View, browse and sort Enterprise Connect 2018 conference sessions. You can sort by:
* Which pass type you have (or are considering purchasing)
* Conference Tracks
* Hot Topics that are covered in multiple tracks
* Combinations of the above
Plus, start planning your time at Enterprise Connect 2018 by building your schedule, and then access it during the show via export to your personal calendar or within the Official Mobile App (available in February 2018). Simply register or log-in below to save your selections.
NOTE: Your log-in information would be the same as registration for both the scheduler and mobile app, so please use the same email and password.
If you would like to upgrade your pass to attend specific sessions, please contact our registration support team at 415-947-6858, Toll Free 1-866-203-8169 from Monday - Friday between 9:00 AM - 4:00 PM PT.
Without proper oversight, communications tools can become a weak link in an enterprise security plan. In this session, learn about the latest challenges and the best ways to stay ahead of the risks.
In this era of blistering fast change and a hyper-connected reality, communications tools are everywhere -- on mobile devices, software-based desk phones, laptops, and more. Options have exploded, with team collaboration, video, chat, file sharing, and integration with other enterprise applications. Devices -- be they corporate or employee owned and managed -- are connecting on internal and external networks. Likewise, applications and communications platforms may be hosted within the enterprise or in the cloud, out of IT’s direct control. These all significantly expand the security attack surface, creating new challenges for enterprises.
In the past, organizations could manage communications (and security) by controlling the endpoints and the connectivity, but additional measures are now required. Are Two-Factor Authentication (2FA), Unified Endpoint Management (UEM), Next Generation Firewalls (NGFW), and Session Border Controllers (SBC) the answers, or is building zero trust networks and systems required for communications?
All companies must address cybersecurity. They can't hide their heads in the sand and let the risk continue to grow. In this session, gain insight into the challenges, and discover some ways to manage these real UC security risks.
KEY QUESTIONS: * As UC&C implementations continue to shift from the premises into hybrid or all-cloud deployments, what changes must organizations make in their security architectures? * What are the security risks associated with integrating communications into CRM and other line-of-business applications? * Which traditional security technologies still apply in this new world of communications everywhere, and which don't? *What are some new techniques to consider for securing communications? * What are some of the newest threats and potential gotchas, and best ways to protect against them?