Skip to main content

6 Things You Don't Want to Miss at HPE Protect 2016

by Susanne Gurman on Tuesday October 11, 2016

Contact Us
Free Demo

With HPE Protect taking place this week, here are six must-do's for the conference.

HPE officially kicks off their largest security event of the year, Protect 2016, tomorrow. After HPE’s announcement last week that it is spinning off a big chunk of its business software line-up in an $8.8 billion deal with Micro Focus International, this conference, tagged with the theme, “Fearlessly Innovate,” is sure to be under the microscope. Will the conference live up to this year’s tagline? We’ve scoured the agenda and selected our top six must-do activities to get the most out of your experience.

6. Get the App

HPE simplifies things for attendees by offering their conference agenda though the Protect 2016 mobile app. It includes options to build out your personal profile for networking, real-time updates, and announcements to keep you in the know throughout the conference. Navigate the event like a pro by having this arsenal at your fingertips.

5. Take a Guided Tour of the CyberSecurity Hall

HPE offers an on-site “quick tour” with security experts to help you get a 360-degree perspective of security solutions showcased in the CyberSecurity Hall. HPE wants to ensure you get the most out of Protect, so they have allocated resources and dedicated times throughout the event to help you decide where you should spend your time. Your guided tour can be booked using the online Agenda Builder or at the Information Desk in the CyberSecurity Hall.

4. Planning for Post-Quantum Cryptography

This session from Terrence Spies offers a forward-looking discussion on new developments in cryptography. You can attend Terrence's session on Thursday, 9/15 at 10am or 1:45pm ET. Here's the full description:

"With the NSA, NIST and other government agencies signaling organizations using cryptography to protect data should start planning the transition to algorithms that are resistant to attack by quantum computers. As a hot topic in the Federal landscape, this session is offered more than once to support the forecasted demand."

3. Attend Turbo Talks

Turbo Talks offer quick, down and dirty tips and tricks on various security topics. At 30 minutes a piece, they're a great way to get quick value in a long day of sessions. With topics ranging from threat investigation to secure software development to security leadership advice, this series offers something for every attendee - you can view the full list of Turbo Talks here.

2. Shameless but valid plug

Okay, while it’s shameless to plug your own speaking sessions in a list of most valuables, I genuinely believe they are of extreme value.

  • “The One Constant in Security: The Bad Guys Want Your Data”
    • September 15 from 1:45pm to 2:45pm ET
    • Participants: Connie Stack, CMO, Digital Guardian, Doug Bailey, CSO, Digital Guardian, Scott Fitzpatrick, SE, Digital Guardian
  • “Threat Hunting with HP ArcSight & Digital Guardian”
    • September 15 from 11:45am to 12:15pm ET
    • Participants: Jeremy Hutton, Security Consultant, Digital Guardian
    • Cyber Security Hall Theater

…and the #1 thing not to miss at HPE Protect:

1. Kickoff General Session: Fearlessly Innovate

Here we will learn the new directions of HPE beyond the initial announcements made about the software division spin-off. Hopefully here folks can catch a glimpse of the Micro Focus leadership and see what kind of tone will be set and we can see what the next transitional year will look like.

To learn more about what we have in store for HPE Protect or to schedule a meeting with our staff at the conference, visit our HPE Protect webpage.

Tags:  Events

Recommended Resources

The Definitive Guide to DLP

  • The seven trends that have made DLP hot again
  • How to determine the right approach for your organization
  • Making the business case to executives

The Definitive Guide to Data Classification

  • Why Data Classification is Foundational
  • How to Classify Your Data
  • Selling Data Classification to the Business