Master the Edge: How to Achieve Context-Aware, Zero Trust Network Access

  Presented by Structured & Aruba

Have you been tasked with implementing Zero Trust Network Access but are unsure of how to go about it? Are you confused about how to achieve “minimum access”? Are you struggling with employing “continuous adaptive risk & trust assessment” on your network? If so, attend this session. Learn how to deploy an open, multi-vendor Enterprise security framework that gives security and IT teams an integrated way to gain visibility, control, and advanced threat defense. See how security prioritization and machine learning helps organizations leverage existing third-party solutions to better protect investments and implement proactive risk controls.

Why Protecting Crypto Keys is More Important Than the Data They are Protecting

  Presented by nCipher

In Part 1 Mr. Beutlich talked about the history of cryptography. As Brad discussed, throughout history, the weakest link of every encryption solution (no matter how simple or complex) was exchanging and protecting the cryptographic key. In Part 2 of this series, Brad will discuss in detail why, in the 21st century, the creation and protection of a crypto key is even more important than it’s ever been. Join Brad for another lively presentation on how important it is to protect crypto keys.

What You Don’t Understand About Crypto Can Hurt You

  Presented by nCipher

For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.

Offensive AI vs. Defensive AI: Battle of the Algorithms

  Presented by Darktrace

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against Offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.

In this session, learn about:

  • Paradigm shifts in the cyber landscape
  • Advancements in offensive AI attack techniques
  • The Immune System Approach to cyber security and defensive, Autonomous Response capabilities
  • Real-world examples of emerging threats that were stopped with Cyber AI

Shifting from ITSM to ESM as a Way to Enable and Transform the Enterprise

  Presented by ServiceNow

As a member of IT, have you found yourself doubting your relationship with the rest of the organization as you’re perceived as a cost center rather an equal part stakeholder with a common goal? Do you find yourself struggling to collaborate with the rest of the organization as the tech debt in your organization has created seemingly insurmountable silo’s? If you feel any of this describes your work environment and how IT may be perceived, please join the discussion in how the concepts of IT Service Management need to shift to a more inclusive Enterprise Service Management strategy. Ultimately, driving more effective technology purchasing, collaboration across the enterprise and re-branding of IT as an organizational enabler.

Network & Security Architectures of the Future

  Presented by Fortinet

This will be a talk focused on examining data center and enterprise architectures of the future. Where do existing products and features fall within data center or enterprise designs? Where do hybrid clouds fit in? How will Cybersecurity products and offerings continue to evolve?

Plan, Mobilize and Act: How the IT Industry in Alaska Securely Responded to a Pandemic

  Presented by INTERFACE Advisory Council

In March, we were all forced to react quickly to a global pandemic. Companies had to mobilize to enable employees to work from home. This task was placed on the shoulders of IT departments all throughout Alaska. How does this remote working environment change workflow? What challenges still remain for IT departments? Will we see permanent remote working in many industries? What security vulnerabilities did this expose and in what ways have we responded?

Join the INTERFACE-Alaska Advisory Council to discuss these topics and more. Each panelist will share their experiences from leading the deployment of remote working and offer insight into what lies ahead. The group will also touch on new security challenges that have risen from a remote working environment.

    Panelists:
    Mark Merchant • Chief Information Security Officer, Municipality of Anchorage
    Jim Bates • President, LMJ Consulting
    Ubon Boutsomsi • Chief Technology Officer, RIM Architects
    Ulf Asplund • Manager, Technical Services, Alaska Court System

Gain Confidence, Skillsets, and Knowledge to Migrate to The Cloud

  Presented by Alaska Communications

This discussion will focus on the methodology and criteria when selecting business applications for migration to public cloud. Topics will include myths debunked, collaborative applications, IT support following transition, and OPEX versus CAPEX. Hear from experts that have helped moved business applications to both public and private cloud instances.

Find Your Balance in the Cloud

  Presented by Quest Software

Feel like you’re performing a high-wire balancing act in your role as IT Manager or Infrastructure Admin? Performance monitoring and capacity planning can be a real challenge, regardless of your infrastructure design. You’ve got to decide what compute and storage resources are needed and predict when they’ll be needed. You’ve also got to balance the competing priorities of staying within budget and providing acceptable service levels to users. But these days you’re no longer simply managing an on-premises data center, you’ve also got to figure out which workloads to move to the cloud, how best to get them there, and how to manage them in the cloud for the long term.

With all this increased complexity, comes the need for more robust performance monitoring tools to help you manage your hybrid environment and give you the means to resolve issues quickly. Finding the right solution can even help simplify the planning and execution of your cloud migration. Come join Quest to learn more.

SD-WAN Edge Transformation for the Cloud-First Enterprise

  Presented by Silver Peak

As cloud adoption and SD-WAN innovation hastens, global enterprises are transforming how they build and secure wide area networks. Leveraging automation, enterprises can deploy, connect and secure hundreds of sites per week, a feat not possible with a traditional device-centric approach.

During this session, we’ll discuss how the unification of SD-WAN, WAN optimization, routing and security in a single, centrally orchestrated platform:

  • Delivers superior application performance wherever apps are hosted
  • Increases the quality of experience for end users and for IT
  • Simplifies branch WAN edge architecture