Avoiding the Security Pitfalls of SD-WAN and Network Modernization
Tuesday, February 12, 2019
11:00 am New York / 4:00 pm London
Companies of all sizes are modernizing their networks to meet today’s business demands. These networks need to be increasingly high-performance, cost-effective, and flexible. The benefits of SD-WAN are indisputable. However, security is the top network concern for companies – and for good reason -- security needs to keep pace with the changing network. Many network modernization solutions such as SD-WAN are creating critical security vulnerabilities that must be addressed. By attending this webcast, you will:
- Understand what top security vulnerabilities are plaguing companies as they modernize their networks
- Learn how critical security vulnerabilities can be easily addressed with security-as-a-service
- See how cloud and automation are enabling companies to simplify their ability to modernize their networks and security
Rik Turner, Principal Analyst, Ovum
close this window
Rik is a principal analyst in Ovum's IT Security and Technology team, specializing in cybersecurity technology trends, IT security, compliance, and call recording.
Rik provides analysis and insight on market evolution and helps end users determine what type of technology and which vendor they should be pursuing.
Rik has also worked in Ovum's Financial Services Technology team, with a specialization in capital markets technology. Prior to joining Ovum, he worked as an IT journalist, specializing in networking and security, and as a foreign correspondent in Brazil, where he worked, among others, for the Financial Times and The Economist.
Ken Ammon, Chief Strategy Officer, OPAQ
close this window
A recognized technology executive and expert in security issues, Ken leads the corporate strategy, technology vision, and partnerships for OPAQ. Prior to OPAQ, Ken served alongside CEO Glenn Hazard as the Chief Strategy Officer at Xceedium, a privileged access management product company acquired by CA Technologies in 2015. Before joining Xceedium, Ken founded and served as president of NetSec, a leading managed security service provider (MSSP). After selling NetSec to Verizon Business Systems, Ken accepted the role of senior vice president with the communications and IT-solutions giant. Prior to founding NetSec, Ken was with Trusted Computer Solutions, which was acquired by Raytheon.
Specializing in security matters relating to the federal government, Ken has testified before the House Government Reform Committee on dramatic security vulnerabilities affecting sensitive government information and infrastructure. Ken also has served as an adjunct faculty member at the National Cryptologic School, where he was recognized with the Scientific Achievement Award. He began his career in the U.S. Air Force, where he was a captain assigned to the U.S. National Security Agency.
Bernd Steinwender, Head of Product Management, NTS Retail
close this window
Bernd is currently the Head of Product Management at NTS.
His career at NTS Retail started 2001 when he was working as a technical engineer. After that he became a project manager for many telco projects he then moved forward to the key account management. With this background he was appointed to become the Head of Product Management.
The educational background includes finalizing a higher technical school in electrical engineering and a graduate in Computer science at the JKU – Johannes Kepler University Linz in 2000..
Katharine Hulls, Vice President Marketing, Celebrus Technologies
close this window
As VP Marketing for Celebrus Technologies, Katharine is responsible for global marketing and communications, both direct to end-users and via a worldwide network of partners. This responsibility includes the development and execution of joint marketing activities with key partners, messaging and proposition creation, product marketing, digital marketing, content marketing and analyst relations.
Katharine has over 20 years’ marketing management experience with a strong focus on data and analytics software and services providers. Before joining Celebrus in July 2011, Katharine was Head of Marketing, EMEA for Experian Marketing Services which encompasses brands such as CheetahMail, QAS, Hitwise and Mosaic. Earlier during her tenure at Experian, Katharine was also Head of Marketing for CheetahMail across EMEA and UK/Ireland.
Prior to her three years at Experian, Katharine worked for predictive analytics software vendor SPSS, before their acquisition by IBM, where she led and reshaped the UK Marketing team and was part of the EMEA Marketing Management group. Previous to that, Katharine was responsible for marketing communications across EMEA and APAC for web security company Websense, and before that she held a variety of global and EMEA marketing management roles at industry analyst Gartner. Katharine started her marketing career at Sony.
Katharine holds a BA (Hons) from the University of London and the Chartered Institute of Marketing’s Postgraduate Diploma.
Peter Dorrington, European Head of Customer Insight, TeleTech Consulting
close this window
Peter is a specialist in information strategy, big data and customer analytics. He has formed and led a high performing analytics team in an Analytics Centre of Excellence and worked with a wide range of organisations across Europe. Peter has supported senior executives in preparing strategies and plans for the exploitation of big data and analytics as well as led governance and project offices of large scale analytics deployments in both traditional and digital environments and across multiple sectors.
San Zaw, Head of Pre-Sales, Asia at TIBCO Software Inc.
close this window
San Zaw is the Director of Solutions Consultants in Asia at TIBCO Software. Based in Singapore, San leads the regional pre-sales teams across South East Asia, Greater China, and Korea, and is responsible for the solution sales business growth in the Asia region.
He is a practitioner in Contextual Event Processing and Digital Services, and works with Asia’s leading Financial Services Institutions and Communications Service Providers on architecting game-changing solutions, and delivering differentiated customer experiences.
A seasoned veteran in the Telecommunications industry, San is a regular speaker and thought leader at financial and mobility innovation circles. His interests include helping enterprises monetize on their digital ecosystem, exposing businesses to the API economy, and advocating of live behaviour and lifestyle monetization with Fast Data (live insight-to-action).
San brings over two decades of experience in the field of InfoComm Technology and built a track record in solving complex business challenges for enterprises ranging from Telco, Banking, Transportation & Logistics, Healthcare, Gaming, to Defense and Statutory bodies. During his career at TIBCO, he has helped spearhead the development of the business in the emerging markets across Asia.
Prior to TIBCO, San has worked with Deutsche Telekom AG on tele-commerce initiatives, and with StarHub Ltd where he helped build the managed services consulting practice.
Webinar Archive Registration
To register for this webinar, please complete the form below. Take care to provide all required information (indicated in red
). Press Register
to complete your registration. If you have already registered for our site or for one of our webinars, you may login
to register without re-entering your information.
But to prepare for something usually means you have an idea about what you are preparing for, no?
An emerging and increasingly sophisticated threat campaign is employing obscure file formats.
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
Dan Reis chats to Cybera's Josh Flynn about how to achieve digital transformation without sacrificing security.
An IoT device carries with it the implicit threat of being used for nefarious purposes if it has not been created with security foremost in mind.
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity.
An interview with Steve Grobman, CTO of McAfee