[1 CPE] The Most Important Shift for Cybersecurity in a Generation

  Presented by Steve Riley, Field CTO • Netskope

We live in a world where everything is hybrid and the blend between personal, corporate, private, and public is ever-changing and presents us with a host of new challenges. This has increased and complicated the attack surface and the pressure to converge tools and do “more with less” is at peak levels. We must meet this watershed moment with the right team, plans, and technology.

Join this interactive session to learn:

  • How to build an effective plan for change without adding to the chaos
  • What consolidation approaches save money without sacrificing security
  • Use cases that deliver immediate value and efficiency while improving user experience

[1 CPE] Zero Trust Microsegmentation: It’s Easier Than You Think

  Presented by Tony Steffe, Sr Systems Engineer, CISSP • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

Tony is a knowledgeable technical professional with 20+ years of experience developing, selling, and integrating technology for enterprise customers. He is effective in sales engineering, Internet security, project management, computer networking, and interpersonal relations. Exceptional at managing the personal and technical challenges that arise from building something new, Tony has successfully built out several high-impact IT projects.

[1 CPE] Cloud AI Ops: Changing the Network Management Paradigm

  Presented by Bob Friday •
Chief AI Officer & CTO Enterprise, Juniper Networks

Artificial intelligence (AI) is poised to transform every aspect of our lives, from agriculture to health care, autonomous vehicles and mobile internet. But how did AI evolve from a scientific curiosity to a practical necessity? And how is AI changing the way we design, operate, and manage networks?

In this session, we will explore the history and the future of AI, with a focus on networking applications. We will share the Mist journey to cloud AI, and how we leveraged machine learning and deep learning to create a cloud AIOp solution that simplifies and automates network operations, improves user experience, and reduces costs. We will also discuss the fundamental elements of a networking cloud AIOp solution, such as data collection, processing, analysis, and action. Finally, we will examine the impact of AI on networking IT and the broader economy, and how AI can create new opportunities and challenges for network professionals.

Join us for this exciting and informative keynote and learn how AI can help you take your network to the next level.

Bob’s career as a wireless entrepreneur is focused on developing and bringing to market unlicensed wireless technologies. He was recognized as a Wi-Fi “mover and shaker” by Light Reading, was a key contributor to the HS2.0 industry standard and holds over 15 patents.

Bob started his wireless career at Metricom (Ricochet wireless network) with the original release of the part 15 FCC unlicensed rules in developing and deploying wireless mesh networks across the country to connect the first generation of Internet browsers. Following Metricom, Bob co-founded Airespace, a start-up focused on helping enterprises manage the flood of employees bringing unlicensed Wi-Fi technology into their businesses. Cisco acquired Airespace in 2005 for $450M where Bob became the VP/CTO of Cisco enterprise mobility and drove mobility strategy and investments in the wireless business (e.g. Navini, Cognio, ThinkSmart, Phunware, Wilocity, Meraki ). He also drove industry standards such as HS2.0 and market efforts such as Cisco’s Connected Mobile Experience. Bob left Cisco in May 2014 to co-found Mist Systems, an early-stage start-up focused on helping enterprises deliver business critical mobile experiences to their customers and employees.

[1 CPE] Panel: How to Build a Successful Relationship with Your Resellers

  Presented by INTERFACE Advisory Council

A value-added reseller (VAR) can have a tremendous impact on the efficiency of how your IT department functions. Budgets can be a challenge to navigate to ensure your needs are met. A good way to make sure you are getting the most out of your IT purchases is to develop the correct strategic relationship with your VARs.

Join this panel discussion for industry tips on improving communication and learning to be proactive in your approach to solving problems. A quality reseller relationship will not only save you financially, but it can also allow you to have a better performance within your IT department. The knowledge and experience that your reseller’s team has can be a great asset to your own team. Bring your questions about cultivating this relationship and maximizing your long-term value.

Panelists:

  • Lorraine Bessmer, Manager, Cybersecurity, St Luke’s Health System
  • Cody Kreps, Director, Information Services, Nampa School District
  • Robert Peterson, Director, Information Technology, Washington County, ID
  • Dan Roberts, Director, Infrastructure, Cybersecurity, Western States CAT

[1 CPE] What the Hack is Going On! An Offensive Look at Modern Breaches

  Presented by Tim Medin, Chief Executive Officer • Red Siege

Join this session for a comprehensive overview of modern cybersecurity threats and how breaches occur. I will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited.

[1 CPE] The Current Threat Landscape Requires a Unique Approach

  Presented by Liran Chen, Vice President, Sales Engineering & Technical Services • Forescout

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

[1 CPE] The Future of AI-Enabled Data Platforms

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Removing the infrastructure silos and administration complexity around your application’s data gives you the flexibility to consume solutions and deliver total data freedom. Join us as we showcase the future of data storage as a single hybrid cloud platform for applications. Allowing you to consume the data services you need, where and when you need it! Offering a single data plane and control plane across block, file, object, and mainframe, with one common experience for administration, analytics, and automation.

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

[1 CPE] A Complete Security Blueprint

  Presented by Brad Nigh, Consulting Strategist • FRSecure

By analyzing your existing program, work completed, and using our categorization—foundational, developing, and mature—you should be able to place yourself and get an idea of what’s next for your security program.

Brad Nigh is a passionate information security expert with 25+ years of overall IT experience, including 15+ years of IT management and leadership experience working in 24/7 environments that required top-tier technical skills, and efficient project management. In addition, he has years of experience working in highly regulated industries that are required to comply with PCI-DSS, HIPAA, HITECH, Sarbanes-Oxley, OCC, and various state regulatory requirements. At FRSecure he leads the Consulting Services practice serving businesses of all sizes, in all industries by cooperatively solving the complex issues surrounding information security.

[1 CPE] A Pragmatic Approach to Implementing a Cloud Service Operating Model

  Presented by Pure Storage & Structured

For almost 10 years now, future-focused datacenter teams have been trying to evolve to a more cloud-like operating model. Some of us have succeeded, some of us have failed. During this fun-filled, example-heavy session, Solutions Architect Tristan Todd will share patterns of failure, patterns of success, some practical examples, and recipes for success on how organizations have succeeded in realizing success in adapting to a cloud ops model. This will be a fun, interactive, high-energy session that you won’t want to miss!