Master the Edge: How to Achieve Context-Aware, Zero Trust Network Access

  Presented by Aruba & Structured

Have you been tasked with implementing Zero Trust Network Access but are unsure of how to go about it? Are you confused about how to achieve “minimum access”? Are you struggling with employing “continuous adaptive risk & trust assessment” on your network? If so, attend this session. Learn how to deploy an open, multi-vendor Enterprise security framework that gives security and IT teams an integrated way to gain visibility, control, and advanced threat defense. See how security prioritization and machine learning helps organizations leverage existing third-party solutions to better protect investments and implement proactive risk controls.

SD-WAN Edge Transformation for the Cloud-First Enterprise

  Presented by Silver Peak

As cloud adoption and SD-WAN innovation hastens, global enterprises are transforming how they build and secure wide area networks. Leveraging automation, enterprises can deploy, connect and secure hundreds of sites per week, a feat not possible with a traditional device-centric approach.

During this session, we’ll discuss how the unification of SD-WAN, WAN optimization, routing and security in a single, centrally orchestrated platform:

  • Delivers superior application performance wherever apps are hosted
  • Increases the quality of experience for end users and for IT
  • Simplifies branch WAN edge architecture

IT Interrupted: Best Practices in Disaster Recovery Planning

  Presented by Zerto

As IT application availability requirements continue to evolve, technology continues change to meet the new requirements. Join us as we discuss planning considerations for bringing your virtualized workloads into the next generation of IT resilience. You will learn about data center options to consider as part of your recovery strategy, business and technical trade-offs that will have to be made, capacity planning considerations, and testing approaches to that are possible that will optimize application up-time.

Why Every Business Needs a Business Continuity & Disaster Recovery Strategy

  Presented by Veeam

Today’s applications and data sets are larger, more complex, distributed and interdependent than ever. While many have a disaster recovery plan in place, executing, testing and documenting these plans is often complex and cumbersome.

We’ll also discuss:

  • State of BCDR today and what hinders DR planning for most companies
  • Why backup strategy is not DR strategy
  • Democratized DR of today (how tedious, manual procedures can be completely automated, and at accessible cost)

It Ain’t Done ‘Til It’s Automated: Security at the Speed of DevOps

  Presented by Check Point

Companies are rapidly migrating applications and workloads to the cloud. For many this is a Software as a Service for a first option, with migration to public cloud second, and only if necessary will workloads be deployed inside of the legacy data center. This is further complicated by the desire to accelerate the development lifecycle allowing devops to drive the IT migration. InfoSec is playing catchup to the business and devops constant acceleration.

In this session, you will learn strategies and best practices for allowing SecOps to keep up with the Speed of DevOps, as well as fundamental security knowledge applicable for any workload migration to any cloud provider.

FBI Cybercrime Overview

  Presented by Casey Harrington • Special Agent, FBI

Ever wonder what your local FBI office is doing to combat Cybercrime? Join Special Agent Casey Harrington for an overview of information you need to know about possible threats. He will share resources that are available to you.

Special Agent Casey Harrington is the current supervisor of the FBI Cyber Task Force in Salt Lake City, Utah. Prior to his arrival in Utah in 2020, SSA Harrington spent 14 years working on the Cyber squads in the New Haven and Boston Field Offices, as a supervisor at the FBI Cyber Division Headquarters in Washington D.C, and as an Assistant Legal Attaché in Frankfurt, Germany.

Speaker: Casey Harrington • Special Agent, Federal Bureau of Investigation

Why Every Business Needs a Business Continuity & Disaster Recovery Strategy

  Presented by Veeam

Today’s applications and data sets are larger, more complex, distributed and interdependent than ever. While many have a disaster recovery plan in place, executing, testing and documenting these plans is often complex and cumbersome.

We’ll also discuss:

  • State of BCDR today and what hinders DR planning for most companies
  • Why backup strategy is not DR strategy
  • Democratized DR of today (how tedious, manual procedures can be completely automated, and at accessible cost)

IT Interrupted: Best Practices in Disaster Recovery Planning

  Presented by Zerto

As IT application availability requirements continue to evolve, technology continues change to meet the new requirements. Join us as we discuss planning considerations for bringing your virtualized workloads into the next generation of IT resilience. You will learn about data center options to consider as part of your recovery strategy, business and technical trade-offs that will have to be made, capacity planning considerations, and testing approaches to that are possible that will optimize application up-time.

Architecting for the Agentless

  Presented by Gigamon

Today’s networks are swarming with IoT, OT, and virtual devices of every size and shape. As they have proliferated, and the security attack surface has likewise increased, the market has responded with a wide variety of technologies to help understand, manage, and secure just what is on your network. This is the rise of the technologies classified as “agentless” and there is a good chance you will be looking, now or in the future, at a project that comprises such technologies. While much of what is fundamentally required to enable these technologies is not new, organizations struggle with trying to implement these on an “ad hoc” basis, with little thought to future considerations or scale. This presentation will take about a more strategic approach to handling these implementations, what a visibility fabric is, and how today’s organizations can architect their environments for their future needs.

Improving the Government Experience

  Presented by Mike Hussey • Chief Information Officer, State of Utah
Phil Bates • Chief Information Security Officer, State of Utah

State Government faces many challenges when it comes to providing services to citizens. Join Michael Hussey to find out what the State of Utah is doing to stay secure, adopt innovative technologies, collaborate with public sector and private sector, adapt to the new way of working, and upskill employees. Michael will also be joined by Phil Bates, Chief Information Security Officer for the State of Utah.

Michael Hussey was appointed Chief Information Officer (CIO) for the Department of Technology Services in October 2015. As CIO, he is responsible for the administration and supervision of a dedicated IT workforce that provides innovative services to Utah agencies and residents.

The Department of Technology Services is the IT service provider for over 20 state agencies in Utah. Utah is a leader in providing innovative, secure, and cost-effective technology solutions that are convenient and empower partner agencies to better serve the residents of the state. Mike has led Utah in eGovernment to provide over 1,300 services online, modernized all mainframe applications, made developments for data center migration to cloud, and has created efficiencies through easy-to-use, accessible, and innovative government services. Mike currently serves as the Vice President of the National Association of State Chief Information Officers (NASCIO), the premier network and resource for state CIOs and leading advocate for technology policy at all levels of government.

Hussey was born in West Covina, California and moved to Utah with his family at the age of 15. He and his wife are the parents of five children. He is a loyal University of Utah sports fan. Hussey has a passion for learning and enjoys staying current on emerging technologies.

Phil Bates is the Chief Information Security Officer for the Department of Technology Services, State of Utah. He has been involved in Cyber Security for many years, as the IT Director for the Department of Public Safety Phil aided in the creation of the Utah Cyber Task Force. Phil began his career in Law Enforcement, retiring as a Lieutenant from the West Jordan Police Department. While at West Jordan, Phil directed the deployment of the first large-scale use of Commercial Mobile Data for Public Safety in the US.