If You Don’t Protect the Key, Don’t Encrypt the Data

  Presented by nCipher Security

For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. We will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.

Overcoming the Challenges Unstructured Data Growth with Hyperscale

  Presented by Cloudian

How do you break through the capacity barrier and gain simplicity and one-click data management in your data center, across sites, around the world, or in the cloud? Organizations are looking to do more, at less cost, and derive more value from data. We will be discussing how organizations are creating a global data fabric with simplified management across clouds.

Topics discussed will include S3 native storage as a service, how to manage and protect unstructured data, enable DR, and reduce the risk and cost associated with traditional approaches to data storage.

Transforming Technology to Fuel Innovation

  Presented by Brook Conner • Assistant Superintendent & CIO,
Hawaii State Department of Education

The Hawaii State Department of Education has embarked on a multi-year journey to move from legacy technology to a modern, cloud-based enterprise-grade environment. Most organizations want their technology environment to enable innovation, but for the public schools, innovation is table stakes. Every individual public school is charged with creating the right environment to serve the needs of their own unique community, leading to widespread innovation. So our new technology environment is being built with flexibility and agility foremost. While there’s much more work to be done, we’ve already replaced Lotus Notes with Google and are on our way to a comprehensive transformation. The end result? Technology for the students to help them lead the second half of the twenty-first century.

David Brookshire “Brook” Conner was appointed on Sept. 25, 2017 to oversee HIDOE’s information and telecommunication systems, facilities, and services of the public school system and department-wide operations. The Office of Information Technology Services (OITS) ensures that information technology and telecommunications support are being provided efficiently and effectively, and in accordance with laws, policies, and accepted principles of management. The scope of OITS’ technical oversight includes voice, data, video, information systems infrastructure, and support services for schools and for complex areas and state administrative offices. Support services to schools are exercised in collaboration with the complex area superintendent.

Conner has served in high-profile information technology (IT) positions, most recently as the first chief information security officer and vice president for Estée Lauder Companies where he constructed a cyber security program, managed a budget of $22 million and ensured compliance. He also worked for Morgan Stanley as an executive director and global head of vulnerability management, Bloomberg LP, and as an adjunct professor at New York University. Conner has also published numerous books and papers on a variety of IT topics.

How to Level Up on Information Security Risk Assessment

  Moderated by INTERFACE Advisory Council

Do the words “Risk Assessment” send knots to your stomach? Are you interested in doing an assessment, but not sure what to expect? Join the Advisory Council for a panel discussing real life experiences conducting information security risk assessments, how to get started, what to look out for and tips and tricks. You don’t have to be a walking target!

Panelists:

  • Curt Dodds • IT Manager, Institute for Astronomy, University of Hawaii
  • Russell Seeney • President, InfraGard
  • David Stevens • IT Program Director, Kapiolani Community College

Disaster Recovery for the Cloud Era

  Presented by Druva

More and more enterprises are now leveraging the cloud to increase their level of data protection and management for their applications. The ability to keep secondary, or backup data in cloud storage; eliminates traditional data centers, reduces operational complexity associated with legacy on-premise backup solutions, allows unlimited scalability, centralizes storage of all secondary data sources, provides unlimited compute, allows for additional insight and business value from that data. and finally, and finally, the ability to do automated Disaster Recovery (DR) without maintaining a DR facility.

Integrated Risk Management

  Presented by ServiceNow

Organizations need to transform inefficient processes by combining security, IT, and risk capabilities into an integrated risk program which provides continuous monitoring, prioritization, and automation to ensure rapid identification and response to risks.

Welcome to the New Age of Converged Secondary and Primary Storage

  Presented by StorageCraft

Gone are the days of deciding between a storage solution that can solve either data protection OR primary storage requirements. OneXafe is a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to protect hundreds of VMs in a few clicks? No problem. Want to recover a multi-TB VM in less than a second? No problem. Need an enterprise file serving, archiving, or VMware storage solution? No Problem. Want to seamlessly recover an application in the cloud? No Problem. Attend this seminar session to learn more and see OneXafe in action!

7 Steps to Improved Business Continuity

  Presented by Quest Software

Aaron Newsome will kick off the first half of the session discussing:

Steps to Improved Business Continuity

  • Knowing your risks (perform a risk assessment)
  • Know your data & applications (define criticality per application and not all data & apps are created equal)
  • Know your goals, set objectives for each classification
  • Know your tools, review your current capabilities against business requirements
  • Build an in-depth defense, utilize tools to achieve goals

STAY PROTECTED

  • Document your plan, get buy-in and WIN confidence
  • Challenge your plan, test your defense in layers

The Thief is in the House… Understanding and Managing Information Security

  Presented by Mart Nelson • Chief Technology Officer, Avistas

This presentation is oriented toward discussions with Senior Management. We will focus on Business Value issues, where management needs to understand enough about Information Security to be able to make risk, budget and operations decisions. It is useful for all levels of management.

Bring your questions for this open dialogue on all elements of internal Information Security.

Collaboration Abomination

  Presented by Khlood Elsayed • PMP, CISSP

With the proliferation of “collaboration” tools/gadgets, it’s easier for communication to get lost. Needless emails, poorly organized conference calls, and lousy chatter/slack posts may leave you feeling lost and ineffective. Join us for this interactive session to pick up some practical tips to help you successfully collaborate across multiple business units, functional areas, and teams to galvanize their support to deliver the best value to your stakeholders. Maybe come out the other side better looking (who knows). Just join us, alright?