Versa Networks Cloud Security Threat Detection and Mitigation for Modern Threats

Event: Security Field Day 6

Appearance: Versa Networks Presents at Security Field Day 6

Company: Versa Networks

Video Links:

Personnel: Suraj Chandrasekaran

Versa protects against new threats and vulnerabilities in the cloud. Suraj provides a detailed breakdown of all the components of Versa’s advanced cloud security capabilities such as Secure Web Gateway and Unified Threat Management. Demos of a cloud firewall and other threat detection and mitigation capabilities will be shown.


Enabling Versa Networks’s Zero Trust Network Access for a Post-Pandemic World

Event: Security Field Day 6

Appearance: Versa Networks Presents at Security Field Day 6

Company: Versa Networks

Video Links:

Personnel: Suraj Chandrasekaran

Zero Trust Network Architecture is necessary to enable identity & context-based access control, geo-fencing, device security check, and network obfuscation for workforce connecting from anywhere and everywhere. In this presentation by Versa, Suraj will show how organizations can protect access in a post-pandemic world.


Versa Networks Intro and SASE Defined

Event: Security Field Day 6

Appearance: Versa Networks Presents at Security Field Day 6

Company: Versa Networks

Video Links:

Personnel: Kelly Ahuja, Michael Wood

In this video, hear the story of Versa Networks origins, their mission, and the overview of Versa SASE which is delivered via the cloud, on-premises, or as a blended combination of both.


Using Swimlane Low-Code Security Automation to Solve Cross-Departmental Security Use Cases

Event: Security Field Day 6

Appearance: Swimlane Presents at Security Field Day 6

Company: Swimlane

Video Links:

Personnel: Bryon Page, Cody Cornell

This real-world use case highlights how a Swimlane Fortune 500 financial services customer matured its implementation of low-code security automation beyond common SOAR use cases and the SOC. Swimlane’s Bryon Page (Director Solutions Architecture) and Cody Cornell (Co-founder and Chief Security Officer) showcase how Swimlane is used across departments to build workflows that update security controls for users and devices preemptively based on pre-existing company procedures.


Threat Hunting and Automatically Responding to Credential Compromises with Swimlane

Event: Security Field Day 6

Appearance: Swimlane Presents at Security Field Day 6

Company: Swimlane

Video Links:

Personnel: Bryon Page, Cody Cornell

This real-world use case highlights how a Swimlane Fortune 500 financial services customer encountered a sophisticated phish attempt using credentials exposed on the Dark Web. Swimlane’s Bryon Page, director of solutions architecture, and Cody Cornell, co- founder and chief security officer, demonstrate how the SecOps team extended its use of low-code security automation (SOAR) from Swimlane by integrating a credential compromise monitoring service to reduce the likelihood of future compromises.


Automating Phishing Analysis and Response with Swimlane

Event: Security Field Day 6

Appearance: Swimlane Presents at Security Field Day 6

Company: Swimlane

Video Links:

Personnel: Bryon Page, Cody Cornell

This real-world use case highlights the initial phase of how a Swimlane Fortune 500 financial services customer navigated from a security event and phishing awareness training, to implementing low-code security automation (SOAR). Swimlane’s Bryon Page, director solutions architecture, and Cody Cornell, co-founder and chief security officer, showcase the details and data on phishing attempts and MTTR, and walk-through a live demo of enabling case management and automation workflows to accelerate response.


Cloud-Scale, Low-Code Security Automation from Swimlane

Event: Security Field Day 6

Appearance: Swimlane Presents at Security Field Day 6

Company: Swimlane

Video Links:

Personnel: Cody Cornell

Swimlane low-code security automation goes beyond just SOAR to improve how security teams overcome process and data fatigue, and chronic staffing shortages. Swimlane unlocks the potential of automation beyond the SOC by serving as a system-of-record for the entire security organization. In this presentation, co-founder and chief strategy officer Cody Cornell introduces Swimlane and how the company his helping organizations more-effectively implement security automation.


Betacom 5GaaS Security with Ravinder Jarral

Event: Security Field Day 6

Appearance: Betacom Presents at Security Field Day 6

Company: Betacom

Video Links:

Personnel: Ravinder Jarral

This presentation details Betacom 5GaaS end to end security. Ravinder reviews how security is part of every step in the Plan, Design, Install, and Operate Betacom methodology. Zero trust design principles and separate communication channels are discussed. The Betacom Security and Service Operations Center (SSOC) is the key to managed security.


4G and 5G Security with Betacom

Event: Security Field Day 6

Appearance: Betacom Presents at Security Field Day 6

Company: Betacom

Video Links:

Personnel: Ravinder Jarral

In this presentation, Ravinder Jarral provides an overview of 4G/5G security. He highlights the multi-layered approach, as well as reviews common threats and mitigations in private networks


Betacom Overview with Brian Watkins

Event: Security Field Day 6

Appearance: Betacom Presents at Security Field Day 6

Company: Betacom

Video Links:

Personnel: Brian Watkins

Betacom plans, designs, installs and operates private networks using dedicated CBRS wireless spectrum. Betacom 5G As-A-Service is the industry’s first fully managed private wireless service. In this presentation, Brian Watkins introduces Betacom, discusses Private 5G Networks, and describes Smart Airport use cases.


Intel FIDO Device Onboard (FDO)

Event: Security Field Day 6

Appearance: Intel Presents at Security Field Day 6

Company: Intel

Video Links:

Personnel: Geoff Cooper, Richard Kerslake

Onboarding and provisioning of IOT devices is the first critical step in the deployment of new industrial or enterprise systems. Currently this is often handled manually – an approach that is expensive, time consuming and insecure. A new industry standard – FIDO Device Onboard is now available to specifically address these challenges by offering an automated and more secure approach. In this paper we will review the onboarding challenge, discuss how FDO works and talk about open source software implementations available that implement FDO.


Intel How Ethical Facial Recognition Can Identify Security Threats in Real Time

Event: Security Field Day 6

Appearance: Intel Presents at Security Field Day 6

Company: Intel

Video Links:

Personnel: Mark Sadler, Ziv Tsarfati

Facial recognition offers tremendous benefits to businesses and society when used effectively and responsibly. It’s a convenient way to unlock your phone or enter your office space, but it’s becoming more controversial. As with any new technology, valid questions have been raised and concerns voiced about facial recognition’s application and shortcomings.

In this session, AnyVision will showcase its ground-breaking technology and demonstrate how ethical facial recognition is being used today by modern enterprises for watchlist alerting — identifying security threats and VIPs in real-time by comparing pictures from live video streams against a defined list of “”persons of interest.”” This same technology is also fueling a revolution in touchless access control to open guarded points of entry with biometric-based, friction-free authorization. AnyVision is working closely with Intel utilizing Intel® Distribution of OpenVINO™ toolkit to unlock advanced vision capabilities and ease budgetary strains for enterprise customers.


Confidential Computing with Intel & Fortanix

Event: Security Field Day 6

Appearance: Intel Presents at Security Field Day 6

Company: Intel

Video Links:

Personnel: Ambuj Kumar, Jesse Schrater

The intersection of data transformation and emerging cybersecurity threats is driving a massive up-tick in regulations and the need for real protections for maintaining the confidentiality and integrity of data. Confidential Computing addresses this next frontier by protecting code and data while being processed in memory, especially applicable for sensitive workloads and Multi-party Compute scenarios across Healthcare, Financial Services, Government, Public Cloud. Enabled by hardware and optimized by software, Intel and Fortanix are leading the way with proven and deployed solutions. For more information, visit http://www.intel.lv/Intel-Fortanix


Cisco Innovations in Industrial Switching and Security

Event: Security Field Day 6

Appearance: Cisco Presents at Security Field Day 6

Company: Cisco

Video Links:

Personnel: Dan Behrens

Visibility is imperative to enable organizations to define and deploy security policies in industrial environments. In this session, Cisco dives into how they are developing innovations to provide rich industrial visibility and enable the ability to effectively deploy Enterprise Security solutions.


Cisco Security: Zero Trust and Secure Access Service Edge (SASE)

Event: Security Field Day 6

Appearance: Cisco Presents at Security Field Day 6

Company: Cisco

Video Links:

Personnel: Brian Verenkoff, Jamey Heary

This session explores some of the new offerings, advancements, and strategy of Cisco SASE and Zero Trust. You will be the first to see a demo of the advancements Cisco has made in ZTNA, passwordless, and you’ll see a demo of their brand new single segmentation policy engine.


Cisco Treasure Hunt: An Exploration of Threat Hunting

Event: Security Field Day 6

Appearance: Cisco Presents at Security Field Day 6

Company: Cisco

Video Links:

Personnel: Eric Hulse

Threat hunting has become quite mainstream over the past several years, but what is it and should your organization be doing it? In this session, Cisco dives into threat hunting as a concept, explores real world findings and the concepts of threat hunting. You’ll also see a few lessons learned from building a global platform, hunting across thousands of Cisco customers.


Cisco SecureX vs. the Acronyms

Event: Security Field Day 6

Appearance: Cisco Presents at Security Field Day 6

Company: Cisco

Video Links:

Personnel: Ben Greenbaum

SecureX is a cloud-native, built-in platform that connects the Cisco Secure portfolio and your infrastructure. It allows you to radically reduce dwell time and human-powered tasks. In this session, you’ll learn how and why SecureX compares to the hot topic of the moment.


Defending OT Environments with the Juniper Converged Industrial Edge

Event: Security Field Day 6

Appearance: Juniper Networks Presents at Security Field Day 6

Company: Juniper Networks

Video Links:

Personnel: Mike Spanbauer, Robert Tafoya

If anything has become clear from the cyberattacks this past year, it’s that critical infrastructure must be better protected. The Converged Industrial Edge automates and protects these environments from targeted attacks while maintaining uptime in trifecta of reliable connectivity, threat intelligence, and precision enforcement.


DDoS plus C2 Protection with Juniper MX + Corero & SecIntel

Event: Security Field Day 6

Appearance: Juniper Networks Presents at Security Field Day 6

Company: Juniper Networks

Video Links:

Personnel: Irene Zhang, Laurent Paumelle

Juniper doesn’t believe in routers as “dumb pipes” but instead that they can be used to detect and stop attacks. Find out how Juniper’s most widely-deployed MX Series router can stop volumetric DDoS attacks and block command-and-control communications to & from malicious servers.


Cover Your Apps with Juniper Cloud Workload Protection

Event: Security Field Day 6

Appearance: Juniper Networks Presents at Security Field Day 6

Company: Juniper Networks

Video Links:

Personnel: Krystle Portocarrero, Laurent Paumelle

No application is invulnerable to attack, and all applications could use a safety net to help keep them secure, especially in production. Juniper Cloud Workload Protection does exactly that and integrates with the rest of your Zero Trust data center.