Albany 2018 Agenda

WorkSmart Albany 2018 was held at the Albany Capital Center on Tuesday, October 30th. Thanks to all our attendees, partners and ADNET team members for making it a great experience!

WorkSmart Albany 2018 Agenda

7:30AM – 8:45AM
Complimentary Breakfast & Networking

8:45AM – 9:00AM
Opening Remarks

9:00AM – 10:00AM
Keynote Presentation

Convergence: The Evolution of Security, Data and Information Technology

Convergence: The Evolution of Security, Data and Information Technology

Speakers: Tim Weber, Christopher J. Luise, Edward D. Laprade, ADNET Technologies

If you attend only one session at WorkSmart this year, make it our morning Keynote. We’ll address the state of the market, giving expert insights on where IT, security, managed services and business are heading. It’s impossible not to hear the news every day of tools, technologies and strategies that are changing the way organizations work – but it’s easy to ignore when the relevance to your business isn’t clear. We’re going to change that.

But it’s not just a roadmap of what’s new in the industry – we’re giving you full access to what we’re personally doing for our clients. We’ve listened, we’ve learned and we’re here to innovate with you.

Are you ready to plan for your organization’s future?

10:15 AM – 11:00 AM

Steps to HIPAA Compliance

Steps to HIPAA Compliance

Speaker: Danielle Plourde, ADNET Technologies

We’ll take you through the steps of complying with the Health Insurance Portability and Accountability Act (HIPAA). Danielle, a CHPSE (Certified HIPAA Privacy & Security Expert) will cover HIPAA basics, common misconceptions, risks to your organization and how to develop a sound HIPAA compliance program. Learn from real-life experiences as stories of enforcement and penalties are discussed. Whether you’re new to HIPAA compliance, or participate in the ongoing efforts of maintaining compliance, critical information will be shared. Don’t miss it!

Wake Up And Smell the Breach (1)

Wake Up and Smell the Breach

Speaker: Kyle Chandler, Zix

Malware is often a critical component of most cyberattacks because they rely on sophisticated techniques and they exploit every possible vulnerability. Most organizations’ cybersecurity strategies fall short not because decision makers are underestimating the threat, but because the attacks are so sophisticated and constantly changing. Protecting against these persistent threats should begin with the most common threat vector used by hackers – email.

11:15 AM – 12:00 PM

Cryptocurrency & Blockchain in Business

Cryptocurrency & Blockchain in Business

Speaker: Michael Luntta, ADNET Technologies

Even if cryptocurrency doesn’t seem relevant to you right now, it’s something that should be on your radar. Bitcoin and other cryptocurrencies have been filling the headlines. They don’t seem to be going away, if anything they’re gaining mainstream recognition and popularity. You don’t have to look far to read about someone claiming to have made thousands, or even millions of dollars on some form of cryptocurrency. The rise of this new wave of currency leads us to ask questions about the legitimacy of it, and ultimately its future relevance to business. Is the money real? How did we get here? On another level, Blockchain technology is also being incorporated into various types of business software. We will discuss what these technologies and cryptocurrencies could bring to the business sector, as well as what you should know, including the risks to be aware of.

Hope for the Best, Plan for the Worst (1)

Hope For the Best, Plan For the Worst

Speaker: Eric Monda, ADNET Technologies

Hardly a day goes by without news of another major security breach affecting a well-known organization. Every company, no matter the size or industry, is a target. Maintaining proper security standards is still an absolute must, but more is needed. Instead of simply trying to protect from the inevitable breach, organizations must adjust their focus and be ready to respond by mitigating their risk and liability should a security incident occur. In this session, Eric Monda, IT Security Analyst, Offensive Security Certified Professional and Certified Ethical Hacker at ADNET Technologies, will share best practices all organizations should implement prior to being affected by a security breach. He will address what layers of protection are most beneficial when it comes to mitigating risk and liability, and examine the importance of creating a culture of security awareness throughout the entire company.

12:00PM – 1:30PM
Lunch and Keynote Presentation

Ignoring the Cloud is Risky Business

Ignoring the Cloud Is Risky Business

Speakers: Christopher Luise, Edward Laprade, Chris Florentino & Ronald Gibson, ADNET Technologies

“Our industry does not respect tradition — it only respects innovation.” – Satya Nadella, Microsoft CEO

Keeping IT systems current is not solely the responsibility of IT professionals – business leaders at every level of the organization are obligated to ensure that their technology is up to date, secure and capable of supporting their business. Failure to do so opens an organization to significant risk, including cyber risk, and IT systems failure, the results of which can be devastating to a company’s performance and reputation. The “set it and forget it” practice of buying new servers once every four years is not only obsolete, it’s becoming dangerous.

Cloud services are making it increasingly manageable to deal with this challenge, and every organization needs to have a strategy for lifting its systems and data to the cloud, beyond just email and productivity applications. In this Keynote Discussion, we will focus on Microsoft Azure, Microsoft’s Platform as a Service (PaaS) offering that is changing the way small businesses, startups, 90% of Fortune 500 companies, and even governments run their operations. With over 100 cloud services available in Azure, and enticing offers to make it affordable for organizations to move legacy systems to the cloud, Microsoft is trying to ensure that you never need to buy a server again.

This panel of ADNET experts will talk about how these technologies are rapidly evolving to be easier to use, more powerful and more secure every day. They’ll share the most important questions you should be asking as you evaluate which cloud service is right for your business, and discuss budget considerations, common cloud migration scenarios security and compliance factors. Whether you’re already using Azure and want to know where Microsoft is going, evaluating cloud services or just interested in learning more, being informed about this topic will help you keep your organization secure and innovative.

1:45 PM – 2:30 PM

Your O365 Strategy


Speakers: Danielle Plourde & Andrew Warren, ADNET Technologies

How can you capitalize on the many features O365 offers? Dive into best practices of implementing Office 365 to get the most out of your subscription. Key topics include setting a vision, determining governance, and effectively rolling out prioritized features to get your team on board. Join us during this engaging session to learn how this technology could change the way you work, and how to avoid common pitfalls.

*This is a business focused session, providing a high level view for all levels of experience with O365.

The Threat Landscape_ What We Have Learned and What You Need to Know

The Threat Landscape: What We Have Learned and What You Need to Know

Speaker: Steven Neugarten, SonicWALL

The modern cyber war — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. The SonicWall 2018 Cyber Threat Report provides exclusive data that highlights advances by both the security industry and cyber criminals.

Join SonicWALL in this session to discuss what the experts are seeing and learn what steps you can take to protect your business.

2:45 PM – 3:30 PM

A Phish Called O365

A Phish Called O365

Speaker: Tim Weber, ADNET Technologies

Microsoft Office 365 has unparalleled abilities to help people collaborate and connect, but it’s also something hackers can easily exploit given the right circumstances. By virtue of how many companies are using O365, it’s a giant target for cybercriminals looking for a way in. The attacks we’re seeing affecting O365 can range from flat-out blackmail to stealing credentials and using them to gain further access, or sending out fake emails from legitimate addresses for more widespread intrusion. In this session, Tim Weber will present tips for attack prevention and best practices, as well as strategies to keep your organization safe by using a combination of the suite’s built in tools, Multi-Factor Authentication (MFA) and Security Awareness Training.

From the Cloud to the Edge: The Next Phase

From the Cloud to the Edge: The Next Phase

Speaker: Chris Sanford, ADNET Technologies

Cloud computing has completely changed the way companies do business. Moving services up to the Cloud offers huge advantages, but as the demand for performance and real time data delivery increases so does the need to expand the cloud. Join us as we take a look at the evolution of computing from on premise to the cloud in business. We’ll explore how Edge computing can fill in some of the gaps inherent in Cloud computing and discuss what this means for today’s fast paced organizations.

3:30 PM