[fullwidth background_color=”” background_image=”” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ background_repeat=”no-repeat” background_position=”left top” video_url=”” video_aspect_ratio=”16:9″ video_webm=”” video_mp4=”” video_ogv=”” video_preview_image=”” overlay_color=”” overlay_opacity=”0.5″ video_mute=”yes” video_loop=”yes” fade=”no” border_size=”0px” border_color=”” border_style=”” padding_top=”20″ padding_bottom=”20″ padding_left=”” padding_right=”” hundred_percent=”no” equal_height_columns=”no” hide_on_mobile=”no” menu_anchor=”” class=”” id=””][fusion_text]Come and see our team in Romania! We will be making our way across the channel to deliver a day of insightful workshops alongside our partner Prisma Holding.
Throughout the day there will be industry leaders presenting their latest innovations within the IT industry. The sessions will be informal,so you will have the chance to ask questions and further your learning.[/fusion_text][separator style_type=”single” top_margin=”” bottom_margin=”” sep_color=”” border_size=”” icon=”fa-hourglass-half” icon_circle=”” icon_circle_color=”” width=”” alignment=”left” class=”” id=””][one_full last=”yes” spacing=”yes” center_content=”no” hide_on_mobile=”no” background_color=”” background_image=”” background_repeat=”no-repeat” background_position=”left top” hover_type=”none” link=”” border_position=”all” border_size=”0px” border_color=”” border_style=”solid” padding=”” margin_top=”0px” margin_bottom=”” animation_type=”0″ animation_direction=”down” animation_speed=”0.1″ animation_offset=”” class=”” id=””][title size=”4″ content_align=”left” style_type=”none” sep_color=”” margin_top=”20px” margin_bottom=”5px” class=”” id=””]Schedule[/title][fusion_text]
09:00 – 10:00 | Registration and Coffee |
10:00 – 11:00 | IT Infrastructure Must Be Understood If It Is To Be Secured (AssetGen) |
11:00 – 11:15 | Break |
11:15 – 12:15 | Transform endpoints from your biggest risk to your best defense (Bromium) |
12:30 – 14:00 | Lunch & Networking |
14:00 – 16:00 | Visio Automation Techniques *Optional |
[/fusion_text][separator style_type=”single” top_margin=”20px” bottom_margin=”” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””][title size=”4″ content_align=”left” style_type=”none” sep_color=”” margin_top=”20px” margin_bottom=”5px” class=”” id=””]First Session – IT Infrastructure Must Be Understood If It is To Be Secured
Presenter: David Cuthbertson
10:00 – 11:00
[/title][fusion_text]Changes in staff, suppliers, hardware, software, and business priorities often mean that organisations fail to understand the detail required for securing their IT infrastructure.
The result is avoidable gaps and situations which can easily be exploited by untargeted malware.
This presentation will look at best practices and methods on how to gather, organise and maintain infrastructure knowledge across an IT organisation so that systems can be secure.
Securing the IT infrastructure against internal and external attack takes more than buying a few perimeter devices and updating some spreadsheets. As IT resources and skills are limited, focus is needed to constantly
- Understand how the infrastructure works,
- Identify where it is most vulnerable, and
- Make changes without causing disruption.
[/fusion_text][separator style_type=”single” top_margin=”20px” bottom_margin=”20px” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””][title size=”4″ content_align=”left” style_type=”none” sep_color=”” margin_top=”” margin_bottom=”” class=”” id=””]Second Session – Transform endpoints from your biggest risk to your best defense
Presenter: Jochen Koehler
11:15 – 12:15
[/title][fusion_text]You will find out how for the first time, the balance of power between attackers and defenders is shifting. Endpoints have always been the weakest link in your IT infrastructure because anti-virus and anti-malware don’t adequately protect against zero-day attacks.
By combining application isolation and containerization of files with unparalleled Threat Intelligence, we will show you how Bromium Secure Platfform reduces the attack surface of Internet Browsers, E-Mail and USB dramatically while increasing the IT productivity.[/fusion_text][separator style_type=”single” top_margin=”” bottom_margin=”20px” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””][title size=”4″ content_align=”left” style_type=”none” sep_color=”” margin_top=”” margin_bottom=”” class=”” id=””]Optional Session – Visio Automation Techniques For IT Systems, Data Centres and Networks
Presenter: David Cuthbertson
14:00 – 16:00
[/title][fusion_text]Creating and updating Visio diagrams of IT systems can be made simpler and easier by using automation features and methods that most IT engineers aren’t aware of. Why spend hours diagramming when all you need is minutes – just by better understanding of a tool you already have? This informal 2 hour workshop will cover different aspects of IT schematics – floor plans, rack layouts, networks, application architectures, ITIL service maps, etc. It is intended for existing users of Visio where multiple sets of diagrams are needed for projects, operations and risk management understanding and decision making. The presenter David Cuthbertson will also cover issues that attendees would like to focus on for personal benefit.[/fusion_text][separator style_type=”single” top_margin=”” bottom_margin=”20px” sep_color=”” border_size=”” icon=”” icon_circle=”” icon_circle_color=”” width=”” alignment=”center” class=”” id=””][fusion_text]To register please contact
Mr. Mihai Banica: Managing Partner of Trieres s.r.l.
Tel: +40 (751) 546 059 E-mail mihai@trieres.eu[/fusion_text][fusion_code]PGlmcmFtZSBzcmM9Imh0dHBzOi8vd3d3Lmdvb2dsZS5jb20vbWFwcy9lbWJlZD9wYj0hMW0xNCExbTghMW0zITFkMTEzODUuNTcyODg0NTk0MDU4ITJkMjYuMDkwMDg1NCEzZDQ0LjQ4NjYwOSEzbTIhMWkxMDI0ITJpNzY4ITRmMTMuMSEzbTMhMW0yITFzMHgwJTNBMHg5YzZhZTVmZGFmNTNlZTQxITJzUmFtYWRhK0hvdGVsKyUyNitTdWl0ZXMrYnkrV3luZGhhbStCdWNoYXJlc3QrTm9ydGghNWUwITNtMiExc2VuITJzdWshNHYxNTU5NzMwMzE4NDU1ITVtMiExc2VuITJzdWsiIHdpZHRoPSI3NTAiIGhlaWdodD0iNTUwIiBmcmFtZWJvcmRlcj0iMCIgc3R5bGU9ImJvcmRlcjowIiBhbGxvd2Z1bGxzY3JlZW4+PC9pZnJhbWU+[/fusion_code][/one_full][/fullwidth]