A technical review of recent updates to wireless standards focusing on Wi-Fi 6e and 7. Discussion on RF design guidelines and troubleshooting. A look toward the future - Wi-Fi 8.
Gone are the days where we can install a firewall, configure some access lists, and call it a day. The threat landscape today requires a different approach, using a wide variety of techniques to secure your network. Learn more about using Deception technology and Security Operations Center-as-a-service to solidify your security posture.
The last drawing of the conference will take place at the Ice Cream social on Friday and will be drawn from all name badges. Raffle tickets will not be accepted for this prize, only name badges. You must be present to win.