Critical Capabilities for Managing Digital Risk

  Presented by RSA

Is your business rapidly adopting new technologies to keep pace with the competition? If so, you undoubtedly are experiencing new and increased digital risks related to cyber-attacks, cloud, third parties and a changing workforce. In some cases, managing these risks may require different ways of thinking and a different approach. Discover what’s driving these new risks and what critical capabilities you need to master, so that your business can innovate without limits.

AI is Everywhere: The Impact of AI in Next-gen Communications Today and Beyond

  Presented by Adam Geffner • Principal Architect at Asurion and President at Avaya IAUG Nashville-TN Chapter

What is AI, what it’s NOT, and how is it making an impact today? Artificial
Intelligence is becoming more immersive in nearly every aspect of technology and
our lives, but it’s not what most expected it to become. Many anticipated we’d
have intelligent machines that could think for themselves near, on par or even rival
a human’s intelligence by now. We’re still not there yet, but nearly 65 years since
“Artificial Intelligence” was first coined, AI is bearing some significant fruit. It’s been
an explosive decade for AI, and it’s going to become more prevalent in nearly
everything we do going forward.

One huge area of growth for AI has been in the communications sector. Real-time
universal translators that can analyze your emotional mood, intelligent sensors and
new GPS systems powering autonomous cars with 5G ultra-efficient networks, and
AI assistants in nearly every home (who doesn’t have an Alexa or Siri to call their
own?). We’ll discuss the various sub-components that make up AI, how it’s being
applied in the contact center, powering next-gen 5G networks, the potential
dangers of AI when bias is introduced, and where AI is heading next in
communications and related space.

Stop Wasting $$ On Cybersecurity!

  Presented by C Spire

Businesses are being urged from every direction to increase their cybersecurity spend and most of them think that is a good idea. Meanwhile, venture capital investment in security companies is at an all-time high creating an overwhelming catalog of products from an ever-increasing number of vendors and believe me — both vendors and investors think that increasing cybersecurity spend is a good idea. Add all of that to the fact that doing security right at scale is really difficult…and our cybersecurity problems are admittedly a hard nut to crack.

If you have a near endless budget to throw at your information security woes, this presentation is not for you. This presentation is for business stakeholders who want the highest return on investment per cybersecurity dollar and for those in the trenches who want actionable technical and non-technical recommendations to close gaps in your organization’s security posture.

Modern Technology Applications in the Healthcare Industry

  Presented by Paul Currie • Vice President and CTO at HCA Healthcare

Information Technology continues to advance at tremendous pace. Twenty years ago, doctors took notes on a legal pad and manila folders were full of paper documenting patients’ medical history. Now medical offices have tablets, IoT devices and a myriad of items that help provide better medical care through technology. This session will discuss what technologies large healthcare providers are looking towards and monitoring for the future.

Paul will share insight through his more than 15 years of service with HCA Healthcare. Join us for a local perspective from one of Nashville’s top companies.

Paul Currie is currently serving as VP and CTO at HCA Healthcare. His technology experience spans over 30 years and for the past 16 years has focused his expertise in healthcare IT. Keeping a pulse on emerging technologies and directing the technical architecture for an IT organization that supports over 185 HCA facilities and close to 900 clinics, Paul has been involved in many strategic initiatives that have changed and shifted the delivery, integration and consumption of data and applications. He is also the recipient of the Nashville Technology Council CTO of the year for 2018.

Paul’s involvement in healthcare data management, cloud strategy, collaboration, mobility and other foundational initiatives has placed him in a unique position to help influence, direct and support both mature and evolving technologies at HCA.

Zero Trust with Micro-Segmentation: Doing It the Right Way

  Presented by Guardicore

In the modern, hyper-connected and threat-laden enterprise landscape, organizations face increasing pressure to protect their systems and data.

Originally conceived in 2010, the zero-trust security concept has recently gained new ground and is now seen as a vital element of enterprise information security. It is a model that aids user and device verification, strengthens authentication processes and ensures encryption.
However, zero trust is not without its challenges, and mastering the art of zero trust takes strategic management and forethought.

In this session, we will explore the concept of zero trust, assess why it is needed in the modern enterprise and outline how micro-segmentation can help win the zero trust race for organizations.

Key takeaways:

  • Why there is a need for zero trust
  • The challenges of implementing zero trust
  • The four high-level principles of zero trust
  • How micro-segmentation can help you prepare for, implement and manage zero trust in your organization

AI: Demystifying the Dark Arts to Combat Threats  

  Presented by Vanguard Infrastructures & HPE

To combat the latest threats, cyber security vendors have no choice but to use one of the most powerful tools to emerge in decades – Artificial Intelligence. But critics are right in their concerns over the interpretability of AI solutions. How do we learn to trust the magic black boxes when even the experts can’t explain the answers produced by AI? What is AI, and how is it different than data science and machine learning? What does it mean when a cyber-security solution is AI-enabled? What are the important things to know about the different AI implementations as they relate to cyber security products? How do I trust the output / results of AI? Join us as we provide an AI primer through the lens of cyber security and dissipate the cloudiness caused by buzzwords.

Moderator:

  • Troy Cooper • Vanguard Infrastructures CEO Co-Founder

Panel Experts:

  • Vijay Richard • Vanguard Infrastructures Exec VP Co-Founder
  • Chris Kaufman • Vanguard Infrastructures Chief AI Strategist
  • Ann Hinkle • Vanguard Infrastructure Chief of Security Services
  • Scott Olsen • HPE Enterprise Architect

Nashville Is Hiring! What Do You Need to Succeed?

  Presented by Nashville Technology Council

The Greater Nashville Technology Council is a member-based organization connecting, uniting, developing and promoting technology across Middle Tennessee. More than 50,000 tech workers call the region home and the available tech talent is increasing every day. Helping to develop an even stronger technology workforce pipeline is one of the key focus areas of the NTC. This session will provide an overview of the technology workforce in Middle TN and discuss ApprentiTN, the NTC workforce initiative focused on growing and diversifying tech through a paid apprenticeship model. Join Kevin Harris from the NTC as he discusses some of the vital keys to success.

The Current Malware Threat Landscape & Enterprise Grade Remediation

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Leveraging AI to Defend Against Insider Threats in Your Digital Landscape

  Presented by Vanguard Infrastructures & HPE

The single largest vulnerability to a company’s intellectual property (IP) is their employee or the trusted insider; the person with the keys to the kingdom. However, recent media and government disclosures have expanded this threat to include machine compromises installed during manufacturing. So, the threat could come from the trusted insider or the machine an unwitting employee is utilizing. Too few companies have a strategy to adequately combat these vulnerabilities, mainly due to a lack of knowledge the events are taking place. Vanguard Infrastructures presents a strategy that marries observed human behaviors, demeanors, actions, etc., with artificial intelligence and machine learning to assist companies by providing data and creating visibility into network events that might be a threat to the company. This presentation’s goal is to put more power into the hands of the company to protect their IP, identify potential problem behaviors of trusted employees and machines, and assist the company in ensuring their future.

Moderator:

  • Troy Cooper • Vanguard Infrastructures CEO Co-Founder

Panel Experts:

  • Vijay Richard • Vanguard Infrastructures Exec VP Co-Founder
  • Chris Kaufman • Vanguard Infrastructures Chief AI Strategist
  • Ann Hinkle • Vanguard Infrastructure Chief of Security Services
  • Scott Olsen • HPE Enterprise Architect

Identity: The Future of Security

  Presented by Dave Cummings • Security/Identity Architect, HCA & Whitney Thompson • Director, Identity and Access Management, Premise Health

This panel discusses the well accepted business practice of securing an asset through a perimeter and security controls. Many current IAM solutions are no longer efficient or secure and to combat the multi trillion-dollar cybercrime industry and we need to focus on a micro perimeter around each identity.

An overview of a modern identity core that supports micro perimeters and relationships is followed by how to build your IAM program is presented.