Achieving “Always On” IT Resilience

  Presented by Zerto

It’s time to revolutionize your data protection strategy. Protecting and transforming your digital business for exceptional customer experiences requires an “always on” platform for disaster recovery, backup and cloud mobility. In this presentation, we’ll discuss how to cost-effectively and swiftly manage both unplanned disruptions, including outages, ransomware attacks, and natural disasters, as well as planned events, such as moving to the cloud or data center consolidations.

Vulnerability Mitigation Techniques for Securing the Enterprise

  Presented by Trend Micro

A primary component in securing and protecting your data, is ensuring technologies at all levels are patched and secured, as part of a Vulnerability Management program. According to US-CERT, an increasing number of new application vulnerabilities are found each year. More alarming a 2018 Frost & Sullivan report shows that the number of reported Zero Day vulnerabilities in 2017 has reached 1,522. Organizations must take steps to assess their organizational risk and implement a Patch/Vulnerability Management process to secure and protect their data and infrastructure.

The “People Factor” of Digital Transformation

  Presented by Michael Dietrich • Chief Information Officer-State of Nevada

There is widespread adoption of Digital Transformation strategies in business, and as such technology roles changing. IT teams are becoming more visible, and IT leaders are moving from the back-office to having a seat at the business strategy planning table. Are you ready for this evolution? The increased visibility, accountability, and clarity of linkage between technology and business outcomes demands that technical leaders and staff evolve from pure technologists to business enablers. When implementing a technology solution, it is critically important to know “what done looks like” through the lens of the business and from the perspectives of the employees who will use, and benefit from, the solution. Nevada State CIO Michael Dietrich will speak to the importance of cultural change and adoption both within IT teams and at all levels of the business.

Michael joined the State of Nevada as CIO in early 2018 and immediately set out to change the tech culture by encouraging movement away from siloed solutions in favor of collective and unified enterprise technology decisions. Prior to public service, Michael spent 25 years in the private sector, leading large product development and engineering organizations, as well as merger and acquisition technical integration activities.

Michael’s passion is finding the truly meaningful ways that technology can lead to better business outcomes and enhance our lives. To this end he is often heard using the phrase “Know what done looks like” which means seeing the end result from the point of view of the customer, regardless of their tech skill level, to ensure that a technology solution delivers what is needed seamlessly and effortlessly.

Michael is frequently quoted not only for his futurist outlook, but also on the interface of life and technology enhancements that are frictionless to the point of being invisible. “I think this ingrained philosophy has helped me be a better technology leader… no conversation about the benefits of any technical solution should be about the tech itself, but rather what it can do for us.”

“The technology landscape is changing at an unprecedented rate. Traditional Information Technology — the implementation of office, productivity tools and connectivity— is being rapidly supplanted by Digital Transformation: the movement of all business and information resources and functions into the digital realm. The opportunity to apply my considerable experience and learnings to lead the digital transformation of Nevada is a dream come true. I am very excited about this role, and grateful for the opportunity to serve the State.”

Michael has lived in Nevada most of his life. Since moving here over 30 years ago it is the place he calls home. When he is not immersed in the digital world, Michael enjoys all things two-wheeled, classic American muscle cars, and creating art and music.

From IT to IoT: The Future is Now!

  Daniel Price • CEO of Breadware

The internet is growing and so are smart devices. Homes are flooded with IoT devices as is your office. By 2020, an estimated 95% of new electronic devices will be equipped with IoT technology. Are you prepared for this? What issues will arise with IoT products that come into your system? What vulnerabilities do you need to be aware of?
Join Daniel Price, CEO of Breadware for a discussion on the IoT landscape. Daniel is the CEO and co-founder of Breadware. He brings a deep background of technology leadership and product design. He is passionate about the new opportunities that are being unlocked in our personal lives and our businesses in the era of intelligent, connected devices. Bring your questions as well so you can be prepared to handle the ever-changing landscape.

Architecting the New SD-WAN Edge for the Cloud-first Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Breaking Security Silos: How Better Integration Mitigates Cybercrime Expos

  Presented by Fortinet

Many solutions exist to solve particular security and technical issues in your network. But as solutions are added, complexity is increased as ‘Silos’ are created and visibility suffers. By breaking down these ‘Security Silos,’ you can get a better overall picture of what’s transpiring on your network as well as reducing your overall attack surface. Key topics of Malware propagation, common threat vectors, encryption complications, and pragmatic approaches to defense will be presented to the attendee.

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization’s boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization’s core business strategy.

Ten Easy Things That You Can Do to Secure Your Cyber Presence

  Presented by Tim Stadler • IT Security, Osage Casinos

Whether it is protecting your personal information or company data, there are many items that you have direct control over. Join Pedro Serrano of ISSA Oklahoma for a rundown of simple, low-cost, methods you can implement to secure your cyber presence. You will receive useful tips on limiting exposure, multi-factor authentication and simple backup methods that will save you headaches down the road. Also bring your questions so that you can get help with your needs.