Presented by Eos Systems
This presentation will focus on security practices and compliance that can prevent and quickly detect the next attack. Join this session to learn how you can gain visibility with a Security Command Center.
Presented by Eos Systems
This presentation will focus on security practices and compliance that can prevent and quickly detect the next attack. Join this session to learn how you can gain visibility with a Security Command Center.
Presented by Michael J. Berry • Member and Presenter • PMI Northern Utah Chapter
In this session, you will learn how to save time, effort, and costs through Operational Excellence in IT Project Management. Also covered will be Operations that use patterns found in Agile, Lean, and Artificial Intelligence.
Michael J. Berry is the founder and chief consultant for Red Rock Research, a 17-year-old IT training and consulting company he founded in 2007. Michael’s professional consulting work has taken him all over the US, to Australia, to the Arctic Circle, and to Europe helping large companies optimize their project management and other production processes. Michael has worked in the software industry for over 35 years, specifically in Finance, Medical, and Manufacturing software. He is the creator of the Stable Framework™, an Operational Excellence performance management system for IT, and has a book blog you can read at https://blog.RedRockResearch.com.
Presented by Rubrik
Legacy backups are vulnerable to attacks, can’t help you find threats, and force you to do wholesale restores that drag out recovery times. Rubrik Zero Labs found that only 5% of organizations were able to return to business continuity or normal operations within one hour of discovering a CyberAttack. A modern cyber recovery solution is critical for Security and IT teams to be cyber-resilient. Learn how you can make your data indestructible.
Presented by Herb Williams, Field Technical Director • Cohesity
Join this session for a walk-through of a real-world ransomware attack and the necessary steps to recover. We will cover a cyber insurance form to show how it aligns with our “Protect, Detect, Recover” point of view, and we will speak to the specific capabilities associated with each point.
Presented by Summit Technology
There is a lot of chatter about new AI, machine learning, and automation technology hitting the market. Many of these hyped capabilities are available to you in the technology platforms that you are already paying for. Join us for some simple live examples demonstrating how you can utilize some of these tools to capitalize on new technology to enhance your personal productivity.
Presented by Beau Sorensen • Chief Operating Officer, First Choice Home Health & Hospice
One of the most challenging aspects of Information Technology is creating loyalty in your department. IT staff are incredibly smart and can solve almost every problem that comes at them, whether it is a broken computer, a bad connection, or software that isn’t working. Even though they are great at solving problems, IT is often looked at as the department of last resort because people don’t leave a discussion with IT feeling great about the solution. This session will turbocharge your ability to create an IT team that is not just great at problem-solving but is great at both things customers want. You will discover the two things that your customers want and how you and your department can successfully win friends and influence your reputation throughout the organization.
Beau Sorensen is currently the Chief Operating Officer of First Choice Home Health. Beau has over 25 years of experience in the healthcare industry and has extensive experience in leading teams, developing software, and training. He has worked with companies around the country, helping them improve results, increase loyalty, and enhance job satisfaction.
Presented by INTERFACE Advisory Council
With all the challenges of the last few years, IT departments have been tasked with keeping remote workers productive, protecting data, safeguarding networks, and many other tasks. Now that companies have solidified their in-office and remote working setups, security awareness needs to be revisited.
As we frequently see, many security issues come from insider threats. Whether intentional or accidental, network users still present a major security issue. Join the INTERFACE Salt Lake City Advisory Council for a discussion to offer some of the best tips to better protect from human errors. Local IT leaders will discuss their approaches, shares success stories, and discuss what else needs to be addressed. Bring your questions for an open conversation to try and help everyone better secure their network from internal threats.
Panelists:
Presented by Peter Martinson, Sr Security Engineer • Sanity Solutions
We all hear about ransomware on the news but are we prepared to deal with it? Join us as we talk through real-life case studies of companies that have gone through ransomware attacks and learn how the process works.
We will look at all the pieces of the puzzle and see if we can’t form a picture.
Presented by Sumi Gorla, Director of Systems Engineering • Illumio
Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:
Sumi Gorla is the Director of Systems Engineering at Illumio. Her responsibilities include executing Illumio strategic product vision, field engineering enablement, and enterprise customer selling and support across US West. Prior to Illumio, Sumi has held several engineering and technical sales leadership roles in companies such as EMC, Brocade, Citrix, and BigSwitch Networks. As a sales leader, Sumi brings a unique approach to problem-solving, from both a technical and a business perspective. Sumi’s strengths are in her ability to explain how technical features can meet business requirements for all levels of audience.
Presented by Neel Thakkar, Sales Engineer • Sonatype
Bad actors have recognized the power of open source and are now beginning to create their own attack opportunities. This new form of assault allows hackers to poison the well, where OSS project credentials are compromised, and malicious code is intentionally injected into open source libraries. In this session, Sonatype will explain how both security and developers must work together to stop this trend or risk losing the entire open source ecosystem.