Presented by CompuNet
Explore how to enhance productivity with Copilot for Microsoft 365 and other AI Solutions. This session will focus on possible use cases, along with considerations prior to deployment in a corporate setting.
IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.
Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.
August 22nd, 2024
8:30am – 4:30pm
Boise Centre
Grand Ballroom
850 W. Front Street
Boise, ID 83702
Presented by Bob Friday • Chief AI Officer & CTO Enterprise, Juniper Networks
Presented by CompuNet
Explore how to enhance productivity with Copilot for Microsoft 365 and other AI Solutions. This session will focus on possible use cases, along with considerations prior to deployment in a corporate setting.
Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara
Removing the infrastructure silos and administration complexity around your application’s data gives you the flexibility to consume solutions and deliver total data freedom. Join us as we showcase the future of data storage as a single hybrid cloud platform for applications. Allowing you to consume the data services you need, where and when you need it! Offering a single data plane and control plane across block, file, object, and mainframe, with one common experience for administration, analytics, and automation.
Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.
Presented by Liran Chen, Vice President, Sales Engineering & Technical Services • Forescout
Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.
Presented by Tim Medin, Chief Executive Officer • Red Siege
Join this session for a comprehensive overview of modern cybersecurity threats and how breaches occur. I will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited.
Presented by INTERFACE Advisory Council
A value-added reseller (VAR) can have a tremendous impact on the efficiency of how your IT department functions. Budgets can be a challenge to navigate to ensure your needs are met. A good way to make sure you are getting the most out of your IT purchases is to develop the correct strategic relationship with your VARs.
Join this panel discussion for industry tips on improving communication and learning to be proactive in your approach to solving problems. A quality reseller relationship will not only save you financially, but it can also allow you to have a better performance within your IT department. The knowledge and experience that your reseller’s team has can be a great asset to your own team. Bring your questions about cultivating this relationship and maximizing your long-term value.
Panelists:
Presented by Bob Friday • Chief AI Officer & CTO Enterprise, Juniper Networks
Artificial intelligence (AI) is poised to transform every aspect of our lives, from agriculture to health care, autonomous vehicles and mobile internet. But how did AI evolve from a scientific curiosity to a practical necessity? And how is AI changing the way we design, operate, and manage networks?
In this session, we will explore the history and the future of AI, with a focus on networking applications. We will share the Mist journey to cloud AI, and how we leveraged machine learning and deep learning to create a cloud AIOp solution that simplifies and automates network operations, improves user experience, and reduces costs. We will also discuss the fundamental elements of a networking cloud AIOp solution, such as data collection, processing, analysis, and action. Finally, we will examine the impact of AI on networking IT and the broader economy, and how AI can create new opportunities and challenges for network professionals.
Join us for this exciting and informative keynote and learn how AI can help you take your network to the next level.
Bob’s career as a wireless entrepreneur is focused on developing and bringing to market unlicensed wireless technologies. He was recognized as a Wi-Fi “mover and shaker” by Light Reading, was a key contributor to the HS2.0 industry standard and holds over 15 patents.
Bob started his wireless career at Metricom (Ricochet wireless network) with the original release of the part 15 FCC unlicensed rules in developing and deploying wireless mesh networks across the country to connect the first generation of Internet browsers. Following Metricom, Bob co-founded Airespace, a start-up focused on helping enterprises manage the flood of employees bringing unlicensed Wi-Fi technology into their businesses. Cisco acquired Airespace in 2005 for $450M where Bob became the VP/CTO of Cisco enterprise mobility and drove mobility strategy and investments in the wireless business (e.g. Navini, Cognio, ThinkSmart, Phunware, Wilocity, Meraki ). He also drove industry standards such as HS2.0 and market efforts such as Cisco’s Connected Mobile Experience. Bob left Cisco in May 2014 to co-found Mist Systems, an early-stage start-up focused on helping enterprises deliver business critical mobile experiences to their customers and employees.
Presented by Tony Steffe, Sr Systems Engineer, CISSP • Illumio
Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:
Tony is a knowledgeable technical professional with 20+ years of experience developing, selling, and integrating technology for enterprise customers. He is effective in sales engineering, Internet security, project management, computer networking, and interpersonal relations. Exceptional at managing the personal and technical challenges that arise from building something new, Tony has successfully built out several high-impact IT projects.
Presented by Steve Riley, Field CTO • Netskope
We live in a world where everything is hybrid and the blend between personal, corporate, private, and public is ever-changing and presents us with a host of new challenges. This has increased and complicated the attack surface and the pressure to converge tools and do “more with less” is at peak levels. We must meet this watershed moment with the right team, plans, and technology.
Join this interactive session to learn:
Presented by Zach Feingold, Engineering Manager, & Susan Anderson, Vice President of Sales • Cerium Networks
In today’s digital era, AI is not just a buzzword but a robust toolset that, when wielded with precision, can unlock unprecedented value and competitive advantage. As we embark on this journey, we must anchor our strategies in the bedrock of security, ensuring that our AI systems not only enhance our capabilities but also safeguard our assets. This presentation explores practical steps to weave AI into our business fabric, turning challenges into a springboard for growth and innovation. Our goal is to present you with concepts and avenues to consider as you learn to navigate your adoption. Let’s embark on this journey to harness AI’s potential responsibly and effectively.
Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara
Balancing the need for substantial data infrastructure with more eco-friendly policies should be top of all organizational to-do lists. Rather than a competition between corporations, these initiatives should be focused on the larger benefit of a healthier world. That’s why creating a specific data center decarbonization strategy will be key. This will range from improving the visibility and measurement of power usage, to actually reducing the carbon footprint of each operational layer. But where should organizations begin?
Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.
Presented by Tanner Harrison, Systems Engineer • Fortinet
Today's ever-changing threat landscape challenges traditional security models. The emergence of the Zero Trust model represents a transformative approach, reshaping how organizations protect their assets. This presentation aims to demystify Zero Trust, offering a comprehensive understanding that goes beyond buzzwords. We will explore the foundational concepts of Zero Trust, emphasizing the "never trust, always verify" philosophy. By the end of this session, attendees will be equipped with the knowledge to begin their Zero Trust journey, enhancing their security posture, and protecting critical data and systems from modern threats. Whether you are a security professional, IT manager, or organizational leader, this discussion will empower you to take decisive action toward a more secure future.
Presented by CompuNet
Explore the latest trends in data center technology including hardware architectures, virtualization platforms, and the hybrid landscape. This session will share insights into optimizing your data center infrastructure. It will also cover the impact of recent shifts from perpetual to subscription-based licensing.
Presented by Gregory Pepper, Security Architect • Check Point
As artificial intelligence (AI) permeates our lives, it's crucial to address the cybersecurity challenges it presents. In this dynamic landscape, AI will be utilized by both attackers and defenders. We will explore the opportunities of leveraging AI to enhance your business and defenses while acknowledging the potential risks. AI-powered attacks, opaque AI systems, and a lack of standardized security practices demand proactive measures, rigorous protocols, and transparent designs to ensure a secure AI ecosystem.
Presented by Dave Tuckman, Information Security Consultant • FRSecure
FRSecure (an Information Security company located in Edina, MN) took the results of +/- 400 Validated Information Security Assessments and 55 Incident Response Engagements conducted in 2022 and created an anonymized report from the data called: The State of Information Security. Full details and access to the report are available here: https://frsecure.com/2023-annual-infosec-report/
In this presentation, FRSecure Information Security Consultant Dave Tuckman will highlight key findings in the report, and what we can learn from it.
Understand how you can mitigate risk going forward to protect your business and clients in an ever-changing threat landscape. Dave will provide additional perspective on how you can leverage this information for a better understanding of your third-party (supply, vendor, contractor) relationships.
Topics include:
Presented by Marty McDonald, Sr Domain Security Advisor • Optiv
In this session, we will discuss trends Optiv is seeing in the SIEM market and how they may relate to your environment. We will focus on the move towards a single collection of logs and routing of those logs to multiple platforms to meet the use cases and requirements of the business and security. Once the collection of the logs is separate from the search, correlation, and analytic layers what does it mean to you?
Marty has 20 years of deep cyber security industry experience gained from a variety of value-added resellers and solutions integrators. Prior roles include Senior Consultant in Security Intelligence for Datalink, and Senior Consultant in the Technology Solutions Delivery team at Accenture. Marty is a cybersecurity professional with experience ranging over a wide variety of clients from small to Fortune 500 corporations in a multitude of industries including government, healthcare, retail, manufacturing, banking, and technology. He has delivered projects for the rationalization of technologies and reference architectures for analytics platforms. He is a subject matter expert (SME) in the design and implementation of Security Incident and Event Management (SIEM) systems and is well-versed in creating detection mechanisms that enhance Security Operation Centers (SOC) and compliance effectiveness. He possesses a unique ability to turn business needs into technology solutions in a cost-effective manner for his clients.
Presented by Liran Chen, Vice President, Sales Engineering & Technical Services • Forescout
Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.
Presented by Matt Rose, Manager, Technical Sales Consulting • Entrust
Digital transformation accelerates at a fast pace, and organizations struggle to secure their digital identities. PKI as a Service (PKIaaS) is a game changer for security. It isn’t just about keys; it’s a blend of agility, scalability, and trust. PKIaaS will provide:
We will also review our integration and the ease in which PKIaaS plays with MDM vendors, Microsoft Active Directory and certificate automation and how to seamlessly leverage PKI with your existing enterprise IT platform.
As we continue to navigate security within organizations, PKIaaS will provide the assurance that you need.
Presented by Joe Hatton, Director, Cloud Services • Structured
In today’s fast-paced business world, finding the right help is tougher than ever, especially with constant cybersecurity threats making vigilance a top priority. Outsourcing to Managed Service Providers (MSPs) might seem like an easy fix, but did you know that half of all businesses aren’t happy with their MSP? This talk will dive into how you can pick the right MSP and keep things running smoothly. We’ll cover what to look for in an MSP, how to work well together, and ways to keep the relationship strong and beneficial for everyone involved.
Presented by Mike O'Neil, Director of Systems Engineers • Scale Computing & Structured
In today's rapidly evolving IT landscape, organizations face increasing data storage, security, and operational efficiency demands. As the market responds to Broadcom's acquisition of VMware, many businesses are reevaluating their infrastructure choices, seeking alternatives that offer greater flexibility, lower costs, and long-term stability. Join Scale Computing for ""Future-Proof Your IT: Navigating the Evolving Infrastructure Landscape,"" where we will explore how Hyperconverged Infrastructure (HCI) revolutionizes how businesses manage their IT environments.
This session will explore the benefits of integrating computing, storage, and virtualization into a single, streamlined architecture. Learn how Scale Computing Platform (SC//Platform) enhances security through simplicity and automation, providing peace of mind in a world where cyber threats are constantly evolving. Discover why now is the time to embrace HCI to meet the growing demands of digital transformation and secure your organization's future.
Presented by Jason Anderson, Channel Sales Engineer, SASE • HPE Aruba Networking & Structured
When it comes to security, the right tools matter. Securing your network no matter where your users are located can be difficult and complex. Over the last year, many IT leaders have embraced a Secure Access Service Edge (SASE) framework to enable faster and more secure connectivity across their global organizations. SASE converges the functions of network and security solutions into a single, cloud-native service that delivers consistent connectivity and security from everywhere. Find out how HPE Unified SASE can help you with tools that are easy to deploy, configure, and manage.
Presented by Shawn Surber, Sales Engineer • Datec
In today's rapidly evolving digital landscape, securing the modern workplace presents unprecedented challenges and complexities. Traditional security measures often fall short in addressing the sophisticated threats that enterprises face, necessitating innovative solutions that can adapt to the dynamic nature of cyber risks. This presentation is designed to introduce a groundbreaking approach to digital security through the lens of Island, an enterprise browser built from the ground up with security and productivity at its core.
We will explore how Island is redefining the standards of enterprise security by offering a comprehensive suite of features tailored to protect and enhance the digital workspace. Attendees will gain insights into how Island's unique architecture and security-focused functionalities, including advanced data loss prevention (DLP), granular access controls, and seamless integration with existing security ecosystems, are setting a new benchmark in browser capabilities.
Through real-world use cases and success stories, we will demonstrate Island's effectiveness in mitigating risks, ensuring compliance, and fostering a secure yet flexible work environment. By focusing on the strategic advantages of deploying an enterprise browser solution, we aim to equip security professionals, IT leaders, and business executives with the knowledge and tools necessary to navigate the complexities of modern cybersecurity.
Join us to discover how Island is empowering organizations to embrace the future of work with confidence, balancing the need for rigorous security measures with the demands for productivity and innovation in the digital age.
Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.
Ron Anderson
Vice President, Information Technology
Northwest Lineman College
Lorraine Bessmer
Manager, Cybersecurity
St Luke’s Health System
Laurel Caldwell
Director, Information Technology Services
Latah County, ID
Marcus Camden
Chief Information Security Officer
ID Dept of Labor
Michael Case
Manager, IT Service & Support
Blue Cross of Idaho
Brandon Cheyney
Systems Administrator
City of Nampa, ID
Russ Cunningham
Manager, IT Security
ON Semiconductor
Jennifer Dvorak
Chief Information Security Officer
ID Courts
Matt Fuhrman
Manager, Information Security & Privacy
Your Health Idaho
Steve Goff
Director, Information Technology
Northwest Lineman College
Devonte Goodman
Director, Information Technology
City of Eagle, ID
Jon Harris
Director, Information Technology
Wright Brothers, The Building Company
Patti Henderson
Director, Information Technology
Givens Pursley LLP
Daniel Johnson
Manager, IT Security
Boise Cascade
Scott Knights
Chief Information Security Officer
ID Dept of Health & Welfare
Cody Kreps
Director, Information Services
Nampa School District
Kevin Malloy
Chief Technology Officer
Dynamis Energy, LLC
Jason Mertz
Vice President, Information Technology
Idaho First Bank
Andy Miller
Manager, Information Technology
Ada County Highway District
Dan Monighetti
Director, Information Technology
Tovuti LMS
Marc Norton
Manager, Information Technology
ID State Tax Commission
Raul Pena
Director, Information Technology
Payette County, ID
Andrew Peterson
Sr Security Analyst
US Dept of Veterans Affairs
Robert Peterson
Director, Information Technology
Washington County, ID
Morgan Poyser
Director, Information Technology
HB Specialty Foods
Dan Roberts
Director, Infrastructure, Cybersecurity
Western States Cat
Michael Rowell
Vice President, Information Technology
Turn-Key Medical
Cody Shepherd
Sr Manager, IT Operations
Idaho Power Company
John Stiffler
Director, Corporate IT
Boise Cascade Company
Shawn Turner
VP, Chief Information Security Officer
United Heritage Financial Group
Fred Warr
Manager, OIT
Boise State University
Rachel Zahn
Cybersecurity Analyst
Aura
Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.