iIT Distribution – офіційний дистриб’ютор компанії Lookout
iIT Distribution expands its portfolio with networking solutions from Aruba Networks
IIT Distribution received the status of a Business Partner in the Hewlett Packard Enterprise affiliate program
Why should hosting providers pay attention to Infinidat data storage solution? Practical experience of use
The ZTNA model helps reduce the stress loading of employees from remote work
Сrowdstrike named leader in security Threat Detection, Response and Investigation of cyberincidents (MDMR)!
Falcon X від CrowdStrike визнаний лідер у звіті Forrester Wave: External Threat Intelligence Services за перший квартал 2021 року!
New Forrester study shows all the economic benefits of using the Falcon Complete!
iITD is the official partner of the International Grand Forum "BIT & BIS-2021"!
CrowdStrike has announced the acquisition of Humio's leading high-performance log management platform!
Intelligent IT Distribution at the international conference "Go Digital - 2021: acceleration and migration. Money goes online".
International Conference "Go Digital - 2021: acceleration and migration. Money goes online".
Crowdstrike's response to recent supply chain attacks
Intelligent IT Distribution takes part in the third annual international forum "Cybersecurity - protect business, protect the state"
IITD - partner of the forum "Cybersecurity - protect business, protect the country" 2020
iIT Distribution got the status of a distributor of Netbrain technologies solutions in the territory of Ukraine
Fal.Con 2020 by CrowdStrike
Compliance with cyberrisk insurance
Automatically block compartment accounts with Lepide Active Directory Self Service 20.1
Cossack Labs invites you to visit NONAMECON
Signing a distribution agreement with SAFE-T
International Conference "Online Banking - Time of Innovation!"
Global Cyber Threat Report 2020
Thursday, the 25-th of June, 2020. Do not miss!
PandaLabs Report: Understanding Threats 2020
Announcement: New version of ACRA Enterprise, which provides increased flexibility for high-loaded systems
Lepide Remote Worker Monitoring Pack is a simple in deployment and lightweight security platform, which offers immediate protection of business data during an unforeseen period of remote work.
Ensuring cybersecurity for remote users
Labyrinth Technologies offers to take advantage of a special offer - a license for 12 months at a price of 6 months
Crowdstrike: Remote work and IT security during the crisis - a reduced licensed program for 3-6 months
IIT Distribution received the status of distributor solutions RedSeal Networks in Ukraine
IIT DISTRIBUTION has received the status of a Lepide solutions distributor in Ukraine
CrowdStrike, the industry leader in cybersecurity, is inviting you to Falcon 2020. By joining this virtual event, you can choose from 70 training sessions that cover the hottest data protection topics.
IIT Distribution is an exclusive distributor of CrowdStrike products in Ukraine.
Fal.Con 2020 is an event that anyone interested in cybersecurity should attend.
Participants will be able to choose from panel presentations and training modules, participation in which will help develop effective strategies for their companies, increase their preparedness to counter cyber threats and effectively prepare their organization for functioning in today's threat landscape.
There are some of the planned reports below.
|12:35 – 1:05 p.m.||Moderator: Michael Sentonas, CTO, CrowdStrike|
Work smarter: use AI for sound decisions
New advances in artificial intelligence will allow organizations to make decisions with unprecedented speed. Learn how organizations use AI and machine learning to achieve impressive results
Moderator: Michael Sentonas, CrowdStrike
|12:35 – 1:05 p.m.||Under siege: How local authorities can stop ransomware attacks (Ransomware)|
For state and local governments, the damage caused by extortion programs can become immeasurable. Such attacks disrupt the workflow and devastate already limited budgets. The expert group will share tips on preventing attacks and other important information gained from dealing with incidents.
Moderator: Thomas Etheridge, SVP, CrowdStrike
|Michael Geraghty, CISO |
|12:35 – 1:05 p.m.||COVID-19: How the global pandemic has changed cybersecurity and the world forever|
The COVID-19 pandemic has forced organizations around the world to significantly increase the use of remote employees, and attackers have taken advantage of this, provoking a sharp increase in phishing, eCrime, and targeted intrusions. In this module, a group of government and industry experts will discuss best practices and consider ways to protect against the latest threat vectors.
Deputy Director, Cyber Division, FBI
CIO and Deputy Director, Ohio
|1:05 – 1:35 p.m.||Inevitable cloud migration: a crucial factor in strengthening endpoint security in public institutions|
As organizations continue to move their core services and applications to the cloud, cloud-based security measures are becoming a priority for professionals. In this discussion, you will learn how the cloud increases the ability to detect and prevent attacks, and the ability to respond to them compared to the limited capabilities of outdated security architectures.
|Danny Connelly, Acting CISO, Centers for Disease Control and Prevention (CDC)|
|1:05 – 1:35 p.m.||Protection of the state election infrastructure in 2020|
The organization of elections leads to a whole range of technical, logistical and managerial problems. Criminals use political intelligence and other methods to try to influence election results around the world. In this panel, the most respected national experts will discuss the dynamics of the threat environment and ways to strengthen security in the run-up to the 2020 US elections.
Moderator: Rob Sheldon, Head of Technology Strategy, Public Sector, CrowdStrike
Senior Advisor to the Executive Director of the US Election Commission
Senior Cyber Security Adviser, CISA
Maria Barsallo Lynch
Executive Director, Digital Democracy Protection Project (D3P), Harvard Belfer Center
|1:05 – 1:35 p.m.||Supply Chain Security: One weak link is enough|
The level of protection of federal agencies directly depends on the security of their contractors, on the software used by Hosanna. Attackers attack second- and third-level subcontractors to advance up the supply chain. At this session, federal officials will discuss the latest methods to improve the security of the supply chain, and talk about the challenges they will have to overcome in the future.
Moderator: Curt Aubley, Senior Director, Public Sector Strategies and Solutions, CrowdStrike
Director, National Center for Risk Management, CISA
Assistant Director, Supply Chain Directorate, National Counterintelligence and Security Center
CISO, General Dynamics Ordnance and Tactical Systems
|1:05 – 1:35 p.m.||The future of education: creating safe and secure conditions for students |
The pandemic has forced universities across the United States to switch to distance learning in a matter of days. In these circumstances, university staff are looking for a solution that enhances academic freedom and creates optimal conditions for students to study in the context of confidentiality and security. At this session, experts from higher education institutions will talk about their victories, outline the difficulties in the context of the transition to distance learning, and talk about plans for the future.
Moderator: Otavio Freire, President, CTO and Co-Founder, SafeGuard Cyber
|Aaron Baillio, CISO, University of Oklahoma|
Tina Thorstenson, Deputy Director of IT and CISO, Arizona State University