Leveraging AI to Defend Against Insider Threats in Your Digital Landscape

  Presented by Vanguard Infrastructures & HPE

The single largest vulnerability to a company’s intellectual property (IP) is their employee or the trusted insider; the person with the keys to the kingdom. However, recent media and government disclosures have expanded this threat to include machine compromises installed during manufacturing. So, the threat could come from the trusted insider or the machine an unwitting employee is utilizing. Too few companies have a strategy to adequately combat these vulnerabilities, mainly due to a lack of knowledge the events are taking place. Vanguard Infrastructures presents a strategy that marries observed human behaviors, demeanors, actions, etc., with artificial intelligence and machine learning to assist companies by providing data and creating visibility into network events that might be a threat to the company. This presentation’s goal is to put more power into the hands of the company to protect their IP, identify potential problem behaviors of trusted employees and machines, and assist the company in ensuring their future.

Moderator:

  • Troy Cooper • Vanguard Infrastructures CEO Co-Founder

Panel Experts:

  • Vijay Richard • Vanguard Infrastructures Exec VP Co-Founder
  • Chris Kaufman • Vanguard Infrastructures Chief AI Strategist
  • Ann Hinkle • Vanguard Infrastructure Chief of Security Services
  • Scott Olsen • HPE Enterprise Architect

How to Solve the Toughest Challenges in Cloud Security

  Presented by Sophos & Pine Cove Consulting

In an ever-changing, auto-scaling environment, continuous visibility of your public cloud infrastructure is vital. Join Pine Cove Consulting and Sophos Security as we discuss how you can use the power of AI and automation to simplify compliance, governance and security monitoring in the cloud.

Visibility is the foundation on which all public cloud security policies and activities are built. We will discuss how to monitor multiple cloud provider environments including Amazon Web Services (AWS) accounts, Microsoft Azure subscriptions, Google Cloud Platform (GCP) projects, Kubernetes clusters, and development code repositories. With superior visibility, layered with compliance and DevSecOps policies controls and alerts, teams can take control and build on their cloud security strategy with confidence.

Join us to learn how building a complete picture of architecture, including a full inventory and real-time network topology visualization including hosts, networks, user accounts, storage services, containers, and serverless functions, can help you improve your cloud security challenges.

Welcome to the New Age of Converged Data Protection

  Presented by Storage Craft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won’t be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

Bridging the Gap in CISO/Board Communications

  Presented by Michael Lines • Principal-Heuristic Security

A discussion of the challenges that exist in achieving effective communications and partnership with the board & executive management by the CISO. All too often CISOs are accused (rightly) of not speaking the language of the board. Understanding the board’s priorities, and how to align the security program and communications about it to that, are key to effective board/CISO relationships.

The Top 5 Challenges for Desktop and App Virtualization

  Presented by Bitdefender

Businesses with large office or task-based workforces are increasingly moving to application and desktop virtualization. This is because virtualization technologies, both applications and virtual desktop infrastructure (VDI), offer IT organizations and their end users an array of choices in accessing applications and desktops. And, as organizations adopt digital workspaces, they naturally expect a higher-quality user experience. Unfortunately, virtualization brings both new and unique security challenges with it.

This presentation will cover the top challenges that enterprises face and will cover suggestions to identify a security solution that complements your virtualization initiatives and makes both the Infosec team and users happy.

Finally Eliminate Outlook PSTs with Office365

  Presented by PST Migrator

Once the solution to small Microsoft Exchange mailbox limits, Outlook PSTs have now become the epitome of technical debt. PSTs increase costs when stored on enterprise storage and backup systems. They are constant headaches to end users and support staff. In addition, they are legal and recovery risks. Thanks to Office365, and large mailbox limits, they are no longer needed. This session will help participants with a “how to guide” for finally eliminating PSTs. From building the business case to implementation, including common snares.

Ruminations, Musings and Contemplations of an Extant CIO

  Presented by Dr. Patrick Burns • Vice President for IT and Dean of Libraries, Colorado State University

The presentation will begin by asking what constitutes success for a CIO in a modern higher educational setting. What modern trends in higher education will be covered by asking, “Is this time different?” How higher ed’s funding model has changed recently along with the public’s perception that higher education has gotten too expensive will be shown to be misunderstood. We will ask, “How much are students learning?” and conclude from data, distressingly, “not much.” We will explore the student behaviors that influence their learning as well as their success – retention, persistence, and graduation.

These modern trends constitute a crisis in higher education, which has caused many CIOs to shift their focus recently to be much more involved in higher-level academic functions and student learning. Strategies to help students learn faster, better and more will be presented, followed by trade-offs that must be addressed in today’s IT environment in higher ed: focusing attention on higher-level learning yet ensuring that the “IT plumbing” must still work to near perfection. Also, why achieving this trade-off effectively is so deucedly difficult in today’s environment will be addressed. Come listen to Dr. Patrick J. Burns as he addresses the question: “Are CIOs being successful in IT in higher ed today?”

Dr. Burns received his PhD in Mechanical Engineering in 1978 from the University of California at Berkeley in the area of heat transfer and energy systems. He joined the Mechanical Engineering department at Colorado State University in August of 1978 and performed research and teaching in that department for 20 years, receiving four teaching awards, and rising to the rank of full professor. In January 1998, he became Director of Academic Computing and Networking Services at Colorado State University, and eventually became the Vice President for Information Technology. In July 2008, he was given the joint appointment as interim Dean of CSU Libraries and became Dean of CSU Libraries in 2010. He has taught undergraduate and graduate students in STEM disciplines for over forty years. He is intimately involved in transforming the higher education pedagogical environment as CSU’s primary representative to the Unizin next generation learning consortium, co-PI on CSU’s Integrated Planning and Advising for Student Success grant from EDUCAUSE, and CSU’s Adaptive Analytics Platform grant from the Association of Public and Land-grant Universities.

The Secret Sauce to Attract and Manage the Millennial Workforce

  Moderated by INTERFACE Advisory Council

With 75% of the workforce being Millennials by the year 2025 we can no longer avoid the differences that this generation bring to the table. They are the 1st generation who are fully raised in a digital age. We will be discussion different ways to attract the individuals who fall into this demographic as well as management techniques needed to effectively develop and retain them. Not only are they employees, but with this percentage, they will be advancing into leadership roles.

Physical Security in an IT World

  Presented by Eric Smith • President of ASIS Denver Mile-Hi Chapter

This session will focus on the protection of information technology systems from physical threats, both internal and external. Learn how to develop an understanding of key physical security controls and how those can by layered to protect an organization. Creating a strategic plan for physical controls is critical to long-term success, as well as building the right partnerships to achieve those goals. Join this conversation and learn more about how physical security controls will protect your vital information.

The Current Malware Threat Landscape & Enterprise Grade Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.