Gaining Network Visibility with Application Intelligence

  Presented by Gigamon

Come discuss how gaining visibility into your network has become more of a challenge than ever before. With the evolution from the Data Center to Virtual Environments, Public and Private Clouds, our exposure has never been greater.

In this session we will cover Span vs. TAP, Traffic Aggregation, Packet Brokers, Traffic Intelligence, Virtual Environments and how to get that one view of all your data.

Learn how to maximize the ROI on your existing tools while increasing your scope of visibility.

Who knows, you might even have fun?! Heckling Encouraged!

Welcome to the New Age of Converged Secondary and Primary Storage

  Presented by StorageCraft

Gone are the days of deciding between a storage solution that can solve either data protection OR primary storage requirements. OneXafe is a scale-out converged storage solution that solves both data protection and primary storage challenges. Want to protect hundreds of VMs in a few clicks? No problem. Want to recover a multi-TB VM in less than a second? No problem. Need an enterprise file serving, archiving, or VMware storage solution? No Problem. Want to seamlessly recover an application in the cloud? No Problem. Attend this seminar session to learn more and see OneXafe in action!

Petabyte Is the New Terabyte: Getting a Handle on Your Ever-Expanding Data

  Presented by Qumulo

Legacy storage solutions weren’t designed for today’s increasing data needs. Everything from Video Surveillance Files, User Files, GIS, Aerial Imagery, PACS Images, Archives, Machine Learning, Genomic Sequencing, to just simple Log Files are growing in size and velocity. Qumulo has designed a distributed files system that is simple to use and can scale cost effectively to address the data growth challenges all businesses are facing today. Join us to learn how easy it can be to manage data at scale with real-time analytics to provide visibility into your data.

A New Era of Data Protection: Converged DR and Backup

  Presented by Zerto

In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

  • The cost and business impact of downtime and data loss can be immense
  • Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters
  • Having a plan and process in place will help you mitigate the impact of an outage on your business.

In this presentation we will address the challenges, needs, strategies, and solutions.

If You Don’t Protect the Key, Don’t Encrypt the Data

  Presented by nCipher Security

For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don’t understand how important it really is. We will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.

Overcoming the Challenges Unstructured Data Growth with Hyperscale

  Presented by Cloudian

How do you break through the capacity barrier and gain simplicity and one-click data management in your data center, across sites, around the world, or in the cloud? Organizations are looking to do more, at less cost, and derive more value from data. We will be discussing how organizations are creating a global data fabric with simplified management across clouds.

Topics discussed will include S3 native storage as a service, how to manage and protect unstructured data, enable DR, and reduce the risk and cost associated with traditional approaches to data storage.

Transforming Technology to Fuel Innovation

  Presented by Brook Conner • Assistant Superintendent & CIO,
Hawaii State Department of Education

The Hawaii State Department of Education has embarked on a multi-year journey to move from legacy technology to a modern, cloud-based enterprise-grade environment. Most organizations want their technology environment to enable innovation, but for the public schools, innovation is table stakes. Every individual public school is charged with creating the right environment to serve the needs of their own unique community, leading to widespread innovation. So our new technology environment is being built with flexibility and agility foremost. While there’s much more work to be done, we’ve already replaced Lotus Notes with Google and are on our way to a comprehensive transformation. The end result? Technology for the students to help them lead the second half of the twenty-first century.

David Brookshire “Brook” Conner was appointed on Sept. 25, 2017 to oversee HIDOE’s information and telecommunication systems, facilities, and services of the public school system and department-wide operations. The Office of Information Technology Services (OITS) ensures that information technology and telecommunications support are being provided efficiently and effectively, and in accordance with laws, policies, and accepted principles of management. The scope of OITS’ technical oversight includes voice, data, video, information systems infrastructure, and support services for schools and for complex areas and state administrative offices. Support services to schools are exercised in collaboration with the complex area superintendent.

Conner has served in high-profile information technology (IT) positions, most recently as the first chief information security officer and vice president for Estée Lauder Companies where he constructed a cyber security program, managed a budget of $22 million and ensured compliance. He also worked for Morgan Stanley as an executive director and global head of vulnerability management, Bloomberg LP, and as an adjunct professor at New York University. Conner has also published numerous books and papers on a variety of IT topics.

How to Level Up on Information Security Risk Assessment

  Moderated by INTERFACE Advisory Council

Do the words “Risk Assessment” send knots to your stomach? Are you interested in doing an assessment, but not sure what to expect? Join the Advisory Council for a panel discussing real life experiences conducting information security risk assessments, how to get started, what to look out for and tips and tricks. You don’t have to be a walking target!

Panelists:

  • Curt Dodds • IT Manager, Institute for Astronomy, University of Hawaii
  • Russell Seeney • President, InfraGard
  • David Stevens • IT Program Director, Kapiolani Community College

Disaster Recovery for the Cloud Era

  Presented by Druva

More and more enterprises are now leveraging the cloud to increase their level of data protection and management for their applications. The ability to keep secondary, or backup data in cloud storage; eliminates traditional data centers, reduces operational complexity associated with legacy on-premise backup solutions, allows unlimited scalability, centralizes storage of all secondary data sources, provides unlimited compute, allows for additional insight and business value from that data. and finally, and finally, the ability to do automated Disaster Recovery (DR) without maintaining a DR facility.

Integrated Risk Management

  Presented by ServiceNow

Organizations need to transform inefficient processes by combining security, IT, and risk capabilities into an integrated risk program which provides continuous monitoring, prioritization, and automation to ensure rapid identification and response to risks.