Ransomware Protection Doesn’t Have to Break the Bank

  Presented by StorageCraft

Ransomware attacks have increased over 130% since the COVID crisis. Everyone is a target and even those with preventative measures in place are at risk. We will review some of the latest attacks and offer best practices in how to protect your organization without increasing budgets.

Cyber AI and Geopolitics: Managing Tomorrow’s Cyber Risk

  Presented by Darktrace

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher. Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and Americas CISO, JR Tietsort to discuss this new era of cyber-threat and how Cyber AI can help defenders regain the upper hand.

This speaking session will include a Q&A with our experts, and explore:

  • How nation-state attacks are changing
  • How organizations can respond to the classic balance of security and productivity
  • How organizational maturity in risk management is maintained whilst ensuring cyber defense

Plan, Mobilize and Act: How the IT Industry in Idaho Securely Responded to a Pandemic

  Presented by INTERFACE Advisory Council

In 2020, Idaho was forced to react quickly to a global pandemic. Companies had to mobilize to enable employees to work from home. IT departments all throughout the state took on this task. How does this remote working environment change workflow? What challenges remain? Will we see permanent remote working in many industries? What security vulnerabilities did this expose and in what ways have we responded?

Join the INTERFACE-Boise Advisory Council to discuss these topics and more. Each panelist will share their experiences from leading the deployment of remote working and offer insight into what lies ahead. The group will also touch on new security challenges that have arisen from a remote working environment.

Presenters:
Laurel Caldwell • Director of ITS, Latah County
Herman Doering • HIPAA Information Security Officer, St Luke’s Health System
Jerry Hindberg • Associate Director of Network & Cybersecurity, Lewis-Clark State College

Digital Health at Pandemic Speed

  Presented by INTERFACE Advisory Council

In March of 2020, the IT industry was forced to adapt quickly in response to COVID-19. No line of business had to adapt more than healthcare. Using cutting-edge technology, the healthcare response to this pandemic has moved rapidly. Join Dwight Pond, of Saint Alphonsus Health System, to learn about the many developments that have already been achieved. He will share many practical examples of how technology has moved at an advanced rate in 2020. Also, Dwight will look at what the future has in store for the healthcare industry and how technology will play a pivotal role.

State of Business Continuity Disaster Recovery, What Hinders DR Planning?

  Presented by Veeam

Today’s applications and data sets are larger, more complex, distributed and interdependent than ever. While many have a disaster recovery plan in place, executing, testing and documenting these plans is often complex and cumbersome. Join us to learn more about:

  • Why a backup strategy is not a DR strategy.
  • Democratized DR of today
  • How tedious, manual procedures can be completely automated, and at accessible cost

IT Interrupted: Best Practices in Disaster Recovery Planning

  Presented by Zerto

As IT application availability requirements continue to evolve, technology continues change to meet the new requirements. Join us as we discuss planning considerations for bringing your virtualized workloads into the next generation of IT resilience. You will learn about data center options to consider as part of your recovery strategy, business and technical trade-offs that will have to be made, capacity planning considerations, and testing approaches to that are possible that will optimize application up-time.

Idaho’s Cyber Security Initiatives and Resources

  Presented by Keith Tresh • CISO, State of Idaho

Join the State of Idaho’s Chief Information Security Officer, Keith Tresh, for a rundown of resources that are currently available to all throughout Idaho. Cyber Security is not just the responsibility of one IT professional in an office, it is up to all Information Technology Professionals. Keith will layout the initiatives he is currently involved in to spread awareness and offer up help. He will detail the partnerships he is engaged in with Idaho Counties to combat cybercrime. Help for you is available now, join us to learn more.

Retired Army Colonel and strategic executive with C-level success in strategic planning, capacity/cost projections, IT governance, and BI solutions. Logical thinker and strong communicator noted for transforming IT organizations and building cohesive/productive teams to support enterprise-wide infrastructures. Quality-focused leader with both Federal and State Government expertise.

Builder of productive and responsive IT organizations that enhance customer/user experiences with a strategic vision in mind. Vast experience as an Information Technology and Information Security professional and all aspects of IT management including Strategic Planning. Direct experience in information management/security including cybercrime and cyberwarfare, project management, infrastructure engineering, application development, and budget management. Currently holds a Top Secret (SCI) clearance.

Ransomware Protection Doesn’t Have to Break the Bank

  Presented by StorageCraft

Ransomware attacks have increased over 130% since the COVID crisis. Everyone is a target and even those with preventative measures in place are at risk. We will review some of the latest attacks and offer best practices in how to protect your organization without increasing budgets.

Hyperskill Network Security Introduced

  Presented by Check Point Software

The IT industry has a new way to utilize current hardware investment and maximize appliance capacity in an easy-to-manage Hyperscale network security solution. Organizations can now simplify their workflow orchestration and scale up their existing security gateways on demand — the same way as they can spin up new servers and compute resources in public clouds. Join Check Point Software for an in-depth look.