SD-WAN Edge Transformation for the Cloud-First Enterprise

  Presented by Silver Peak

As cloud adoption and SD-WAN innovation hastens, global enterprises are transforming how they build and secure wide area networks. Leveraging automation, enterprises can deploy, connect and secure hundreds of sites per week, a feat not possible with a traditional device-centric approach.

During this session, we’ll discuss how the unification of SD-WAN, WAN optimization, routing and security in a single, centrally orchestrated platform:

  • Delivers superior application performance wherever apps are hosted
  • Increases the quality of experience for end users and for IT
  • Simplifies branch WAN edge architecture

What’s Next?

  Presented by Mike Baca • Chief Information Officer, New Mexico Taxation and Revenue Department

Interesting developments, new approaches to old problems, new paradigms of doing business, even the talent pool is changing. 2020 presented a huge catalyst for transformation and we can see the customer experience, and our professional lives, will dramatically change forever. Government institutions are choosing to keep up with the industry leaders, and in many ways are laying the groundwork and spearheading the lasting evolution.

As the CIO for both the NM Motor vehicle and Tax Department, Mike will share an interesting cross jurisdictional perspective that demonstrates the convergence of technology with new ways of performing. We are going places faster than we ever dreamed possible. Join us for an exciting look at “What’s next?”

Mike Baca is the CIO for New Mexico’s Taxation and Revenue Department (TRD) and has over 25 years of experience in information technology. Prior to joining the TRD, Mike was the Director of the New Mexico Department of Information Technology Enterprise Project Management Office (EPMO). While building NM’s EPMO, Mike worked directly with NM CIO’s focusing on legislative policy, technology budgeting, and ensuring successful enterprise project implementation (we went from huge failures to an 87% success rate – on time, on budget, complete adoption). Other significant milestones include the passage of legislation consolidating technology in NM under the Department of Information Technology, NM’s Sunshine laws, and a long history of successful business case and technology appropriations. Mike also has background data analytics.

Mike is many things – poet, painter, teacher, vegetarian cowboy, the Director of NM’s EPMO, and most recently the CIO for New Mexico’s Taxation and Revenue Department and Motor Vehicle Division.  His background includes holistic data mining, rescuing endangered IT projects, and organizational transformation. On the personal side he loves chocolate chip cookies, motorcycles, and libraries.

Extended Detection and Response (XDR)

  Presented by Trend Micro

As the global threat landscape continues grow and evolve, security tool sprawl is a common concern among many organizations. These tools are generating an overwhelming amount of data that lacks context and is not immediately actionable. While many modern security solutions have some built in integration functionality or API capabilities for integration into the larger security tools footprint, many require some sort of “glue” in order to build a cohesive cross-platform detection and response strategy. This presentation will highlight the importance of developing an Extended Detection and Response (XDR) strategy that utilizes all of that valuable data and gets your organization to remediation quickly and confidently.

Work from Anywhere: The New Norm For Public Sector

  Presented by Nutanix

As we have seen in 2020, many companies are working to enable their employees to have a work from home capability. However, there are many factors that contribute to whether that will be possible or not. Are their apps supported? What devices are supported? How secure will they be? What latency issues will they incur and where is the data locality?

All of these topics and more will be addressed.

Enduring from Home: COVID-19’s Impact on Business Security

  Presented by Malwarebytes

All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.

CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

Automating the Analyst

  Presented by Darktrace

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks is rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms.

Hot Topics in ComPriSec

  Presented by INTERFACE Advisory Council

Compliance, Privacy, and Security (ComPriSec) Professionals struggle in their role with competing priorities and responsibilities. This panel of ComPriSec industry experts defines each role, provides management strategies, and explains solutions for common challenges. Any gaps are room for lawsuits, breaches, and leaked data. Here you will learn how to bridge the new normal worlds of ComPriSec.

Moderated by:
Ron Woerner, CISSP, CISM • Technology Professor for the College of Science and Technology, Bellevue University

Panelists:
Rob LaMagna-Reiter, CISSP, CISM, CDPSE, CHP, PCIP, Sec+ • Chief Information Security Officer, FNTS
Lisa McKee, CISA, CDPSE, PCIP, MSSL • Senior Manager Security and Privacy Solutions, Protiviti
Matt Morton, HCISPP, CISM, CISSP, CGEIT • Board Member for NebraskaCERT

ICS and Cybersecurity’s Critical Path

  Presented by NebraskaCERT

Industrial Controls Systems are increasingly vulnerable to attack. Organizational budgets don’t always allow for the full replacement of operational technology (OT) or building automation management (BAM) equipment that was initially purchased on a longer lifecycle than most typical IT purchases. Security is becoming paramount to ensuring access to critical systems and information and continues to be an exploitable risk in organizations, even during a pandemic, due to ransomware, phishing, and poor asset management techniques. Strategic security that is aligned with your organization needs to be balanced with the budget, risk, and organizational culture.

How do organizations implement critical security controls while still supporting the goals of production, user experience, and efficiency? When buildings are designed and built, and the building administration systems are put into place, how does this impact the risk of healthcare, manufacturing, or financial organization? Are those systems part of the cybersecurity risk analysis?

During this presentation, attendees will review best practices on both sides of the ICS security and IT security continuum. In addition, a simple approach that focuses on the fundamentals of security to reduce risk in these environments is presented. Attendees will walk away from this workshop with actionable knowledge on how to facilitate the conversation as to how OT/BAM security and IT security must work together to align risk with cost in most environments. 

Presenter: Matt Morton • Board Member for NebraskaCERT