Advisory Council Roundtables

Join us during the lunch hour for Advisory Council Roundtables, an interactive opportunity to connect with council members and peers on a variety of timely industry topics. Move freely between tables, share your perspective, and gather practical insights you can take back to your organization. These conversations are informal, high-value, and designed to spark ideas and connection.

Topics:

  • Data Protection in the Age of AI
  • Ensuring Security and Compliance with 3rd Parties
  • IT Staffing: Onboarding for Success
  • Get More Out of Your IT Spending
  • Managing Infosec for the Small/Medium Business
  • Security Approach in Public Sector
  • Security Awareness: What Methods Work to “Secure the Human”
  • Zero Trust Strategy: Challenges & Lessons Learned

[1 CPE] Bridging Zero Trust and SASE: A Unified Approach to Modern Cybersecurity

  Presented by Fortinet

This will be a panel discussion on how organizations can effectively bridge Zero Trust and SASE to create a unified, adaptive cybersecurity architecture that meets the demands of today’s hybrid workforce and threat landscape.

Key Takeaways:

  • Understand the core principles of Zero Trust and SASE, and how they complement each other.
  • Learn practical strategies for implementing a unified approach without adding complexity or disrupting operations.
  • Gain insights into real-world use cases and lessons learned from organizations successfully integrating these frameworks.

Moderator: Michael Lippman, Regional Channel Systems Engineer, Fortinet

Panelists:

  • Tanner Harrison, Senior Sales Engineer, Fortinet
  • Greg Still, Chief Executive Officer, Xiologix
  • Mark Wernet, Major Account Manager, Fortinet

[1 CPE] Intelligent Data Infrastructure: Unifying Cloud, Cyber, AI, and Enterprise

  Presented by Ray Kalmbach, Global Head of Hybrid Workloads for Partners • NetApp

Organizations are simultaneously pursuing cloud transformation, cyber resilience, data infrastructure modernization, and artificial intelligence. In every case, data is at the heart of the transformation—but most existing infrastructure was not designed for this moment.

This session introduces the concept of Intelligent Data Infrastructure (IDI)—an operating model where a unified data platform, integrated control plane, and data management services can manage any data, for any application, anywhere it’s needed—optimized, secured, and protected by intelligence. Using a Problem → Alternatives → Solution framework, we will examine common pitfalls and successful patterns across key domains: cloud services, cyber resilience and data protection, enterprise applications and databases, virtualization and containers, and AI & data lakes.

Attendees will leave with a reference model and practical checklist to evaluate their environment and define concrete next steps toward a more intelligent, resilient, and AI‑ready data infrastructure—without reference to any specific vendor or product.

[1 CPE] Can Attackers Take Down Your Identity Provider?

  Presented by Sarah Cecchetti, Director of Product Management • Semperis

What would happen if an attacker came after your Active Directory, Okta, Ping, or Entra? Do you think that’s going to get easier or harder for the attacker if your company is AI-enabled? Do you have the right protections to keep them out? Do you know what to do if they get in and take down everyone’s ability to log in? Find out how the world’s top companies are securing their identity infrastructure in the age of AI. Make sure you have plans in place to recover quickly and be the hero if the worst happens.

Advisory Council Roundtables

  Presented by the INTERFACE Advisory Council

Join us during the lunch hour for Advisory Council Roundtables, an interactive opportunity to connect with council members and peers on a variety of timely industry topics. Move freely between tables, share your perspective, and gather practical insights you can take back to your organization. These conversations are informal, high-value, and designed to spark ideas and connection.

Topics & Discussion Leaders:

  • Data Protection in the Age of AI Neha Srivastava, Vice President, Cybersecurity Products, JPMorganChase
  • Ensuring Security and Compliance with 3rd Parties Rajesh Nair, Staff Technical Program Manager, LinkedIn
  • IT Staffing: Onboarding for Success Shawn Cook, Technology Director, Prosser School District
  • Get More Out of Your IT Spending Evelyn Hernandez, Director, Information Technology, US Federal Courts
  • Managing Infosec for the Small/Medium Business John Forrister, Vice President, Information Security, Tgen
  • Security Approach in Public Sector Tim Crawford, Executive Director, ITS, Federal Way Public Schools
  • Security Awareness: What Methods Work to “Secure the Human”
    • Tad Doviak, Cybersecurity Administrator, Globe Machine
    • Sean Godfrey, Vice President, Information Technology, Chateau Retirement Communities LLC
    • Taylor Jolin, Manager, IT Operations, Nisqually Red Wind Casino
    • Lawrence Kane, Sr Director, IT Procurement, Transamerica
  • Zero Trust Strategy: Challenges & Lessons Learned Shannan Elzner, Manager, IT Operations, Sound Credit Union

[1 CPE] Maximizing Impact: A Guide to Scaling Red Team Operations

  Presented by Jake Gillen, Solutions Engineer • Pentera

As organizations face expanding attack surfaces, Red Teaming remains vital for uncovering true security gaps—but traditional methods can be difficult to scale. This session introduces Automated Security Validation and its role in strengthening and accelerating Red Team activities. We’ll define what Red Teaming is, outline how to plan an exercise, and walk through real examples that illustrate improved efficiency and coverage. Attendees will learn to complement manual Red Teaming by automating repetitive tasks, enabling teams to focus on high-value adversarial techniques and maximize overall impact.

[1 CPE] Shadow AI: Real Consequences, Real Benefits

  Presented by CompassMSP

Whether you have sanctioned it or not, your employees are using AI at work. While AI is great for boosting productivity and automating tasks, it also brings risks, including data leaks, deepfakes, and compliance challenges. In this session, we’ll connect the dots between compliance requirements and real-world practices, showing you how to navigate AI safely, reduce risk, and still move innovation forward. Walk away with a clear view of AI’s impact and simple actions you can take to reduce risk and protect your employees and data.

[CANCELED] AI: How to Balance Innovation with Accountability

  Presented by Andreas Bohman, VP, Information Technology; CIO • University of Washington


This session will not take place as planned, and we appreciate your flexibility. Please enjoy one of our Advisor-led Roundtables.

AI is advancing faster than most governance models can keep up. Large organizations face a growing gap between innovation and control, between those who adopt responsibly and those who fall behind. Drawing on lessons from leading AI at the University of Washington, this session explores how to balance innovation with accountability by turning governance into infrastructure rather than oversight. Attendees will learn how to build trust, manage risk, and design systems that accelerate progress while maintaining transparency and control.

[1 CPE] Taking A Data-First Approach to Cyber Risk Management

  Presented by Austin Starowicz, Director, Solutions Consulting • Mastercard Cybersecurity

Cyber Risk Management has evolved. Every new vulnerability or regulation adds further pressures on already stretched teams to predict and manage the weakest links within your internal IT infrastructure. Piling on to today’s cyber risk landscape is the ever-expanding digital supply chain, and the need to onboard, assess, and monitor third parties, fourth parties, and Nth parties.

But does it really have to be that way?

Join this session from Mastercard Cybersecurity for an exclusive presentation on how a proactive “data-first” approach to cyber risk management can help you:

  • Improve monitoring for critical vulnerabilities to determine which ones really matter
  • Identify, Prioritize and Assess affected third parties in real-time
  • Leverage objective risk data into the decision-making processes
  • Streamline workflows and scale your operations

[1 CPE] Insider Session: From Retired to Replaced – Preparing for Microsoft’s Wave of Changes

  Presented by iT1 Source

In this insider session, we’ll break down Microsoft’s biggest licensing and product changes so you can prepare, stay compliant, and avoid unnecessary costs. From shifting discounts to looming end-of-support deadlines, we’ll cover what every business needs to know.

Key Takeaways:

  • How Microsoft’s recent announcement will impact EA & MPSA pricing.
  • Practical steps for moving from EA to CSP with confidence.
  • Are you still running outdated technology that reached Microsoft’s end of support in October?