Project Management for Non-Project Managers

  Presented by Jeff Kissinger • President, Western Michigan Chapter of PMI and Senior Project Manager of Grand Rapids Community College

Project management principles are applicable to any business or profession where change is necessary to grow and survive. This interactive and entertaining presentation is an overview of the key project management terms, knowledge areas, and processes that are detailed in the Project Management Institute’s A Guide to the Project Management Body of Knowledge (PMBOK Guide). Attendees will learn how to apply project management principles to their professions, so they can better implement projects and other change initiatives more successfully.

Preparing for the California Consumer Privacy Act (CCPA)

  Presented by Norbert F. Kugele, Esq., CIPP

California’s new Consumer Privacy Act will go into effect on January 1, 2020, giving California residents new rights relating to their personal data—even when the data is held by organizations outside of California. In this session, we’ll cover from a legal perspective the obligations the CCPA puts on organizations and the steps organizations need to take to comply.

What I Wish I Knew BEFORE I Moved to the Cloud

  Presented by CSA West Michigan

As more companies must interact with cloud to drive their business forward, more do so without truly understanding security and the long-term ramifications in doing so.

Join Aaron Bregg and Lloyd Guyout, of Cloud Security Alliance West Michigan Chapter, for an in-depth discussion. This session will talk about what things we knew before moving to the cloud. Bring your questions for this interactive discussion!

Integrating Physical Security Without Introducing New Vulnerabilities

  Presented by Jake Kuncaitis, CSSA • Project Manager, Riverview Service, Inc.

Today’s complex physical security and IoT environments are requiring increased cooperation from (internal and external) IT resources to maximize their potential. What steps can we take to ensure adding physical security at the edge does not increase core network vulnerabilities? Jake will share his expertise on IoT and answer your questions.

SIEM: Past, Present, and Future

  Presented by Fortinet

The IT environment is in constant evolution and it’s getting more complex. As a result, organizations are investing in integrating SOCs (Security Operation Center) to improve the visibility, detection, and automated remediation of security events. In this presentation, we will review the history of SIEM and discuss selection criteria that will help organizations analyzing different SIEM tools.

The Modern Datacenter

  Presented by Trend Micro

The Datacenter is the heart of the organization. So why would you treat it any different than the Data that is crucial to the survival of your organization’s reputation? Security requirements do not go away when you move part of your data center workloads to the cloud. Although most security controls can be easily applied to systems in the cloud, the weight of those controls and what constitutes an immediate concern versus a lower priority alert, can be different. We will discuss the need for advanced visibility to differentiate your cloud systems versus your internal data center with central visibility. With the dynamic nature of the cloud, and the flexibility of the modern data center, it is important to apply the same security controls but view the alerts differently depending on their origin.

A New Era of Data Protection: Converged DR and Backup

  Presented by Zerto

In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

  • The cost and business impact of downtime and data loss can be immense
  • Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters
  • Having a plan and process in place will help you mitigate the impact of an outage on your business.

In this presentation we will address the challenges, needs, strategies, and solutions.

Managing the Trio of Software, Security, and Data

  Presented by Keller Schroeder, Applications Solutions Group

During this session, hear two case studies of successful Enterprise Resource Planning (ERP) implementations, including how software, security, and data played parts in the solutions that incorporated modern usability for some less-than-tech-savvy users with:

  • Responsive designs
  • Multi-factor authentication
  • Role-based security
  • Data encryption
  • Centralized print management
  • Smart light bulbs
  • Internet of Things (IoT)
  • Real-time updates and notifications
  • Content Management
  • Business-to-Consumer (B2C) E-commerce
  • Search Engine Optimization (SEO)
  • Email and Blogging integration

The Human Firewall is on Fire

  Presented by Keller Schroeder, Infrastructure Solutions Group and Mimecast

91% of all cyber-attacks begin with email. Who has never experienced a targeted email spoofing/spear-phishing attack, or had to deal with recovering from a fraudulent wire transfer request? Email security invariable includes end user cyber security education along with a robust suite of email security tools to compliment the necessary defense in depth strategy to protect your company from reputational of financial loss.