August 7th
Opening Keynote: Beyond the Breach: Strategies for Selling Incident Response Exercises
Although can't protect your clients against every type of threat actor, you can offer a clear path to resiliency when a breach occurs. Join incident response expert Robert Burton as he shares how practical tabletop exercises can dramatically improve your MSP's security offering.
You'll discover practical steps to developing and testing your own comprehensive Incident Response Plans, engaging in realistic scenarios, and conduct post-incident reviews for continuous improvement. You'll also learn the secrets to selecting the right third-party partners to supercharge the effectiveness of your response. Bring your thoughts, concerns, and questions - we invite your participation in this interactive session.
An Exploration into Banishing the Remediation First Mindset & Preventing Cybersecurity Disasters [Presented by Blokworx]
In this thought-provoking session from BLOKWORX, we dive deep into the year-over-year trends found in cybersecurity, challenging the traditional "remediation first" mindset that often leaves organizations vulnerable to attacks and reeling afterwards. We will discuss industry trends that point to how businesses can practically prevent cybersecurity disasters and shift the focus to proactive strategies which have been proven to work for securing SMB and Enterprise digital assets. This session is ideal for IT professionals, cybersecurity experts, business leaders, and anyone interested in staying ahead of the rapidly evolving cyber threat landscape.
All session attendees will leave with a practical roadmap document exclusively provided complimentary during this presentation which was developed by the BLOKWORX team and honed over time with 15+ years’ experience deploying best-in-class prevention mechanisms to endpoint, edge, and cloud infrastructure.
Leadership Does Not Require Suffering: It’s a Privilege! [Presented by SonicWall]
United States Army combat veteran Michael Crean will be discussing principles of leadership he has learned on and off the battlefield. As an Army Combat Veteran, he came to understand that leadership is not just a responsibility; it is a profound privilege. Through his experiences on the battlefield and as a CEO for the last 21 years, he's witnessed firsthand how leadership can shape destinies and bring about significant change. Leading a team of soldiers or a team of executives is a weighty honor, as it means being entrusted with the well-being of others. The men and women who follow a leader place their trust and faith in that individual's decisions, knowing that their own success depends on the competence and judgment of their leader. This immense responsibility comes with the privilege of being able to make a positive impact on the lives of those under your command. Leadership is not about barking orders or seeking personal glory; it's about guiding, inspiring, and empowering the team. The privilege of leadership is in the ability to influence positive change, to cultivate a culture of resilience and unity, and to guide the team towards a common goal. It is witnessing the transformation of individuals into a cohesive force, working together to overcome challenges and achieve shared objectives.
Fresh Phish: Diving Into The Latest Tactics & Trends [Presented by Inky]
Phishing remains the number one cause of data breaches for companies, and the hooks are only getting sharper. Malicious actors construct obfuscated, multi-layer phishing campaigns that circumvent legacy gateways and lure end users into their traps. Using real world examples, we will take you beneath the surface of the latest deceptive tactics and highlight trends to watch out for in 2024.
5G: The Last Mile of Opportunity: Take back the cloud with 5G as a service [Presented by Rythmz]
Traditionally, MSPs have been beholden to supporting their customer’s ISP connections without the ability to manage or change the connection itself. RYTHMz wants to shift the power to the MSP with game-changing 5G service. With RYTHMz, you'll provide faster and more reliable connectivity, enabling businesses to enhance productivity and efficiency like never before. Imagine offering real-time data analytics, multiple circuits for reliability, and a bonded connection for greater bandwidth and hot failover — all with ultra-low latency and a scalable, completely mobile solution. Your customers will experience improved operational efficiency, greater security, better network reliability, and a competitive edge in their markets. Plus, with the potential for new revenue streams from 5G-enabled services, MSP Partners can grow their relationships and revenues with existing customers while presenting solutions that attract new customers. Let's explore how integrating RYTHMz and 5G can transform your service offerings.
How To Create Malware and Defend with Zero Trust [Presented by ThreatLocker]
In a world where anyone can create successful malware or have AI generate it for them, it's important to know how malware can be successful so you can better defend. Starting from a default-deny posture, learn how adopting Zero Trust principles can keep your data safe and operations running regardless of hacking attempts by man or machine.
Attacking the Insider Threat Problem Head-on
Insider threats are the "friendly fire" of the business world. Employees, former staff, and industry partners can destroy an entire business by misusing technology or allowing threat actors in. Join our panel of experts as they provide real-world examples of insiders abusing their access. They'll detail how those risks could have been mitigated and identify their favorite tools and educational strategies. Follow along as we chart an MSP's role in safeguarding corporate assets from the dangers that lie within.
The Profitability Problem: How the Wrong Sales Can Ruin an MSP
It’s counterintuitive, but some sales are bad for business.
In this lively panel discussion, we'll explore the best approach to taking on new clients and how vendor relationships can support that effort. The right business partnerships can lead to sustained success without sacrificing must-haves like security. The wrong ones can degrade service quality and obliterate your reputation.
Join our expert vendors as they share practical advice, talk about real world scenarios, and field your insightful questions.
Compliance is More than an Add-On, It's a Moneymaker
Regulatory requirements are a maze for most organizations. But that means IT providers with a strong understanding of compliance have a strong competitive advantage in the marketplace. In this engaging panel discussion, we'll quiz industry experts on the best ways to incorporate compliance consulting into a winning service portfolio. We'll also discuss the dangers your MSP can face if you overpromise and under-deliver in this critically important area of modern business.
Welcome Cocktail Reception in the Exhibit Hall
August 8th
Brand New Ways to Use AI to Improve Your Security
In this dynamic session, we unveil six powerful ways AI can strengthen your MSP’s security, foster resilience, and represent the “gold standard” which your clients can emulate.
Discover how to safeguard identities, data, and infrastructure by addressing threats quickly and proactively, automating workflows, harnessing AI-driven analytics, producing technically sound security documentation, and more!
MSPs are in the crosshairs of threat actors. Don't miss this opportunity to build up your own security best practices while leveraging the most incredible, cutting-edge tools available.
Gold Sponsor Presentation: Inky
Mastering the Cybersecurity Onboarding Process
Client onboarding is a critical process that sets the tone for a successful and enduring client relationship. When it comes to security services, facilitating a smooth transition is even more important. This session is dedicated to helping you master the art of efficient client onboarding, ensuring a smooth progression from prospect to satisfied client.
- The Onboarding Journey: Understand the ideal client onboarding process from start to finish while baking in security best practices
- Setting Expectations: Explore techniques for meeting and exceeding client expectations
- Documentation and Compliance: Discover techniques for gathering information and building processes to ensure compliance with applicable laws and industry regulations.
Our experts are ready to share their experiences with mitigating risk while establishing enduring relationships with new customers.
Product & Services Expo Luncheon
Now is the time for you to connect with dozens of channel vendors under one roof! Many attendees consider this the highlight of our events – your chance to meet with the vendors who make your success possible. See product demos, learn about show specials, get updates on partner programs that can offer you training, marketing, financing and more. These conversations will save you money while making you money.
Live Demo: Battle of the Hackers: White Hat vs. a Top Security Expert
Dive into the world of cybersecurity with our live demonstration, "Battle of the Hackers: White Hat versus a Top Security Expert” Witness firsthand as an ethical hacker reveals the art of penetrating networks, using the same techniques that real cybercriminals exploit. Concurrently, a seasoned security professional will demonstrate real-time detection, mitigation, and reporting of these breaches.
This session is a must-attend for IT professionals seeking to fortify their networks against cyber threats. Gain critical insights into the mindset of attackers and the strategies of defenders, improve your preparedness, and learn how to protect your digital assets effectively.
Selling UP! Powerful Security-Focused Strategies for Winning Bigger Accounts
Some IT services companies are happy to sell to the smallest of SMB companies. But with many micro-sized accounts, the ROI just isn’t there. In this informative session, we'll share expert guidance on how cybersecurity can help you make the leap up-market.
Learn how to win over decisionmakers and build a service delivery engine to support their needs. Find out how industry partners and peers can be an invaluable resource as you upscale your clientele.
Embrace your opportunity to become the next great security partner for businesses of 50-1000 seats!
Closing Keynote: Strengthening Your Cybersecurity Value Proposition: Resources & Advice from CISA
Understanding government resources can be confusing, especially when it comes to cybersecurity. As America’s civilian cyber defense agency, the Cybersecurity and Infrastructure Security Agency (CISA) leads the national effort to understand, manage, and reduce risk to the cyber and physical infrastructure that Americans rely on every hour of every day. Partnering with the CISA can add an inventory of tools, training, incident response resources, and best practices guides…all at no-cost.
In this dynamic keynote presentation, CISA’s NJ State Coordinator Christopher Kay will speak to the challenges faced in today’s threat landscape. He will then highlight CISA services and resources MSPs can leverage to enhance their cybersecurity practice. Time will be reserved for Q&A and we invite you to bring your questions to this interactive session.