Kemp Demo Ransomware Detection & Response

Event: Security Field Day 5

Appearance: Kemp Presents at Security Field Day 5

Company: Kemp

Video Links:

Personnel: Pavel Minarik

A complex network compromise scenario evolving from initial exploitation through lateral movement, data hoarding and exfiltration over an alternative protocol followed by the final impact through data encryption. Detection of individual indicators of compromise within the network traffic flows as the attack is progressing allows the security operator to respond properly and on time.


Kemp Demo User Account Compromise

Event: Security Field Day 5

Appearance: Kemp Presents at Security Field Day 5

Company: Kemp

Video Links:

Personnel: Pavel Minarik

In-depth walkthrough of the system capabilities on a single use case. Detection of a user account compromise and event evidence ranging from aggregated network telemetry through signature-based detection and full packet data with built-in out-of-the-box packet analysis.


Kemp Flowmon Technical Architecture

Event: Security Field Day 5

Appearance: Kemp Presents at Security Field Day 5

Company: Kemp

Video Links:

Personnel: Pavel Minarik

Kemp’s Flowmon network detection & response architecture, components, input data, detection techniques, algorithms and alignment with MITRE ATT&CK framework. Response to threats and further integration to cyber security technology stack.


Kemp Principals & Approaches for Network Threat Detection

Event: Security Field Day 5

Appearance: Kemp Presents at Security Field Day 5

Company: Kemp

Video Links:

Personnel: Jason Dover

Successful threat detection is a multi-layered approach that requires the right tools, methods and approaches. There’s no single magic bullet but with the right building blocks (including a scalable NDR solution), organizations can be successful in detecting and preventing exploits by extracting the insights from the network.


Kemp Company Overview with Jason Dover

Event: Security Field Day 5

Appearance: Kemp Presents at Security Field Day 5

Company: Kemp

Video Links:

Personnel: Jason Dover

Kemp powers the always-on application experience that enterprises and service providers need to succeed. Kemp has redefined load balancing and network visibility simplified deployment options, flexible licensing, and top-rated technical support. Kemp has more than 100,000 deployments in 138 countries.

Kemp’s product portfolio is centered on helping customers deliver the best possible application experience by addressing the requirements of modern application load balancers, network visibility, and response to emerging security threats in the network. The core components of this portfolio are the LoadMaster ADC & WAF, Flowmon NPMD and Flowmon ADS.


Juniper Threat Labs with Mounir Hahad

Event: Security Field Day 5

Appearance: Juniper Networks Presents at Security Field Day 5

Company: Juniper Networks

Video Links:

Personnel: Mounir Hahad

What good is threat research unless you can actually do something with it? Juniper Threat Labs does the research, experiments with new detection techniques, and puts all that knowledge back into Juniper’s security products and services.


Juniper Networks Security Director Insights

Event: Security Field Day 5

Appearance: Juniper Networks Presents at Security Field Day 5

Company: Juniper Networks

Video Links:

Personnel: Madhura Kumar

If the network plays a key role in security, then network telemetry plays a key role in attack analytics and orchestration. Security Director Insights correlates threat detections and network anomalies and maps them to MITRE.


Juniper Networks Workload Protection with K2 Cybersecurity and vSRX

Event: Security Field Day 5

Appearance: Juniper Networks Presents at Security Field Day 5

Company: Juniper Networks

Video Links:

Personnel: Kedar Dhuru, Laurent Paumelle

Your applications are 100% part of the network, even if you don’t own the cloud they’re in. Juniper vSRX natively integrates with K2 Cyber to secure the workload and deliver attack intelligence to the next-gen firewall to keep your defenses ironclad.


Juniper Networks Risk Profiling with ATP Cloud and Mist AI

Event: Security Field Day 5

Appearance: Juniper Networks Presents at Security Field Day 5

Company: Juniper Networks

Video Links:

Personnel: Krystle Portocarrero

Risk Profiling integrates the threat intelligence of ATP Cloud with Mist Wired & Wireless access points and AI technology. Every connecting device is a potential risk to the network, and Risk Profiling surfaces that risk so you can decide how to best handle it.


Juniper Networks Adaptive Threat Profiling with ATP Cloud

Event: Security Field Day 5

Appearance: Juniper Networks Presents at Security Field Day 5

Company: Juniper Networks

Video Links:

Personnel: Dwann Hall

ATP Cloud is the threat intelligence hub for the network and through Adaptive Threat Profiling mobilizes the entire fleet of firewalls when a targeted attack is detected. Lovingly referred to as the “no-fly list” for your network.


Juniper Connected Security Overview with Kate Adam

Event: Security Field Day 5

Appearance: Juniper Networks Presents at Security Field Day 5

Company: Juniper Networks

Video Links:

Personnel: Kate Adam

Networking & security are converging, and Juniper Networks is here for it! Juniper’s Connected Security strategy is all about extending security to all points of connection the network.


DNS Security Roundtable: Emerging Threats and New Responses

Event: Security Field Day 5

Appearance: DNS Security Roundtable with EfficientIP

Company: EfficientIP

Video Links:

Personnel: Alexandre Chauvin-Hameau, Tom Hollingsworth

Join the Security Field Day delegates and a special guest from EfficientIP with a forward looking discussion about emerging threats that utilize and leverage DNS and how research from EfficientIP is helping to stem the tide of these kinds of attacks.


DNS Security Roundtable: IoT and DNS Security

Event: Security Field Day 5

Appearance: DNS Security Roundtable with EfficientIP

Company: EfficientIP

Video Links:

Personnel: Alexandre Chauvin-Hameau, Tom Hollingsworth

Join the Security Field Day delegates and a special guest from EfficientIP for a discussion of the rise of Internet of Things (IoT) devices and ways that networking and security administrators can help secure communications and limit the attack surface of these devices with help from DNS.


DNS Security Roundtable: DNS-over-HTTPS Discussion

Event: Security Field Day 5

Appearance: DNS Security Roundtable with EfficientIP

Company: EfficientIP

Video Links:

Personnel: Alexandre Chauvin-Hameau, Tom Hollingsworth

Join the Security Field Day delegates and a special guest from EfficientIP as they discuss the latest security protocol to attempt to secure DNS, DNS-over-HTTPS. Does it help? Or is it more trouble than it’s worth?

In this roundtable discussion, the panel delves into the complexities and implications of DNS-over-HTTPS (DoH) as a security measure for DNS traffic. While DoH aims to secure DNS queries by encrypting them over HTTPS, it presents significant challenges, particularly for enterprise environments. The panelists highlight that DoH can disrupt existing cybersecurity tools and practices, such as packet inspection and DNS filtering, which are crucial for maintaining network security and preventing access to malicious sites. They also discuss the potential performance issues and the centralization of DNS traffic, which could make it easier for entities like Google or Cloudflare to collect and analyze user data. The conversation touches on the need for enterprises to manage and possibly disable DoH to maintain control over their DNS traffic, while also considering alternatives like DNS-over-TLS (DoT). The discussion underscores the importance of having a trusted resolver infrastructure and the complexities of implementing such protocols in both corporate and home environments. The panel concludes by contemplating the need for best practices and standards to guide the secure implementation of these new protocols, balancing the benefits of encryption with the practical needs of network management and security.


Deep Dive into Cisco NCS 500 Series with David Jakl

Event: Networking Field Day 23

Appearance: Cisco Presents at Networking Field Day 23

Company: Cisco

Video Links:

Personnel: David Jakl

Access networks are under pressure as they have to handle more traffic, deliver new services, offer a premium customer experience while mitigating ever-increasing security threats. Discover the new NCS 500 Series access platforms and how they can help you handle these challenges with peace of mind.


Hands On with Oracle Cloud and Oracle Cloud VMware Solution

Event: Cloud Field Day 10

Appearance: Oracle Cloud Presents at Cloud Field Day 10

Company: Oracle

Video Links:

Personnel: Lionel Cave

Demos of Oracle Cloud Infrastructure, Oracle Cloud Shell, Terraform, and Oracle Cloud VMware Solution, including a live migration using VMware HCX.


Oracle Cloud VMware Solution Technical Overview

Event: Cloud Field Day 10

Appearance: Oracle Cloud Presents at Cloud Field Day 10

Company: Oracle

Video Links:

Personnel: Steven Nelson

A technical overview of Oracle Cloud VMware Solution from Steve Nelson. “It’s just VMware” — and it satisfies enterprise customer needs for control and compatibility. OCI’s off-box virtualization and L2 network enable the VMware environment to be a full participant in Oracle Cloud.


Oracle Cloud Infrastructure: Automated & Autonomous

Event: Cloud Field Day 10

Appearance: Oracle Cloud Presents at Cloud Field Day 10

Company: Oracle

Video Links:

Personnel: Todd Sharp

A live coding and deployment demo on Oracle Cloud from Developer Advocate Todd Sharp. In this session, you’ll learn how Oracle Cloud enables automation via support for Infrastructure as Code using Terraform, and how it increases developer productivity with Autonomous Database.


Oracle Cloud Infrastructure: Designed to Fit Your Applications

Event: Cloud Field Day 10

Appearance: Oracle Cloud Presents at Cloud Field Day 10

Company: Oracle

Video Links:

Personnel: Leo Leung

An overview of Oracle Cloud Infrastructure, its evolution, and its capabilities. OCI was designed to satisfy the needs of enterprise applications with high performance, lower costs, a rich set of cloud services, and with security and automation built in. Presented by Leo Leung, Senior Director Product Management, Oracle.


VMware Cloud Foundation on VxRail from Dell Technologies

Event: Cloud Field Day 10

Appearance: Dell Technologies Presents at Cloud Field Day 10

Company: Dell Technologies

Video Links:

Personnel: Samuel Niemi

VxRail is the only jointly-engineered HCI system with deep VMware Cloud Foundation integration, but what else makes it different? Sam Niemi, Product Management Consultant for Dell Technologies, discusses the unique benefits of VMware Cloud Foundation on VxRail integration, automation, and lifecycle management.