[1 CPE] Retaining Your IT Staff in Nebraska, Can it Be Done?

  Presented by INTERFACE Advisory Council

“The other company is offering higher wages. I get to work remotely as much as I want and get a four-day workweek. Sorry, but I must take it.” Have you heard this just a few times? So many IT hiring managers are having to find creative ways to keep staff members in-house. While budgets and major company overhauls can’t always be achieved, some methods can help.

Companies throughout Nebraska have challenges in retaining IT staff. Join the INTERFACE Advisory Council for an open conversation on how to keep your local IT staff intact. This panel features local IT hiring managers and leaders dealing with these challenges in their shops. Bring your questions as there will be an opportunity to get advice on your specific needs.

Moderator: Ron Woerner, Professor, Bellevue University

Panelists:

  • Samantha Harvey-Fleeman, Account Director, LinkedIn
  • Rob LaMagna-Reiter, Chief information Security Officer, Hudl
  • Lisa McKee, President, ISACA Omaha

[1 CPE] Thirty Years of Arguing with Adults

  Presented by Paul Dant, Senior Director of Cybersecurity Research • Illumio

In this talk, you’ll hear hilarious stories from a former child hacker that eerily predict the treacherous security landscape of today. Do you want to know why we’re still losing to ransomware? Attend this talk to find out and get insight into how you can start actually solving security problems and prepare your organization for the inevitable breach.

Paul has been coding and hacking since 1987. As a security researcher, he has performed offensive security testing of facilities ranging from nuclear energy plants to hospitals to tent-pole film sets. He’s presented to countless audiences the realities of cyberattacks, the hacker mindset, and new paradigms to address the potentially life-impacting threats we are faced with today.

He is currently the Senior Director of Cybersecurity Research at Illumio, where he works across industries to help organizations understand how to protect their critical assets in the “assume breach” mentality of zero trust.

[1 CPE] Hybrid Cloud: Empowering IT with Resiliency, Multicloud Strategies, Optimal Spend, & Sustainability

  Presented by Michael Donahue, Sr Director, Hybrid Cloud Solutions • Hitachi Vantara

The hybrid cloud has emerged as a game-changing paradigm for modern IT infrastructure, offering IT Leaders and above a wealth of opportunities to drive innovation and efficiency. With the ever-increasing demand for cyber resiliency, flexibility, and sustainability, it is crucial for IT constituents to grasp the intricacies of the hybrid cloud, including key concepts such as security, multicloud, nearcloud, cloud spend optimization, data refactorization, and sustainability practices.

Throughout the session, real-world case studies and examples will be shared from Day 0, Day 1, and Day 2 customers.

  • Day 0 means you want to take advantage of this new framework but are still working through how to adopt hybrid cloud, how to secure it, and how to recruit proper talent to maximize it.
  • Day 1 means your organization took the first step and has a minimum spend commit they must meet. However, you’re still unsure of how to meet it because you’re still determining which applications to refactor, which containerized microservices to adopt, how to reskill existing talent, and how to implement your compliance and governance strategy.
  • Day 2 means your organization has already overcome these hurdles. Nice work! Instead of worrying about hitting a minimum spend commit, you’re now focused on optimizing your environment to limit sprawling cloud costs and looking towards data repatriation efforts.

Participants will have the opportunity to engage in interactive discussions and pose questions, fostering a collaborative learning environment. By the end of this session, IT Leaders will have the knowledge and tools necessary to evaluate, plan, and implement hybrid cloud solutions that align with their organization’s goals, including sustainability. Afterall, Hitachi is committed to providing solutions that are exclusively carbon-neutral or zero-carbon, ensuring a sustainable and environmentally friendly approach.

[1 CPE] Cyber Security is National Security

  Presented by Kenneth A. Schmutz, Supervisory Special Agent • FBI

Cybersecurity is one of the FBI’s highest priorities. Our strategy is multifaceted. We take aim at the actors, disrupt their operations, and go after their money. One of the most important actions a business can take in preparing for a cyber security incident is to make a cyber incident response plan and include the FBI in that plan. When the FBI quickly engages with a company hit by a cyber-attack, we’re able to share indicators that help network defenders identify malicious activity and intelligence about the actors that inform a company’s decision-making during a crisis. As the cyber threat has evolved over the past 20 years, one thing has remained the same: The FBI is at the center of acting on cyber threat information to provide support to victims and impose costs on cybercriminals.

[1 CPE] How AI Can Think Like an Attacker

  Presented by Darktrace

In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

[1 CPE] WiFi 7: What About It?

  Presented by Pine Cove Consulting & Ruckus

This presentation traces the evolution of Wi-Fi technologies, from the initial design for device scalability to the current demand for capacity, efficiency, and predictability. The progression from Wi-Fi 4 to 6E and the upcoming Wi-Fi 7 is analyzed, revealing trends and challenges. The fragmented global regulatory environment, slow 6GHz adoption, and deployment intricacies are discussed. The differences among Wi-Fi 6, 6E, and 7 are highlighted, along with their respective enhancements. Major Wi-Fi 7 advancements, such as punctured transmission and enhanced quality of service, are examined. The emergence of the Wi-Fi 7 ecosystem and the increasing demand for Power over Ethernet (PoE) are also explored, offering insights into the changing landscape of network technologies.

[1 CPE] Privacy and You: A Brief Introduction

  Presented by Christopher Goodrich, CISSP-ISSEP • ISC2 New Mexico

This presentation will be broken out into three sections. First, I’ll provide a brief history lesson, including definitions from an international perspective, and cover the most prominent privacy “rights.” This will be followed by an examination of legislature within the United States and the ramifications of this legal mandate applied to organizations. Finally, I’ll offer a few tips and tricks that individuals should be aware of in their personal lives.

[1 CPE] Consolidate Tech to Improve Performance and Security

  Presented by Steve Troxel, Public Sector Field Solutions Engineer • SHI & Sophos

A lack of integration between vendors and platforms can make systems less reliable, less secure, and more expensive than they should be. This session will focus on changes in on-premise and cloud-based solutions in IT infrastructure that can allow administrators and systems engineers to reduce the burden of maintaining disparate solutions through effective consolidation and integration. Join Steve Troxel of SHI in discussing how these approaches can help address gaps in IT staffing and facilitate a more strategic focus on the use of technology to the business itself.

[1 CPE] APEX Platform for Multi-Cloud and Edge

  Presented by Adam Smolka, Sr Director, Product and Solutions Sales Specialist • Dell Technologies

IT organizations everywhere face increasingly complex siloed multi-cloud ecosystems, with pressure to move more quickly and improve efficiency in the face of skills gaps and economic headwinds. The Dell APEX portfolio addresses these challenges through a multi-cloud by-design approach that optimizes public cloud operations and brings the agility of the cloud operating model to any IT environment, offering greater control over applications and data.

Dell APEX Cloud Platforms provide an on-premises private cloud environment with consistent full-stack integration for the most widely deployed cloud ecosystem software including Microsoft Azure, Red Hat OpenShift, and VMware vSphere. They can be configured to connect to the corresponding public cloud implementation of their respective ecosystems. This provides easy access to multiple deployment options with the security, flexibility, efficiency, and control of an on-premises location, freeing IT to focus on their applications and data rather than infrastructure.

[1 CPE] Security Trends & Predictions

  Presented by Christopher Fielder, Field CTO • Arctic Wolf

In a dynamic cybersecurity landscape and fast-paced market, organizations grapple with ever-changing threats. Uncertainty abounds as they seek to benchmark themselves against their peers and prioritize initiatives. Join Arctic Wolf Field CTO Christopher Fielder as he explores key areas organizations are focusing on, top threat concerns, and responses by established organizations to emerging threats. Leveraging Arctic Wolf research, Christopher further presents five critical security predictions for the next 12 months.