Ctrl+Esc (2nd Edition) for IT Service Providers
Ctrl+Esc (2nd Edition) for IT Service Providers
After the very successful first edition of the Ctrl+Esc seminar held last June, we are working hard to create a memorable second edition.
This full day seminar will be on Wednesday 16th of October, and it will be filled with great content on how to take control of your IT security.
We will also explore the culture of wine at the 400 year old Marsovin Wince cellars while tasting premium Marsovin wines parred with a selection of high-quality foods.
Topics that we will be exploring in this day filled sessions include:
- Network Edge Security which works for any networkable device, that is not only for computers but also for any device connected to your network
- 2FA, MFA and OTP on users mobiles is easily hackable, especially where the users use there own mobile devices which is not managed by you.
- FIDO2 is an open standard for passwordless authentication, using cryptographic keys to enhance security and simplify logins across devices and online services.
- Veeam Backup Software started supporting Immutable Storage since Feb 2021.
- Immutable Storage cannot be altered or encrypted by ransomware, ensuring your data remains safe and recoverable
- Immutable Storage cannot be accidentally deleted
- We explore the different methods and technologies behind Immutable Storage and explore how to have it very cost effectively for Veeam
- Commvault, Rubrik, Veritas, Atempo and Catalogic backup software’s also support Immutable Storage.
- We will explore the latest advancements to have Immutable storage for these backup software’s without breaking the bank!!
- This includes re-purposing old servers to become immutable storage
- Everyone loves Microsoft Teams. It’s a great tool for collaboration
- When a user shares a file on Teams Chat, Teams Chat actually creates a public link to the file, therefore anyone in that chat, can share the link with anyone and who have the link can even edit the file, without logging in?
- We will explore how to find and detect such links
- We will also explore how to set policies and ensure that your users are compliant with these policies
Agenda:
From | To | Session | Presenter |
08:00 | 08:30 | Welcome Coffee / Registration | |
08:30 | 09:05 | Welcome Note / About Micro Technology | Philip B Cortis |
09:05 | 09:35 | IP Communication Strategies for a Secure Future | Mandy Lou |
09:35 | 10:00 | Network Edge Security for computers and also for devices | Philip B Cortis |
10:00 | 10:30 | Coffee Break | |
10:30 | 11:15 | Protecting exiting clusters against ransomware | Craig Hatter |
11:15 | 11:30 | Impact of IT threats and EU regulation on your MFA corporate adoption | Julien Larsonneur |
11:30 | 11:45 | Cost Effective Veeam Immutable Storage | Philip B Cortis |
11:45 | 14:30 | Indulge yourself in a 400 year old wine cellar, tasting premium Marsovin Wines parred with a selection of high-quality foods. | |
14:30 | 15:15 | Enhanced Data Availability for Immutable Storage | Craig Hatter |
15:15 | 16:15 | Data leak prevention for Teams, OneDrive, and SharePoint | Daniel Haridas |
16:15 | 16:30 | Closing Notes | Philip B Cortis |