[1 CPE] AI for IT Project Management: Tools, Techniques, and Use Cases

  Presented by Jim Bates, Founder, President & CEO  • Business Improvement Group

Discover how Artificial Intelligence (AI) is being used to transform IT Project Management approaches and how it can impact our IT project effectiveness and efficiency. We will explore trends and separate the hype from reality. We will discuss tools and techniques and demonstrate how we use AI to save time and more accurately predict and control our project outcomes, manage risk, and support transparent and defensible project governance.

[1 CPE] Mitigating the Risk of AI in the Corporate Environment

  Presented by Teresa Rule, President, RNT Cyber Academy, Member • ISACA Anchorage

In the corporate environment, mitigating the risks associated with artificial intelligence (AI) is crucial for ensuring operational resilience and strategic growth. AI, while offering unparalleled benefits in risk management through predictive analytics and real-time monitoring, also introduces new challenges such as data breaches, algorithmic bias, and cybersecurity threats. To effectively manage these risks, organizations must adopt a systematic approach. This includes identifying areas of risk, such as financial, operational, and cybersecurity vulnerabilities, and evaluating data quality to support AI implementation. Choosing the right AI technology and training AI algorithms with historical data are also essential steps. Furthermore, integrating AI into existing processes and continuously evaluating its performance are vital for refining risk mitigation strategies. By leveraging frameworks like the NIST AI Risk Management Framework and engaging in proactive threat assessments, businesses can ensure that AI enhances their risk management capabilities while minimizing its inherent risks. Ultimately, a well-managed AI strategy can transform traditional risk assessment, enhance decision-making, and foster a secure and efficient corporate environment.

[1 CPE] Building a Secure Foundation: An Overview of Zero Trust and Fixed Wireless

  Presented by David Mathis, Sr Solutions Partner, and TJ Smith, Principal Manager, Solutions Architect for Connected Devices  • Verizon

The Zero Trust Framework is a model that shifts defenses from network perimeters to users, assets, and resources. It emphasizes verifying all entities before allowing network communication. Fixed Wireless Access is a technology that enables us to place the edge of our network anywhere that we need to do business. This presentation outlines how zero trust works, its importance, and how to build a zero trust infrastructure that allows us to build out our networks quickly, reliably, and securely.

Fixed Wireless Access (FWA) is a broadband technology that provides last-mile connectivity using wireless transmission between fixed points. Unlike traditional terrestrial or mobile wireless solutions. FWA offers High-Speed, reliable Internet connectivity, rapid deployment, and quick tear down, and is a flexible yet cost-effective alternative or augmentation to existing fiber or cable connections. Ensuring that these new connections still meet or exceed existing network requirements is key successful adoption of the technology.

[1 CPE] Fortifying Enterprise Security: Advanced Cybersecurity Strategies for Today

  Presented by Elizabeth Schaedler, Security Strategist • Splunk a Cisco Company

In an era of escalating cyber threats, robust cybersecurity measures are vital to safeguarding sensitive data, critical systems, and enterprise networks. This presentation dives deep into the pivotal role of cybersecurity within information security (InfoSec), emphasizing the protection of confidentiality, integrity, and availability against sophisticated attacks like ransomware, phishing, and insider threats. IT operations and security professionals will explore cutting-edge tools and strategies—including firewalls, intrusion detection systems (IDS), encryption, multi-factor authentication (MFA), and incident response frameworks—that form the backbone of modern cyber defense.

The session will also address how cybersecurity drives enterprise risk management, empowering teams to identify vulnerabilities, enforce compliance, and ensure business continuity in the face of evolving risks. Expect practical, actionable insights to enhance your organization’s security posture, secure networks, and defend critical assets against today’s dynamic threat landscape. This is a must-attend for professionals tasked with staying ahead of cybercriminals and protecting their operations.

[1 CPE] How to Make AI a Reality in Your Organization

  Presented by Colton Rockwell, Lead Generation Marketing Manager • ImageSource

AI adoption is accelerating, yet many organizations struggle to transition AI projects from proof-of-concept to production. The AI Empowerment Blueprint is a structured framework that helps businesses overcome common AI adoption barriers, align AI initiatives with business goals, and implement a governance strategy that ensures ethical and effective AI deployment.

This session will guide attendees through a six-step methodology for AI success, covering key phases such as AI exploration, business value alignment, governance frameworks, and implementation best practices. Learn how to identify AI opportunities, mitigate risks, and build a scalable AI strategy that delivers real business value.

Whether you’re an executive, technologist, or entrepreneur, this presentation will equip you with actionable insights and a proven roadmap to maximize AI’s impact within your organization.

[1 CPE] The Power of Partnership

  Presented by Aaron Smith • Vice President of Information Technology at Doyon, Limited

Technology alone doesn’t drive success—partnerships do. True innovation happens when organizations work together, leveraging expertise, shared goals, and a commitment to collective growth. By fostering strong relationships, we build solutions that are more resilient, secure, and impactful for the future.

Join us as Aaron Smith, Vice President of Information Technology at Doyon, Limited, shares his experiences on achieving success through organizational alignment. While technology provides a wealth of tools, people and partnerships are essential to achieving goals.

Aaron Smith is the Vice President of Information Technology at Doyon, Limited and the President of InfraGard Alaska. With decades of experience in IT leadership, cybersecurity, and infrastructure protection, Aaron has worked extensively in both the private and public sectors to enhance security and operational resilience. His expertise spans critical infrastructure protection, risk management, and technology-driven business transformation.

Before joining Doyon, he served as Chief Information Officer for Doyon Utilities, overseeing technology operations supporting essential services across Alaska. Aaron also has a military background, having retired from the Alaska Air National Guard, where he focused primarily on cybersecurity and network defense.

Passionate about collaboration and innovation, he believes in the power of partnerships to drive meaningful technological advancements that protect and empower organizations. Over his 20+ year career, Aaron has worked across Information Technology, Supervisory Control and Data Acquisition (SCADA), and Cybersecurity in both military and civilian sectors.

[1 CPE] Successfully Implementing AI in Your Office: An Interactive Discussion

  Presented by INTERFACE Advisory Council

With so many useful applications from customer service to data management and new employee recruiting, the use of Artificial Intelligence around workplaces increases every day. Information Technology professionals are now tasked with identifying AI tools to increase efficiency and find cost savings. Employees have been utilizing AI for task automation in a wide array of roles. This adoption is only going to continue to grow.

How is all this governed? What are the security practices you need to adhere to? Join us for an open panel discussion on the proper implementation of AI in your workplace. Our Advisory Council will share some of their experiences in utilizing AI applications of all types while ensuring the necessary security measures. Bring your questions to ensure you walk away with valuable insights for properly implementing AI.

Panelists:

  • Wes McEwen, Manager, IT Helpdesk, AK Dept of Commerce, Community & Economic Development
  • Brian Noonan, Director, Information Technology, Altman Rogers & Co.
  • Mischaud Scruggs, Manager, Information Technology, Assets, Inc.
  • Niel Smith, Deputy Chief Information Officer, State of Alaska

[1 CPE] Modern Data Demands Modern Storage: Unlocking Possibility

  Presented by Russell Pope, Solution Architect, Unstructured Data • Pure Storage

As organizations modernize their infrastructure to support cloud-native applications, AI/ML workloads, and ever-growing data volumes, traditional storage systems often become a bottleneck to innovation. In this session, we’ll introduce Pure Storage—a company purpose-built to meet the evolving demands of the modern data stack. We’ll explore how Pure’s unique architecture, API-driven approach, and evergreen model deliver consistent performance, scalability, and operational simplicity. Whether you’re managing mission-critical databases, enabling real-time analytics, or building AI pipelines, you’ll gain insight into how Pure’s solutions help you move faster, operate smarter, and future-proof your storage investments.

[1 CPE] Navigating the Future of Data Center Hypervisors: Prepare for Disruption

  Presented by Steve Asmussen, Global Data Center Architect • CompuNet

Explore the latest trends in data center technology including hardware architectures, virtualization, and hypervisor platforms. This session will share insights into the options you have available to optimize your virtual data center infrastructure. It will also cover the impact of recent shifts from perpetual to subscription-based licensing.

[1 CPE] What the Hack is Going On?

  Presented by Tim Medin, Chief Executive Officer • Red Siege

A comprehensive overview of modern cybersecurity threats and how breaches occur. We will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited. There are a lot of vulnerabilities in the wild, and IT administrators and security professionals often focus on the wrong issues because they are easier to monitor or measure. By the end of the presentation, you will have gained valuable insights into the latest cybersecurity threats and how to protect against them.