[1 CPE] The Future of Object Storage: Where Do We Go from Here?

  Presented by Hitachi Vantara

While object storage has surged in popularity as an alternative to NAS due to the technological limitations of NAS, customers are now pushing the limits of object storage as well. Where do we take the technology from here to remain relevant and continue to address the needs of modern AI and ML workloads? We will look at the roots of object storage and what needs to happen to the technology to continue forward with today’s modern workloads. Using flash technology and highly parallelized workloads, we will take an in-depth look at some of the directions we expect the unstructured data storage landscape to take. Do we see a world of all flash storage leading the pack or will we continue to utilize hybrid technologies to optimize the economics of storage? Join us for an in-depth look at the current landscape of unstructured data storage and where we go from here to address modern data workloads.

[1 CPE] Unlearning Leadership

  Presented by Ken Knapton • Chief Information Officer, Progrexion

In this session, Dr. Knapton shares lessons that he has learned in multiple decades in the CIO seat. He will share his 10 operating principles that have formed the foundation of his leadership style. Whether you are starting your IT career or are a seasoned professional, you will be able to pick up several tips that will help you be a better leader. Leadership is constantly evolving, especially over the last couple of years. Join Dr. Knapton for insights about what leadership looks like now and how you can grow your technology career.

Dr. Knapton is a veteran technology leader with broad experience in IT operations, software development, enterprise architecture, software design, program management, project management, analytics, infrastructure, quality assurance, and user interaction. He applies his vast experience in his role as CIO to improve under-performing IT organizations and specializes in teaching IT organizations how to be agile and how to establish a service-oriented IT culture. He has worked in various industries, including healthcare, high tech, nonprofit, and financial services. Dr. Knapton holds 3 patents for his early work on enterprise security and anti-virus technology and has published a book on family safety and technology. Dr. Knapton earned his doctorate in IT with his dissertation on big data governance. He also holds a Master of Business Administration from Brigham Young University, a Master of Science with a focus on Strategic IT Leadership from Walden University, and a Bachelor of Science in Computer Science and Information Systems from Utah Valley University.

[1 CPE] Leveraging Actionable Threat Intelligence to Improve Your Security Posture

  Presented by Fortinet

Dealing with advanced threats requires a strategic, proactive approach, and every network security strategy is only as good as the threat intelligence it is based on. Learn how actionable global threat intelligence data can enable your organization to move toward a proactive security posture. Strategically leveraging local traffic data analyzed with AI and Machine Learning, coupled with other key cybersecurity tools is essential for building a proactive approach. Join us to learn why organizations of all sizes require an integrated security architecture, to reduce the very real risks to business continuity, brand reputation, and operational disruption.

[1 CPE] DevSecOps: Revolutionize Your Security

  Presented by Check Point

DevOps and continuous delivery models result in faster time-to-market. However, development, QA, and operations teams face challenges when it comes to incorporating security into the product life cycle. They are afraid of slowing things down, necessitating integrated DevSecOps best practices. Security approaches that worked in the past do not work with modern DevOps models. These outdated processes involve manual review processes of security risks at the end of product development and QA. This approach causes significant delays and does not scale with modern-day applications.

Organizations need to “shift security left” by including security and compliance controls as an integral part of the DevOps processes that manage the code being developed through to production.

Marlon is a Cloud Security Architect for Check Point Software Technologies. He is a specialist in DevSecOps and Emerging Technologies for the enterprise with over 25 years of progressive experience in Information Technology with a solid background in Cybersecurity. With his wealth of experience in Architecting and Designing solutions using Cloud (Azure, AWS & GCP), in this session, he is going to share “the challenges with DevOps Services and DevSecOps Strategy” as the enterprise adopts the modern cloud.

[1 CPE] Panel Discussion: The More Things Change…

  Presented by INTERFACE Advisory Council

For the last two years, there has been no shortage of change in how IT departments are organized. The structure in your shop likely looks nothing like it did in 2019. With the permanence of remote work, how have you evolved? Has your company kept up with the new landscape?

Please join the INTERFACE Salt Lake City Advisory Council for a discussion on the current landscape of leadership in the IT industry. We’ll discuss retaining employees, hiring workers remotely, dealing with the “great resignation,” and other topics of relevance to your IT career. Bring your questions for this open conversation with area leaders who will share their experiences and insights.

Panelists:

  • James Duckett, Manager, Technology Division, City of St George
  • Corona Ngatuvai, Chief Technology Architect, State of Utah
  • Greg Pugh, Information System Security Officer, Space Dynamics Laboratory
  • Kim Schroeder, Chief Technology Officer, Education at Work
  • Jon Shurtliff, Director of Technology, Oakdell Egg Farms

[1 CPE] Infrastructure Modernization: Your Foundation for Innovation and Business Agility

  Presented by Hitachi Vantara

Today’s infrastructure must be engineered to support digital innovation, such as accelerating your cloud, applications, and data. The agility, efficiency, and resilience required for new workloads, applications, and requirements are needed for a modernized infrastructure. Join us as we guide you on your infrastructure, application, and data modernization journey so that you can make smart modernization decisions and build Your Cloud, Your Way.

[1 CPE] Streamlining and Modernizing State Government

  Presented by Alan Fuller, Utah State CIO

Government faces many challenges when it comes to providing services to citizens. Join Alan Fuller to find out what the State of Utah is doing to stay secure, adopt innovative technologies, modernize IT systems, and improve the citizen digital experience with government. Bring your questions as well to find out the latest initiatives from the State of Utah.

Alan Fuller was appointed Chief Information Officer for the state of Utah in March 2021. As CIO, Fuller oversees all IT functions for executive branch agencies in Utah with the goal to improve innovation and improve government services through the use of technology. A resident of Lehi, Utah, Fuller has a bachelor’s degree in economics from Brigham Young University and an MBA from the Wharton School at the University of Pennsylvania.

[1 CPE] Stopping Attacks, Not Your Business: AI & Autonomous Response

  Presented by Darktrace

With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Maxwell Hopkins in this session where he explores the benefits of Autonomous Response as a must-have that goes beyond ‘defense’. Includes real-world threat finds and attack scenarios.

[1 CPE] IT and the Future of Work

  Presented by Michael Dietrich • Chief Technology Officer, Greater Nevada Credit Union

We keep hearing about the “new normal.” The pandemic brought about many changes. Demand for digital services increased. Remote work became the rule rather than the exception. And as more and more workers decide to pursue other passions it has become increasingly difficult to recruit qualified candidates, resulting in businesses offering worker flexibility and accommodations to expand the talent pool. This sea change has prompted businesses to rethink the workplace permanently. The idea of the “office” or the “campus” as defined physical space is becoming an archaic idea.

Technology professionals were the enablers of this change. During the pandemic, we solved problems to keep business and commerce running – because we were the only ones who could. Now that the new ways of working that were necessary for continuity of business are being permanently adopted, technology shops need to continue to adapt quickly. We no longer have the luxury of reduced budget and resource constraints to make things happen quickly during a crisis. As speed was the priority over quality during that time, we now need to mitigate gaps in the solutions provided. Most importantly, our teams are not simply supporting these changes. Our ways of working have changed dramatically as well. We as technology leaders need to adapt to new leadership, culture, and engagement challenges.

Greater Nevada Credit Union Chief Technology Officer Mike Dietrich discusses what this means to us as IT leaders, and the implications on IT support, security, and ways of working within technology support organizations.

Michael is currently the Chief Technology Officer for Greater Nevada Credit Union. In his 30-year career as a technology professional and leader, he has served as Chief Information Officer for the State of Nevada and held senior leadership roles at Microsoft, LinkedIn, Rackspace, and Ericsson. He has contributed to industry-changing innovations in media delivery, gaming, open hardware platforms, and AV communications.

Michael’s passion is finding the truly meaningful ways that technology can lead to better business outcomes and enhance our lives. To this end he is often heard using the phrase, “Know what done looks like,” which means seeing the result from the point of view of the customer, regardless of their technical skill level, to ensure that a technology solution delivers what is needed seamlessly and effortlessly.

In his words “IT has elevated from a basic requirement to a business enabler. It is now evolving from a business enabler to becoming the core of the business model itself regardless of the industry – an idea further solidified during the pandemic. As such, any conversation about the benefits of a solution should not be about the technology itself, but about what the solution can do for us. The technology we use impresses no one. What we accomplish with it is everything.”

[1 CPE] Defending Against Common Microsoft 365 Attacks

  Presented by Blumira

For organizations that use Microsoft 365, it’s a cornerstone of their business. Users rely on it to log in, receive and send email, and store and share sensitive data.

Microsoft 365 is also the most targeted software for cyberattacks, according to Statista.

These factors alone make Microsoft 365 a critical piece of technology to monitor. Adversaries tend to reuse techniques, tactics, and procedures (TTPs) to launch their attacks — and there are some common Microsoft 365 attacks that you’ll want to watch out for. You’ll learn:

  • How to detect threat actors’ favorite techniques for Microsoft 365 attacks
  • Why Microsoft 365’s built-in security settings aren’t enough protection
  • Easy ways to protect yourself against the rise in Microsoft 365 attacks

Matt Warner is CTO and Co-Founder of Blumira, a leading cybersecurity provider of automated threat detection and response technology. At Blumira, he leads the security and engineering efforts to provide actionable insights into cybersecurity risks at scale. Matt has over 10 years of experience in IT and development, focusing on business strategy, development, compliance, threat detection, and penetration testing. Previously, he was Director of Security Services, Development & Security at NetWorks Group, responsible for defensive information security and services.