Presented by StorageCraft
Are you really ready for a data disaster? Learn more about how disaster recovery has changed the last couple years and how to put together a DR strategy for your business. Learn about a simple and economic DRaaS solution.
IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to emerging developments in AI and the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations to help educate, advise and connect you to resources that can help you meet your goals.
Covering Information Security, Infrastructure, Cloud, Disaster Recovery, Communications, and more, you’ll find presentations, panel discussions, and exhibitors covering a variety of topics, as well as the latest innovations and best practices.
November 10th, 2020
8:30am – 3:30pm
Virtual Conference
Multi-track seminars with Q&A
1-on-1 chat and networking
Hourly prize drawings
Presented by Kenneth A. Schmutz • Supervisory Special Agent, FBI
Presented by StorageCraft
Are you really ready for a data disaster? Learn more about how disaster recovery has changed the last couple years and how to put together a DR strategy for your business. Learn about a simple and economic DRaaS solution.
Presented by Zerto
As IT application availability requirements continue to evolve, technology continues change to meet the new requirements. Join us as we discuss planning considerations for bringing your virtualized workloads into the next generation of IT resilience. You will learn about data center options to consider as part of your recovery strategy, business and technical trade-offs that will have to be made, capacity planning considerations, and testing approaches to that are possible that will optimize application up-time.
Presented by One Identity
System Administrators are critical people to every organization. They design, build, and maintain all the parts and pieces that enable business, whether that’s retail, healthcare, or even a government agency. Ensuring sysadmin tasks are performed as securely as possible without hampering their ability to keep our business running is a delicate balance. These “insiders” not only know how the systems operate but have the credentials and privileges to operate them.
In this session, we will demonstrate an Active Directory breach using pass-the-hash and discuss ways to enable the System Administrators to operate in a way that not only protects the business from threats but also enables them to perform the intricate tasks they accomplish daily to keep business flowing under the covers.
Presented by StorageCraft
Are you really ready for a data disaster? Learn more about how disaster recovery has changed the last couple years and how to put together a DR strategy for your business. Learn about a simple and economic DRaaS solution.
Presented by Kenneth A. Schmutz • Supervisory Special Agent, FBI
This presentation will highlight the rise in cyber-attacks coming from criminals, nation state actors, insiders, and terrorists. These attacks include ransomware, business email compromise, data theft, and theft of intellectual property. Supervisory Special Agent Schmutz will discuss ways in which these cyber adversaries are getting into our systems including current investigations being worked by the FBI's Omaha Cyber Task Force. He will finish by providing ideas and resources that companies have used to reduce their vulnerability to these attacks.
Supervisory Special Agent (SSA) Schmutz graduated from Utah State University with a Bachelors and Masters degree in Information Systems. He worked for 13 years in the private sector for IT companies prior to joining the FBI in 2004. SSA Schmutz investigated computer intrusions his whole career which included his time in Seattle, Chicago and the FBI’s Cyber Division in Washington DC where he focused on cyber threats to the critical infrastructure. In August of 2012, he was transferred to the Omaha Field Division where he serves as the supervisor of the FBI’s Cyber Task Force (CTF).
Presented by Darktrace
Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher. Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and Americas CISO, JR Tietsort to discuss this new era of cyber-threat and how Cyber AI can help defenders regain the upper hand.
This speaking session will include a Q&A with our experts, and explore:
Presented by Check Point
Using public clouds for enterprise datacenters is now mainstream; the advantages are significant and the gained agility undisputable. However, the number of services and options being offered is daunting. With these choices come consequences; one misconfiguration can put your entire organization at risk…or worse.
Another reality you will face as you scale is the challenge of using a ‘one-size-fits-all’ interface. Imagine scrolling through lists of assets when the numbers are in the hundreds or even thousands. Think about trying to find a misconfigured or exposed S3 bucket when you have thousands; it’s like finding a needle in a stack of needles.
If you’re like most enterprises, you have a resource gap and don’t have the experienced, trained security professionals maintaining your cloud environment(s). This gap exacerbates risks. The cloud environments available today are extremely comprehensive and powerful, but in unskilled hands, one fat-finger can have dire consequences. As you implement ephemeral cloud-native services like Lambda functions and other cloud-native platform components, new challenges will arise when conducting threat-detection and attribution.
In this session, you’ll see your future and what to expect managing your public cloud-based datacenter. You’ll learn why Gartner says, “Through 2023, at least 99% of cloud security failures will be the customer’s fault.” We will highlight the top challenges you will face and show you what you should prepare for before you scale. We will also detail recommended best practices for securing and maintaining compliance in your public cloud data center.
Presented by Infoblox
This session will dive into recent Threat Intelligence Research including new malware variants and trends that were prominent over the July-September 2020 timeframe. We will examine specific Ransomware, Infostealers, Trojans, and RATS! attacks that surfaced over the last 90 days. Discover tips to improve your defenses and defeat these types of treats.
Presented by NebraskaCERT
Industrial Controls Systems are increasingly vulnerable to attack. Organizational budgets don’t always allow for the full replacement of operational technology (OT) or building automation management (BAM) equipment that was initially purchased on a longer lifecycle than most typical IT purchases. Security is becoming paramount to ensuring access to critical systems and information and continues to be an exploitable risk in organizations, even during a pandemic, due to ransomware, phishing, and poor asset management techniques. Strategic security that is aligned with your organization needs to be balanced with the budget, risk, and organizational culture.
How do organizations implement critical security controls while still supporting the goals of production, user experience, and efficiency? When buildings are designed and built, and the building administration systems are put into place, how does this impact the risk of healthcare, manufacturing, or financial organization? Are those systems part of the cybersecurity risk analysis?
During this presentation, attendees will review best practices on both sides of the ICS security and IT security continuum. In addition, a simple approach that focuses on the fundamentals of security to reduce risk in these environments is presented. Attendees will walk away from this workshop with actionable knowledge on how to facilitate the conversation as to how OT/BAM security and IT security must work together to align risk with cost in most environments.
Presenter: Matt Morton • Board Member for NebraskaCERT
Presented by INTERFACE Advisory Council
Compliance, Privacy, and Security (ComPriSec) Professionals struggle in their role with competing priorities and responsibilities. This panel of ComPriSec industry experts defines each role, provides management strategies, and explains solutions for common challenges. Any gaps are room for lawsuits, breaches, and leaked data. Here you will learn how to bridge the new normal worlds of ComPriSec.
Moderated by:
Ron Woerner, CISSP, CISM • Technology Professor for the College of Science and Technology, Bellevue University
Panelists:
Rob LaMagna-Reiter, CISSP, CISM, CDPSE, CHP, PCIP, Sec+ • Chief Information Security Officer, FNTS
Lisa McKee, CISA, CDPSE, PCIP, MSSL • Senior Manager Security and Privacy Solutions, Protiviti
Matt Morton, HCISPP, CISM, CISSP, CGEIT • Board Member for NebraskaCERT
Advisor-approved content is the foundation upon which INTERFACE was developed. Each conference is guided by an Advisory Council of IT executives and senior managers. Advisor members represent both private and public sector organizations. The council contributes its insight into proposed educational topics and recommends local exhibitors and associations for participation.
Mike Bauer
Chief Information Officer
American National Bank
Randy Behounek
Sr VP, Technology Risk
Bank of the West
Krista Freimuth
IS Asset Manager
Mutual of Omaha Insurance Company
Jay Gnuse
Director, Information Technology
Chief Industries
Kevin Hamilton
Vice President, Global Cyber Security
Fiserv
Rick Haugerud
Assistant Vice President, Information Technology Services
University of Nebraska
Andy Hinton
IT Audit Manager
CSG International
Matt Johnson
VP Operational and Tech Risk
Bank of the West
Norman Kromberg
VP, Information Security
Southern Carlson, Inc.
Robert LaMagna-Reiter
Chief Information Security Officer
First National Technology Solutions
Eric Matulka
Vice President, Information Technology
DEI Communities
Sean McCary
Director
Omaha CIO Forum
Lisa McKee
Sr. Manager Security and Privacy
Protivit
Matt Morton
President
NebraskaCERT
Andrew Munger
Global Cyber Threat Hunt Lead
Zurich Insurance
Jinson Pappalil
Director, Information Technology
Metropolitan Utilities District
Trista Renstrom
Security Specialist
WoodmenLife
Amber Roberts
Sr. IT Support Analyst
Gavilon Group, LLC
Tom Rolfes
Administrative Services Manager
Nebraska Information Technology Commission
Ryan Smith
Director, Technology
AHSTW Community School District
Ed Toner
Chief Information Officer
State of Nebraska
Mike Welna
Sr Information Security Officer
Boys Town
Luke Wentz
Manager, IT Security
Orion Advisor Solutions, LLC
Participating exhibitors at INTERFACE achieve a greater return on their investment from this series of IT events than any other face-to-face medium available today. This success is achieved through a time-efficient and cost-effective presence for a pre-qualified audience. This simple formula leads to higher levels of business development opportunity at each event.