SlideShare a Scribd company logo
1 of 1
Download to read offline
Topic of Discussion: Securing todays advanced virtual hybrid data centers
Join CenturyLink in a security round table discussion with the industry’s leading security technology providers.
CenturyLink • Cisco • Fortinet • Palo Alto • RiskSense •
You are invited: Cybersecurity Round Table
RSVP Today CLICK HERE
Anopenforumforsecurityprofessionals
Don’t miss the chance to interact with the industry’s top security
technology providers.
Network with other security professionals in your industry while you
learn about the latest security technology trends.
Food & drinks provided
Promotional Give Aways:
- CenturyLink AppDev Kit
- Trial Licenses to the latest virtual firewalls
- 4 hour cyber security workshop
Where:
SkySong ASU Technology Park
Building #3 Synergy Room 1 & 2
1475 N Scottsdale Rd,
Scottsdale, AZ 85257
When:
Tuesday April 12, 2016 at 9:00 AM to 1:00 PM (MDT)
How to RSVP:
CenturyLink Business the all-in-
one platform that delivers
high-performance, secure,
reliable and scalable IT solutions
for all workloads.
www.ctl.io
www.centurylink.com/business
TopicsofDiscussion:
- Centurylink Cybersecurity Services and Analysis
- Cyberthreat State of the Union Analysis
- Vendor Specific Threat Analysis and Response
- Securing Hybrid Cloud Networks
- Meeting Security Regulatory Requirements
- The Future of Cyber Attacks
CenturyLink • Cisco • Fortinet • Palo Alto • RiskSense •

More Related Content

What's hot

SCEPublicSectorImtechWall2
SCEPublicSectorImtechWall2SCEPublicSectorImtechWall2
SCEPublicSectorImtechWall2
Steve Tester
 

What's hot (20)

Risk based approach to managing privacy (EDPD 2015)
Risk based approach to managing privacy (EDPD 2015)Risk based approach to managing privacy (EDPD 2015)
Risk based approach to managing privacy (EDPD 2015)
 
The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016
 
Horizon introduction
Horizon introductionHorizon introduction
Horizon introduction
 
Internet of Things - how secure is it?
Internet of Things - how secure is it?Internet of Things - how secure is it?
Internet of Things - how secure is it?
 
Securing Your Business #3 - Role Of The Service Provider
Securing Your Business #3 - Role Of The Service ProviderSecuring Your Business #3 - Role Of The Service Provider
Securing Your Business #3 - Role Of The Service Provider
 
Securing Your Business #2 - Role Of The Vendor
Securing Your Business #2 - Role Of The VendorSecuring Your Business #2 - Role Of The Vendor
Securing Your Business #2 - Role Of The Vendor
 
Splc18 flyer
Splc18 flyerSplc18 flyer
Splc18 flyer
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
Confessions of a CIO
Confessions of a CIOConfessions of a CIO
Confessions of a CIO
 
Cisco Live Cancun Collaboration Press
Cisco Live Cancun Collaboration PressCisco Live Cancun Collaboration Press
Cisco Live Cancun Collaboration Press
 
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
Webinar: The role of Threat Intelligence Feeds in the battle against evolving...
 
Baiba Kaskina - "Responsible Disclosure Policy" at Security focused 33rd DevC...
Baiba Kaskina - "Responsible Disclosure Policy" at Security focused 33rd DevC...Baiba Kaskina - "Responsible Disclosure Policy" at Security focused 33rd DevC...
Baiba Kaskina - "Responsible Disclosure Policy" at Security focused 33rd DevC...
 
SCEPublicSectorImtechWall2
SCEPublicSectorImtechWall2SCEPublicSectorImtechWall2
SCEPublicSectorImtechWall2
 
IMS Windows XP Webinar Presentation
IMS Windows XP Webinar PresentationIMS Windows XP Webinar Presentation
IMS Windows XP Webinar Presentation
 
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
 
IBM Secret Key management protoco
IBM Secret Key management protocoIBM Secret Key management protoco
IBM Secret Key management protoco
 
Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...
Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...
Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...
 
The Key to Strong Cloud Security
The Key to Strong Cloud SecurityThe Key to Strong Cloud Security
The Key to Strong Cloud Security
 
Kubernetes Secrets Management - Securing Your Production Environment
Kubernetes Secrets Management - Securing Your Production EnvironmentKubernetes Secrets Management - Securing Your Production Environment
Kubernetes Secrets Management - Securing Your Production Environment
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
 

Similar to CSRT_PHX_V3_12APRIL16

Overview Brochure - Executive Briefing_0
Overview Brochure - Executive Briefing_0Overview Brochure - Executive Briefing_0
Overview Brochure - Executive Briefing_0
Brian Hamilton
 

Similar to CSRT_PHX_V3_12APRIL16 (20)

Upcoming Event: Wonderware Next Generation Conference
Upcoming Event: Wonderware Next Generation ConferenceUpcoming Event: Wonderware Next Generation Conference
Upcoming Event: Wonderware Next Generation Conference
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Ministry of Foreign Affairs
Ministry of Foreign AffairsMinistry of Foreign Affairs
Ministry of Foreign Affairs
 
Evolución de soluciones de colaboración | Diana Mate - VoIP2DAY 2017
Evolución de soluciones de colaboración |  Diana Mate - VoIP2DAY 2017Evolución de soluciones de colaboración |  Diana Mate - VoIP2DAY 2017
Evolución de soluciones de colaboración | Diana Mate - VoIP2DAY 2017
 
Blockchain R&D to Decentralized Identity Deployment
Blockchain R&D to Decentralized Identity DeploymentBlockchain R&D to Decentralized Identity Deployment
Blockchain R&D to Decentralized Identity Deployment
 
Black Box Global Corporate Deck
Black Box Global Corporate DeckBlack Box Global Corporate Deck
Black Box Global Corporate Deck
 
Scalar for media & entertainment
Scalar for media & entertainmentScalar for media & entertainment
Scalar for media & entertainment
 
Cisco Paris DevNet Hackathon slideshow - Intro
Cisco Paris DevNet Hackathon slideshow - IntroCisco Paris DevNet Hackathon slideshow - Intro
Cisco Paris DevNet Hackathon slideshow - Intro
 
Cyber technologies for SME growth – Barriers and Solutions
Cyber technologies for SME growth – Barriers and SolutionsCyber technologies for SME growth – Barriers and Solutions
Cyber technologies for SME growth – Barriers and Solutions
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
 
Digital transformation and AI @Edge
Digital transformation and AI @EdgeDigital transformation and AI @Edge
Digital transformation and AI @Edge
 
Saigon Online Tech City 2017
Saigon Online Tech City 2017Saigon Online Tech City 2017
Saigon Online Tech City 2017
 
Overview Brochure - Executive Briefing_0
Overview Brochure - Executive Briefing_0Overview Brochure - Executive Briefing_0
Overview Brochure - Executive Briefing_0
 
Nordic IT Security 2014 agenda
Nordic IT Security 2014 agendaNordic IT Security 2014 agenda
Nordic IT Security 2014 agenda
 
CloudCamp Chicago - November 2013 Fighting Cloud FUD
CloudCamp Chicago - November 2013 Fighting Cloud FUDCloudCamp Chicago - November 2013 Fighting Cloud FUD
CloudCamp Chicago - November 2013 Fighting Cloud FUD
 
Pc tech pitch deck
Pc tech pitch deckPc tech pitch deck
Pc tech pitch deck
 
Building a better Internet of Things
Building a better Internet of ThingsBuilding a better Internet of Things
Building a better Internet of Things
 
Saigon Online Tech City 2017
Saigon Online Tech City 2017Saigon Online Tech City 2017
Saigon Online Tech City 2017
 
Cloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover TrackCloud Innovation Tour - Discover Track
Cloud Innovation Tour - Discover Track
 

CSRT_PHX_V3_12APRIL16

  • 1. Topic of Discussion: Securing todays advanced virtual hybrid data centers Join CenturyLink in a security round table discussion with the industry’s leading security technology providers. CenturyLink • Cisco • Fortinet • Palo Alto • RiskSense • You are invited: Cybersecurity Round Table RSVP Today CLICK HERE Anopenforumforsecurityprofessionals Don’t miss the chance to interact with the industry’s top security technology providers. Network with other security professionals in your industry while you learn about the latest security technology trends. Food & drinks provided Promotional Give Aways: - CenturyLink AppDev Kit - Trial Licenses to the latest virtual firewalls - 4 hour cyber security workshop Where: SkySong ASU Technology Park Building #3 Synergy Room 1 & 2 1475 N Scottsdale Rd, Scottsdale, AZ 85257 When: Tuesday April 12, 2016 at 9:00 AM to 1:00 PM (MDT) How to RSVP: CenturyLink Business the all-in- one platform that delivers high-performance, secure, reliable and scalable IT solutions for all workloads. www.ctl.io www.centurylink.com/business TopicsofDiscussion: - Centurylink Cybersecurity Services and Analysis - Cyberthreat State of the Union Analysis - Vendor Specific Threat Analysis and Response - Securing Hybrid Cloud Networks - Meeting Security Regulatory Requirements - The Future of Cyber Attacks CenturyLink • Cisco • Fortinet • Palo Alto • RiskSense •