Security Day
Explore the changing security landscape. VMUG's online virtual event will deliver a highly interactive, 3-D virtual environment with live video-streaming keynote and breakout sessions with speaker Q&A, on-demand breakout sessions, and interactive partner exhibits within the show floor. Experience this free, can’t-miss virtual event from anywhere in the world – without leaving your home or office! We’ve assembled an entire crew of experts who are ready to share their knowledge to help you succeed.
The VMware vSphere Engineer was born with the introduction of VMware Infrastructure 3 (VI3). VI3 took data centers by storm and radically changed the way infrastructure would be designed. As the popularity of VMware and virtualized workloads took off the vSphere Engineer evolved into a critical role in the IT organization. Fast forward to today, we find that virtualized workloads are a given and a new set of business challenges is upon us. This session will show you how the vSphere engineer is not just a critical part of solving modern day enterprise challenges but is positioned as the single most important part of these solutions. Chris McCain Keeping your organizations workloads and data secure can be a moving target. Adherence to consistent, proven security fundamentals helps to mitigate security risk by reducing the exposed attack surface. Compliance against CIS benchmarks provide an effective way to enforce security controls and provide a strong foundation to many industry standard frameworks. Effective multi-cloud compliance requires a programmatic approach that supports multiple cloud providers, allows for framework customization, and delivers continuous, automated configuration remediation. Dave Giles Defending vSphere and virtual infrastructure is a little different than defending workloads. Let's talk about what VMware is seeing as threats to virtual environments, as well as tools, design techniques, and security features in server hardware, ESXi installations, and vSphere that make environments resilient to these attacks now and into the future. Bob Plankers Lots of organizations have a group called 'Information Security' but, more and more, it seems that the work for security actually ends up with the system administrators & infrastructure teams. The truth is that we can complain about it (and we probably will, regardless of what happens! Ha!), or we can choose to use it as an opportunity to grow. Join Bob Plankers as he talks about the transition from being just a sysadmin to seeing the larger security picture, choosing to be PART of the security process rather than having security & compliance simply done TO you. We'll joke a bit, use a bunch of memes, but also talk seriously about what infosec does, and what resources, strategies, and attitudes you'll need to change your direction. Bob Plankers Cryptomining attacks are a growing concern for organizations relying on Kubernetes to manage their containerized applications. In this session we will explore the latest advancements using VMware Carbon Black to effectively detect and prevent these attacks. Join us as we examine a real-world scenario where an active Monero (XMR) crypto-mining attack is deployed on a Kubernetes cluster. We will also discuss different policy settings to mitigate crypto-mining attacks, such as blocking privileged pods, setting CPU/MEM limits, and enforcing trusted registry policies. Joshua Knox Oracle Cloud VMware Solution (OCVS) combined with the market-leading capabilities of VMware Horizon gives a simple, secure, and scalable solution, that can easily address use cases such as on-demand capacity, disaster recovery, and cloud co-location without buying additional data center resources. Join Oracle and VMware to learn: Henry Villegas Jonathan Copeland Security doesn’t have to be an overwhelming task. In this session, Rick Vanover from Veeam will highlight 5 very effective security changes to give you a lot of mileage in regards to the security of your vSphere backup environment. The best part is that these principles will apply to nearly any backup configuration while aligning to consistent fundamentals across the backup industry. Everyone will learn something! Rick Vanover Kirsten Stoner Dell PowerProtect solutions and services provide the highest levels of protection, integrity and confidentiality for your most valuable VMware data and critical business systems. Learn how we ensure you can quickly protect and recover your critical data across your VMs, containers and multicloud infrastructure after a disruptive event to reduce business risk and resuming normal business operations. Lindsey Pooley Did you know that there are ransomware attacks that attempt to directly attack ESXI? This talk will focus on how to secure your vSphere Environment from Ransomware. We'll talk about VMware's recommendations for locking down Multiple layers of to prevent Ransomware and recover from it. Bryan Sullins Tips on security in a cyber space from an incident survivor Steve Athanas Network and security virtualization is the key to accomplishing the cloud dream of agile, elastic, and on-demand infrastructure. The most prominent organizations in the world adopted NSX as a core building block to implement their cloud platform. No other networking and security solution has unlocked the potential of virtualization to scale across the boundaries imposed by traditional network architecture based on hardware solutions.This session covers the adoption of VMware NSX as a platform in any organization, small to global. We will cover design choices based on customers' use cases and requirements. This topic is vast, but we will provide a taste of the potentiality of NSX based on our experience working with small and large customers across the globe. Luca Camarda In this session, you will learn the basics of protecting your identity, home, and family. You will learn about how phishing, vishing, identity theft, and data breaches are working and how phishing, vishing, identity theft, and data breaches work against you and your family. This will dive into some of the simple solutions that can be done to help protect you from the most common attacks. This has been presented at a couple of VMUGs with great reviews. Patrick Coble Cloud adoption has been a puzzling trend in IT for over a decade. Even today, how to adopt the cloud as part of your businesses IT strategy isn’t a straightforward, never mind adopting multiple! And how do you keep them secure? It's almost every day we hear how Ransomware has taken down the most critical part of any business...the application. No matter what cloud you use, one thing that is common is keeping applications critical to the business online. This requires a software-based disaster recovery solution designed with Ransomware Resilience and is built with multi-cloud in mind. In this session, we discuss how Zerto can help keep your VMware environment secure with the new encryption detection capability and how this extra layer of security enables this idea of multi-cloud mobility. Anthony Dutra In this session, IGEL’s Field CTO, Jason Mafera will discuss how using IGEL’s secure OS on your endpoints paired with VMware Horizon can eliminate your ransomware challenges. Learn how centralizing Windows desktops and applications with Horizon combined with deploying IGEL OS at the UserEdge enhances security and delivers huge ROI to IT teams. IGEL OS combined with Horizon enables rapid recovery following a compromise, allowing you to keep your business up and running while others are at a standstill wrestling with ransomware recovery. All while providing a seamless Digital Employee Experience. Jason Mafera We've all heard that scary message: Your files have been encrypted! Security incidents', such as Ransomware, continue to make news headlines and the momentum is not slowing down. In this breakout session, hear from the VMware Security Response Center on the structure behind VMware Security Advisories (VMSAs), SaaS mitigation, customer outreach campaigns and why it is important to carry out the guidance published. In addition, hear from the team's perspective on common misconceptions, preventative strategies that are often overlooked or missing at the time of a crisis. Join along in this informative session understanding what VMware Security Response currently offers to your product suite. In addition, arm yourself with the necessary questions to take back to your business around preventative measures and how you can be involved in the next planning discussion. Kevin Hagopian This lab contains 7 modules that focus on getting started with the NSX-T platform. We will show administrators how they can execute the configuration of network and security settings. This includes the provisioning of logical segments, logical routers and security associated. Discover how you can evolve your application security with NSX Advanced Load Balancer's intelligent WAF, DDoS, and Bot Management features.Agenda
LIVE VMware Keynote: The Evolution of the vSphere Engineer
Technologist Director, Networking & Security, VMwareVMware Session: Enforcing Multi-Cloud Security Compliance
Staff Cloud Solutions Architect, VMwareCommunity Session: Hardening Your vSphere Infrastructure
Staff Technical Marketing Architect, VMwareVMware Session: You Want Me To Do What: The Expanding Role of Sysadmins in Security
Staff Technical Marketing Architect, VMwareVMware Session: Cryptomining in Containers: Securing Kubernetes with Automation
Senior Cybersecurity Stategist, VMwarePartner Session: Seamlessly Deliver Desktops and Apps in a Hybrid Cloud Model I Oracle
Principal Cloud Architect, Oracle
Cloud Architect, VMwarePartner Session: 5 Simple Changes for Big Security Improvements for a vSphere Backup Infrastructure I Veeam
Senior Director of Product Strategy, Veeam
Technologist, VeeamPartner Session: Is your Critical Virtual Infrastructure Fortified Against Cyberattacks? Dell PowerProtect can help | Dell Technologies
Senior Advisor, Product Marketing for VMware Server at Dell TechnologiesVMware Session: Ransomware: It's Worse Than You Think!
Senior Solution Engineer, VMwareCommunity Session: Top Security Tips from an Incident Survivor
Associate CIO, System Architecture, UMass LowellVMware Session: End-to-end Network & Security Design with NSX
Sr. Technical Production Manager - Solution, VMwareCommunity Session: Practical Privacy 101
Senior Security & EUC Architect, VDISECPartner Session: Ransomware Resilience for VMware in a Multi-Cloud World I Zerto
Technical Marketing Engineer, ZertoPartner Session: IGEL and VMware Horizon – Protecting Business Operations and Eliminating Ransomware at the UserEdge | IGEL
Field CTO, NA, Intel Your files have been encrypted! Arming yourself against Ransomware
Security Response Technical Program Manager - High Profile Incident Response, VMwareHOL-2225-01-NET NSX-T Networking Fundamentals
HOL-2337-03-NET Boost App Security with NSX Advanced Load Balancer (Avi) WAF
This lab contains 7 modules that focus on getting started with the NSX-T platform. We will show administrators how they can execute the configuration of network and security settings. This includes the provisioning of logical segments, logical routers and security associated.
Discover how you can evolve your application security with NSX Advanced Load Balancer's intelligent WAF, DDoS, and Bot Management features.