her tenure, PepsiCo grew net revenue more than 80%, and PepsiCo’s total shareholder return was 162%.

And the closing the event is Shaquille O'neal!

Kate Brew

About the Author: Kate Brew

Kate has over 15 years experience in product management and marketing, primarily in information security.

Read more posts from Kate Brew ›

‹ BACK TO ALL BLOGS

Get price Free trial