Presented by Paul Edoff • CISO of Hennepin County
Our roles as LEADERS of our organizations.
Presented by Paul Edoff • CISO of Hennepin County
Our roles as LEADERS of our organizations.
Presented by Silver Peak Systems
Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.
Presented by TechPower
Discover why businesses undergoing digital transformation need a new approach for high-end storage — one that frees IT resources to perform more innovative and strategic tasks. During this presentation, you will learn why organizations are looking for a more resilient, simpler, high-end storage experience for every mission-critical application and how they can address those challenges in their datacenter today.
Presented by Check Point Software
The details of this presentation will be available soon. Please check back for updates!
Presented by Nuvodia
We all knew this day would come. It’s time to start handing over some decision-making to the machines. We should have known once we started feeding them data that they would eventually insist on digesting it too! Let’s talk about how we got here, where the use of Artificial Intelligence and Machine Learning in IT and security is today, and how long we think it’s going to be before the machines inevitably turn on us. Or maybe we’ll be fine? We’ll explore a number of AI-infused products that are on the market now, how effective they are, and why if your IT footprint doesn’t include AI today–well, it might be time to start thinking about an upgrade.
Presented by CompuNet & F5 Networks
In an ideal world, security controls would be as loose as possible for well-behaved legitimate users and increasingly tightened around bad actors. Join us as we discuss a behavioral approach to identifying and thwarting attacks against your web applications from highly skilled threat actors.
Presented by Cerium Networks
Today’s collaboration technologies come with many exciting features and benefits–all of which impact the network in various ways. This session will help the audience understand those impacts and how to manage them. This session covers everything from inter-branch communications, survivability, collaboration beyond your walls, and ensuring your collaboration environment is secure.
Topics include:
Presented by Cerium Networks
The need for collaboration is ever-present and more important now than ever. This session provides an update on the current landscape of collaborative communications technologies and trendsboth available now and emerging in today’s marketplace. Upon completion, participants should understand how the collaboration landscape is changing from technology, administration, and business impact perspectives.
Topics include:
Presented by Sasi Pillay • VP and CIO at Washington State University
Information Technology management is all about serving the customer. IT is the enabling force for everything we do, whether it is about recruiting promising prospects, providing a sound education, improving retention and graduation rates, providing career counseling and managing the students after graduation as successful alumni. It addresses teaching, learning, research and outreach.
The foundation of IT management is built on three tenets: Mission Enablement, Enterprise Risk Reduction and Cost-effective Operations. This presentation focuses on how a portfolio of services can be created with these tenets. Making progress on IT services also requires an IT governance process. The talk will include an example of a working governance process at WSU and how it is used to create a portfolio of services for the university.
Dr. Sasi Pillay serves as the Vice President and Chief Information Officer at Washington State University. In this role he oversees the computing infrastructure of foundational technologies and research computing, working in collaboration with his constituents.
Earlier he served as the Chief Technology Officer for Information Technology (IT) at National Aeronautical and Space Administration (NASA). Dr. Pillay is the recipient of several awards including NASA’s Exceptional Service Medal and the Outstanding Leadership Medal. Additionally, the Presidential Rank Award recognizing him as a Meritorious Executive in the U.S. federal government.
Dr. Pillay received his B.S. in Mechanical Engineering from Pennsylvania State University, M.S. and Ph.D. degrees in Computer Engineering from Case Western Reserve University. He also has a master’s degree in Management of Technology from the Sloan School of Management at the Massachusetts Institute of Technology.
Presented by Community Security Coalition
With thousands of cyber security solutions out today in the market, simplifying your company’s security strategy has become more complicated than ever. Taking the holistic approach of enabling all members of your organization has never been more important or difficult. Join the CSC as they discuss the need for security education in todays every changing cyber landscape and how you can enable all employees of varying levels of technical expertise with the latest best-practices for their cyber defense.