Birds of a Feather

  Presented by the Advisory Council

Want an opportunity to discuss in small groups and learn from other attendees? Join your fellow attendees in informal round table discussions on a variety of IT topics. Several lunch tables will have designated topics. Look for the “Birds of a Feather” topic signs to join the conversation. Tables will be located just outside of the theaters.

Continuous Cloud Compliance and Security

  Presented by Check Point Software

In this session, you will learn why Gartner says, “Through 2022, at least 95% of cloud security failures will be the customer’s fault.” You will learn to find the best defense against these potential failures by enabling continuous compliance and security of your public cloud workloads and assets.

A New Era of Data Protection

  Presented by Zerto

In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

  • The cost and business impact of downtime and data loss can be immense
  • Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters
  • Having a plan and process in place will help you mitigate the impact of an outage on your business.

In this presentation we will address the challenges, needs, strategies, and solutions for disaster recovery and business continuity, especially in modern, virtualized environments and the public cloud.

The Top 5 Challenges for Desktop and App Virtualization

  Presented by Bitdefender

Businesses with large office or task-based workforces are increasingly moving to application and desktop virtualization. This is because virtualization technologies, both applications and virtual desktop infrastructure (VDI), offer IT organizations and their end users an array of choices in accessing applications and desktops. And, as organizations adopt digital workspaces, they naturally expect a higher-quality user experience. Unfortunately, virtualization brings both new and unique security challenges with it.

This presentation will cover the top challenges that enterprises face and will cover suggestions to identify a security solution that complements your virtualization initiatives and makes both the Infosec team and users happy.

Are Your IT Trains Running on Time?

  Presented by Eric Ried • CTO, Presbyterian Healthcare Services

The details of this presentation will be available soon. Please check back for updates!

Real-World Impact of Security Risks in Industries Using IIoT 

  Presented by Trend Micro

This presentation will talk about research on radio remote controllers used in industrial settings, and how they can be used for attacks in this environment. This will shed light on how a cyberattack can inflict physical damage or harm. The goal is to inspire the audience to think outside the box in terms of what can be compromised and impose a sense of urgency in the IoT/IIoT security space.

Artificial Intelligence in Action: A Conversation About Practical AI

  Moderated by INTERFACE Advisory Council

Moderator:

  • Dr. Tobe Phelps • Chief Technology Innovation Officer; CNM

Panelists:

  • Lissa Moore • Research Scientist; Los Alamos National Laboratory
  • Luis Brown • Chief Information Security Officer, CNM
  • Dee Skinner • Director of IT Services, Haverland Carter LifeStyle Group

Using Packet Flow Based Measurements to Support IT Services

  Presented by Dennis B. Bateman • Network Engineer, Sandia National Laboratories

Can you see the IT Service that you are delivering to your customers? How well do you know the health and performance of your service? Do you know if networked issues are impacting your users? Let packet flow analysis help make operational decisions, set priorities, generate metrics, enable proactiveness, and much more.

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Mitigating Cybercrime in your Enterprise

  Presented by Fortinet

The attack surface that enterprises much protect is expanding dramatically. How do you maintain visibility and security of your traffic from IoT to the cloud. We’ll explore the threat vectors that cyber criminals use to penetrate your defenses and the security tools you can use to defend against those attacks.