1.  Data Breaches Continue to Occur
2.  The Lifecycle of a Data Center Attack
3.  Perimeter Fire Walls
4.  Limiting Lateral Movement within the Data Center
5.  Essential Elements of Micro-segmentation
6.  Key Forces Driving the Need for Data Center Transformation
7.  Transforming Your Data Center with Network Virtualization
8.  Creating Security Policies for the Software‐Defined
9.   Achieving Micro‐segmentation
10. Minimize Risk and Impact of Data Center Security Breaches

Each topic is covered in a two-hour meeting for a total of 20 hours.