Hyperskill Network Security Introduced

  Presented by Check Point Software

The IT industry has a new way to utilize current hardware investment and maximize appliance capacity in an easy-to-manage Hyperscale network security solution. Organizations can now simplify their workflow orchestration and scale up their existing security gateways on demand — the same way as they can spin up new servers and compute resources in public clouds. Join Check Point Software for an in-depth look.

SD-WAN Edge Transformation for the Cloud-First Enterprise

  Presented by Silver Peak

As cloud adoption and SD-WAN innovation hastens, global enterprises are transforming how they build and secure wide area networks. Leveraging automation, enterprises can deploy, connect and secure hundreds of sites per week, a feat not possible with a traditional device-centric approach.

During this session, we’ll discuss how the unification of SD-WAN, WAN optimization, routing and security in a single, centrally orchestrated platform:

  • Delivers superior application performance wherever apps are hosted
  • Increases the quality of experience for end users and for IT
  • Simplifies branch WAN edge architecture

Staying Secure While Working from Home

  Presented by Trend Micro

Working from home has become almost ubiquitous in these times of COVID-19. Quarantining your devices while away from the office is not an acceptable solution to the many risks that exist outside of your corporate network. Please join Trend Micro to discuss the many ways you can help ensure that working from home does not compromise the security posture of your organization.

Modern Applications Need Modern Network and Security Controls

  Presented by CompuNet

This discussion will present the many issues facing organizations today as applications become more mission-critical than ever. Organizations must adopt new strategies and techniques to ensure that their customer-facing applications remain available and secure, even in the face of ever-changing customer requirements, a shift to a mobile workforce, and more threats than ever before. CompuNet and F5 Networks will discuss the new ways that companies can protect their applications without a dramatic increase in complexity and budget requirements.

Plan, Mobilize and Act: How the IT Industry in Nevada Securely Responded to a Pandemic

  Presented by INTERFACE Advisory Council

In March, we were all forced to react quickly to a global pandemic. Companies had to mobilize to enable employees to work from home. This task was placed on the shoulders of IT departments all throughout Nevada. How does this remote working environment change workflow? What challenges remain for IT departments? Will we see permanent remote working in many industries? What security vulnerabilities did this expose and in what ways have we responded?

Join Barbara Guerin and Jeff Jorczak from Renown Health as they discuss these topics and more. They will share their experiences from leading the deployment of remote working and offer insight into what lies ahead. They will also touch on new security challenges that have arisen form a remote working environment.

Motivating Employees in 2020

  Presented by INTERFACE Advisory Council

So many companies have been utilizing remote working for several months now. What are the tricks we have learned about motivating employees to stay productive? Is positive reinforcement a better approach than negative? How have IT departments been involved in this process? Join the INTERFACE-Reno Advisory Council for a discussion on getting the most out of employees. We will also look forward to what processes will continue to be like for all your employees and customers alike.

Work from Home: Do You Have a Strategy?

  Presented by Nutanix

As we have seen in 2020, many companies are working to enable their employees to have a work from home capability. However, there are many factors that contribute to whether that will be possible or not. Are their apps supported? What devices are supported? How secure will they be? What latency issues will they incur and where is the data locality?

All of these topics and more will be addressed.

Offensive AI vs. Defensive AI: Battle of the Algorithms – Cyber AI & Geopolitics

  Presented by Darktrace

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher. Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and Americas CISO, JR Tietsort to discuss this new era of cyber-threat and how Cyber AI can help defenders regain the upper hand.

This speaking session will include a Q&A with our experts, and explore:

  • How nation-state attacks are changing
  • How organizations can respond to the classic balance of security and productivity
  • How organizational maturity in risk management is maintained whilst ensuring cyber defense

Find Your Balance in the Cloud

  Presented by Quest Software

Feel like you’re performing a high-wire balancing act in your role as IT Manager or Infrastructure Admin? Performance monitoring and capacity planning can be a real challenge, regardless of your infrastructure design. You’ve got to decide what compute and storage resources are needed and predict when they’ll be needed. You’ve also got to balance the competing priorities of staying within budget and providing acceptable service levels to users. But these days you’re no longer simply managing an on-premises data center, you’ve also got to figure out which workloads to move to the cloud, how best to get them there, and how to manage them in the cloud for the long term.

With all this increased complexity, comes the need for more robust performance monitoring tools to help you manage your hybrid environment and give you the means to resolve issues quickly. Finding the right solution can even help simplify the planning and execution of your cloud migration. Come join Quest to learn more.

Building A Security Culture in a Customer Service World

  Presented by Dan Hammerling • Chief Information Security Officer, Peppermill Casinos, Inc.

Whether we like it or not, all IT positions are involved with customer service. At the same time, the changing nature of cybersecurity and external regulations has necessitated that we consider business opportunities in light of the security and privacy risks. Through relationship building with key decisionmakers and providing continuous training to all members of an organizational team, we can work to make security a foundational element of our business operations.

H. Daniel Hammerling is an accomplished IT Security leader and US military veteran. He brings over 20 years of IT and IT Security experience to his current role with Peppermill Casinos Inc. Dan holds a Bachelor’s Degree in Business management as well as a CISSP and CISM. Among his volunteer work and family life, Dan is a member of ISACA, (ISC)2, ASIS International, InfraGard, and the USSS-ECTF. In his most recent endeavor, Dan has become a content creator and twitch streamer.