Remote Working: How to Control the Uncontrollable

  Moderated by INTERFACE Advisory Council

Panelists:

  • Nyle Stoddard, Manager • Information Technology, RR Donnelley
  • Danny Yeo • IT Director, College of Life Sciences, BYU
  • James Duckett • Manager, Technology, City of St. George

Innovation and Evolution: BC/DR for Today’s Multi-Cloud Environments

  Presented by Unitrends

We are living in a “Less is More” world. In a landscape that’s rapidly changing, IT professionals are managing more work, projects, and risk than ever before. While external threats such as malware and natural disasters cause significant downtime and data loss without proper BCDR implementation, organizations must also be prepared to safeguard from within. Data continues to grow at an exponential rate, and not only on-premises. As cloud-delivered solutions such as IaaS and SaaS are rapidly adopted by an increasing number of organizations, and the workforce itself is becoming increasingly dispersed and mobile, organizations must consider data protection strategies to address gaps in BC/DR outside the traditional data center. Join Adam Marget, Technical Specialist from Unitrends, as we explore the evolving landscape of data protection, cloud’s growing role, BC/DR strategies to safeguard local, remote, and cloud-based workloads, and best practices in planning your DR approach.

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Cyber Security in 2019

  Presented by Fortinet

In today’s quickly evolving technical landscape, defending networks from known and unknown threats is more critical than ever before. Join speaker Cory Sober, Systems Engineering Manager from Fortinet as he discusses how to concentrate the value of your security-related investments towards leveraging cyber security solutions as key business enablers that deliver highly reliable, fast and secure services to end-users no matter their locale, device type or level of security awareness.

Threats to Public Cloud Workloads

  Presented by Trend Micro

This presentation will revolve around the various threats workloads are susceptible to as more and more organizations shift from on-premise to the cloud. This will focus primarily on public cloud infrastructure but many of the concepts will apply directly to private cloud/on-prem data center infrastructure as well. The goal of the talk is to give the audience a better understanding of the vulnerabilities associated with cloud workloads and mitigation strategies.

Agile Mindset & Everyday Kanban

  Presented by Erin Kaohelaulii-Brett • Chapter Leader; Women in Agile

The world is changing quicker than we can keep up! The demands for us to constantly innovate, rapidly develop and continuously improve should be at the forefront of every business model. Companies can choose to either Sink, Float or Swim.

  • What are leading businesses doing to adjust to the rapid pace?
  • How can you provide value to your customers quickly and leave the door open for feedback?

In this session, you’ll learn about the Agile Mindset and beneficial tools/techniques that you can use in your everyday life to organize, manage and quickly deliver value to your business.

Gap Analysis: Configuring O365/Azure Environment for NIST800-171 Compliance

  Presented by David Stevens • IT Program Director, Kapiolani Community College

Supply chain cybersecurity scrutiny is increasing across the entire critical infrastructure ecosystem, not just the Department of Defense. This presentation reviews the common gaps found in subcontracting environments that use Microsoft Office 365 and/or Azure IT environments and includes advice for configuring, monitoring, automating and reporting upon shared National Institute of Standards & Technology (NIST) 800-171 controls.

In this session, attendees will learn how to:

  • Evaluate the common gaps found in subcontracting environments that use Microsoft Office 365 and/or Azure IT environments
  • Gather advice for configuring, monitoring, automating, and reporting upon shared NIST 800-171 controls.

Criminal & Hacker Hardware Demos

  Presented by Bob Monroe • Board Member, Institute for Security and Open Methodologies

Curious about the hardware criminals can use? ISECOM will be showcasing and demonstrating different tools easily available to criminals and discussing how to protect against those attacks. Demos will be done throughout the day at the ISECOM table, just outside of Theater 3.

Come see demonstrations of hardware tools hackers use, including:

  • HackRF One
  • Portapack
  • Nooelec Ham It Up Upconverter
  • r00tabega
  • WiFi Pineapple
  • deauther
  • Frequency Radio Signal Counter
  • Rubber Ducky
  • Bad USB
  • NFC jewelry
  • Raspberry Pi Zero W with GPS, XBee, LoRa, WiFi, BLE inside a power strip Raspberry Pi running Kali ESP 8288 boards

Digital Transformation(Dx): Disrupt Your Organization and Drive Competitive Advantage

  Presented by Vladimir Abadzhiev • Director, Enterprise Applications & Data Management; Hawai`i Pacific University

Have an initiative that involves people, process and tools? You have gotten so far; you and your team have worked hard to build a solution in an attempt to transform the “we have always done it this way” culture. And now you hit a roadblock and not sure how to proceed to realize the potential. If you relate to this experience, then this session is for you. We will cover the basic definition and hype around digital transformation (Dx). We will talk about customer experience (Cx) and we will expand on the “new” trends around flipping the human-machine dynamic.

All of this effort will secure executive buy in and generate results beyond your imagination.

Open Forum Q&A as time permits.