Moderated by INTERFACE Advisory Council
Panelists:
- Nyle Stoddard, Manager • Information Technology, RR Donnelley
- Danny Yeo • IT Director, College of Life Sciences, BYU
- James Duckett • Manager, Technology, City of St. George
Moderated by INTERFACE Advisory Council
Panelists:
Presented by Unitrends
We are living in a “Less is More” world. In a landscape that’s rapidly changing, IT professionals are managing more work, projects, and risk than ever before. While external threats such as malware and natural disasters cause significant downtime and data loss without proper BCDR implementation, organizations must also be prepared to safeguard from within. Data continues to grow at an exponential rate, and not only on-premises. As cloud-delivered solutions such as IaaS and SaaS are rapidly adopted by an increasing number of organizations, and the workforce itself is becoming increasingly dispersed and mobile, organizations must consider data protection strategies to address gaps in BC/DR outside the traditional data center. Join Adam Marget, Technical Specialist from Unitrends, as we explore the evolving landscape of data protection, clouds growing role, BC/DR strategies to safeguard local, remote, and cloud-based workloads, and best practices in planning your DR approach.
Moderated by INTERFACE Advisory Council
The details of this presentation will be available soon. Please check back for updates!
Presented by Darktrace
In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.
Presented by Fortinet
In today’s quickly evolving technical landscape, defending networks from known and unknown threats is more critical than ever before. Join speaker Cory Sober, Systems Engineering Manager from Fortinet as he discusses how to concentrate the value of your security-related investments towards leveraging cyber security solutions as key business enablers that deliver highly reliable, fast and secure services to end-users no matter their locale, device type or level of security awareness.
Presented by Trend Micro
This presentation will revolve around the various threats workloads are susceptible to as more and more organizations shift from on-premise to the cloud. This will focus primarily on public cloud infrastructure but many of the concepts will apply directly to private cloud/on-prem data center infrastructure as well. The goal of the talk is to give the audience a better understanding of the vulnerabilities associated with cloud workloads and mitigation strategies.
Presented by Erin Kaohelaulii-Brett • Chapter Leader; Women in Agile
The world is changing quicker than we can keep up! The demands for us to constantly innovate, rapidly develop and continuously improve should be at the forefront of every business model. Companies can choose to either Sink, Float or Swim.
In this session, you’ll learn about the Agile Mindset and beneficial tools/techniques that you can use in your everyday life to organize, manage and quickly deliver value to your business.
Presented by David Stevens • IT Program Director, Kapiolani Community College
Supply chain cybersecurity scrutiny is increasing across the entire critical infrastructure ecosystem, not just the Department of Defense. This presentation reviews the common gaps found in subcontracting environments that use Microsoft Office 365 and/or Azure IT environments and includes advice for configuring, monitoring, automating and reporting upon shared National Institute of Standards & Technology (NIST) 800-171 controls.
In this session, attendees will learn how to:
Presented by Bob Monroe • Board Member, Institute for Security and Open Methodologies
Curious about the hardware criminals can use? ISECOM will be showcasing and demonstrating different tools easily available to criminals and discussing how to protect against those attacks. Demos will be done throughout the day at the ISECOM table, just outside of Theater 3.
Come see demonstrations of hardware tools hackers use, including:
Presented by Vladimir Abadzhiev • Director, Enterprise Applications & Data Management; Hawai`i Pacific University
Have an initiative that involves people, process and tools? You have gotten so far; you and your team have worked hard to build a solution in an attempt to transform the “we have always done it this way” culture. And now you hit a roadblock and not sure how to proceed to realize the potential. If you relate to this experience, then this session is for you. We will cover the basic definition and hype around digital transformation (Dx). We will talk about customer experience (Cx) and we will expand on the “new” trends around flipping the human-machine dynamic.
All of this effort will secure executive buy in and generate results beyond your imagination.
Open Forum Q&A as time permits.