[1 CPE] Case Study: Modernizing Authentication in the Enterprise

  Presented by Pete Hernandez, Principal Security Architect • Atmosera

Join us as we discuss the challenges a global manufacturing company faced 2-years after adopting a modern authentication platform. We’ll cover how to approach adaptive access correctly, based on user context. We’ll cover how sprawling App registrations and misshapen service accounts were brought under control. Also, we’ll talk about how to govern identities correctly using Separation of Duties. Finally, we’ll review the real-world journey of adopting a Zero Trust Model for dynamic environments and how ZT empowers enterprises to remain resilient in the face of today’s threats.

[1 CPE] Next Era of Corporate Leadership: The Transformative Role of CIOs

  Presented by Lutz Beck • Chief Information Officer, Daimler Truck North America

In an era where technology underpins every facet of business operations, Chief Information Officers (CIOs) are no longer mere managers of IT infrastructure but pivotal figures leading the change in redefining the organizational landscape. This keynote highlights the evolving role of CIOs as architects of innovation, who through the lens of process re-imaging and strategic foresight, are setting new precedents in business leadership and revenue. By embracing end-to-end process transformation, the next generation of CIOs are not just enhancing operational efficiencies but are at the forefront of driving revenue growth and fostering a culture of holistic strategic thinking.

Lutz Beck, Chief Information Officer at Daimler Truck North America (DTNA), is shaping the future of IT. By directing cultural change through digital activation, his visionary IT strategy, “Building the Intelligent Company,” guides digital transformation at DTNA, positioning the organization at the cutting edge of technology. Lutz champions IT Leadership, disruptive ideas, and innovation by re-imagining the way business is done.

Before becoming the CIO at DTNA, Lutz was the CIO at Daimler Truck Asia (Mitsubishi Fuso in Japan and Bharat Benz in India). As CIO, Lutz was responsible for the overarching IT technology strategy, ConnectX. Under his leadership, connectivity and big data analytics for DA were initiated, developed, and successfully established.

Before DTA, Lutz held various management positions at Daimler in Germany.

[1 CPE] Modernizing Your DR Strategies Against Ransomware

  Presented by Eddie Huang, Sr Systems Engineer • Quest Software

Scenarios of data loss, including ransomware attacks, can be crippling with the inability to access data, interruption of business operations, and in some cases, significant cost penalties. Creating a Disaster Recovery plan becomes critical to be prepared for unforeseen risks.

But where do you begin? Join us to better understand the importance of starting from the beginning and ensuring all stakeholders are involved and armed with a solid understanding of Data Protection before problems such as malicious attacks and general system failures impact an organization.

We’ll focus on:

  • Best practices to adhere to when creating a DR plan with “recovery” as the focus.
  • The importance of viewing Data Protection from this perspective is to better understand what it means to “protect the backup.”

[1 CPE] AI: Friend or Foe? An Open Discussion With Your Colleagues

  Presented by INTERFACE Advisory Council

Artificial Intelligence has made a mark already and its use will only continue to expand. Are we fully prepared to embrace AI in our workplaces? Viewpoints differ on how widely AI should be used at this point. Commonly used applications and software now include AI capabilities as a part of their standard offerings. How is this governed in your company? Do you even have an AI policy drafted?

Join the INTERFACE Advisory Council for an open discussion on all things AI. We will cover the risks associated with using AI –– and the risk of NOT using it. What knowledge do you need right now? Bring your questions as we explore the starting points that every IT department needs to consider for an effective AI policy.

Artificial Intelligence has made a mark already and its use will only continue to expand. Are we fully prepared to embrace AI in our workplaces? Viewpoints differ on how widely AI should be used at this point. Commonly used applications and software now include AI capabilities as a part of their standard offerings. How is this governed in your company? Do you even have an AI policy drafted?

Join the INTERFACE Advisory Council for an open discussion on all things AI. We will cover the risks associated with using AI –– and the risk of NOT using it. What knowledge do you need right now? Bring your questions as we explore the starting points that every IT department needs to consider for an effective AI policy.

Moderator: Richard Appleyard, Director of Information Design & Technology, Oregon State Bar

Panelists:

  • Ed Arib, Technology Manager, Portland Police Bureau
  • Brandon Gatke, CIO / CISO, Pacific University
  • Steve Hankel, Vice President, Information Technology Johanson Transportation Service
  • Saby Waraich, Chief Information Officer, Clackamas Community College

[1 CPE] Implementing Vendor-Agnostic Zero Trust Networking Access

  Presented by Kevin Heide, Director of Enterprise Networking • Cerium Networks

In the realm of cybersecurity, the Zero Trust Networking Access (ZTNA) model has emerged as a paramount strategy for safeguarding digital assets. This presentation focuses on the practical implementation of a vendor-agnostic Zero Trust approach, guided by the standards set by the National Institute of Standards and Technology (NIST) and the Cybersecurity and Infrastructure Security Agency (CISA).

We will explore the fundamental principles of the Zero Trust model, emphasizing its ‘never trust, always verify’ philosophy. This approach is critical in a landscape where traditional perimeter-based security models fall short against sophisticated cyber threats. The talk will elucidate how a vendor-agnostic ZTNA framework enhances flexibility and interoperability, allowing organizations to integrate the best solutions irrespective of vendor.

Special attention will be given to aligning ZTNA implementations with NIST’s guidelines and CISA’s recommendations. This alignment ensures that Zero Trust architectures are robust, compliant, and capable of mitigating a wide range of cyber threats. We will review key NIST publications, such as NIST SP 800-207, to demonstrate how they can be practically applied in crafting a Zero Trust strategy.

[1 CPE] Achieving Your Goals with Hybrid Cloud

  Presented by Chet Sulgrove, Technical Expert, Hybrid Cloud & Converged Infrastructure Healthcare Solutions • Hitachi Vantara

The extension of traditional data center applications to include public cloud has led to a rethinking of how to approach cloud strategies with a common operations model that can scale up and down quickly to take advantage of new business opportunities. As a result, companies are seeking to balance their public and private cloud strategy, aligning to a common Hybrid Cloud Operating Model.

Chet Sulgrove is a seasoned Solutions Specialist with a dynamic career spanning 36 years in the IT industry, with a significant focus on Hybrid Cloud and Converged Infrastructure. Chet’s approach is notably holistic and consultative, prioritizing a deep understanding of each client’s unique business objectives, challenges, and requirements. His tenure includes more than 10 years at Hitachi Vantara, where he has honed his skills in leveraging business insights, discovery, and competitive analysis. Known for building strong, trust-based relationships, Chet effectively collaborates with executive leaders, stakeholders, technologists, and partners, balancing technical acumen with a keen focus on partnership and customer-centric solutions.

[1 CPE] Navigating the Cybersecurity Landscape: Essential Considerations for MDR

  Presented by Wayne Selk, Vice President of Cybersecurity Programs and Executive Director at CompTIA ISAO • ESET

Join Wayne Selk, Vice President of Cybersecurity Programs and Executive Director at CompTIA ISAO, and ESET as they navigate the intricacies of MDR (Managed Detection and Response) services and chart a course for enhanced cybersecurity resilience. Discover the importance of 24/7 service coverage in the face of global threats and the importance of human analysts working alongside your technology stack. Understand how compliance requirements influence vendor selection.

[1 CPE] Modernizing Physical Security

  Presented by Verkada

In this session, we’ll look at the technologies at the forefront of enterprise building security. Connected security devices can provide users with real-time insights and a full picture of the health and safety of their environments. We’ll explore how to minimize security risks, workplace frustrations, and costly inefficiencies with best–in–class solutions that provide a scalable way to easily configure, monitor and respond to events from anywhere. Learn how modernizing your physical security can help you seamlessly safeguard the physical world –– without sacrificing privacy –– to operate safer, smarter buildings.

[1 CPE] Seeing Your Attack Surface Through the Eyes of an Adversary

  Presented by Kraig Faulkner, Channel Systems Engineer – Cortex • Palo Alto Networks

Modern attack surfaces are dynamic. Without clear visibility that is constantly updated, it is all too easy to have persistent exposures and unmanaged assets. Security practitioners can only be as good as the data they have, so having a strong foundation of continuous discovery and monitoring ensures you can keep up with modern, dynamic attack surfaces to find, prioritize, and mitigate exposures as they arise.

[1 CPE] How to Stop East/West Attacks in Your Data Center

  Presented by Aruba Networks

70% of all breaches are caused by endpoint security vulnerabilities, followed by lateral movement in the data center. Halt that hacker traffic. Attend this session to learn about a new category of data center switch that combines best-of-breed L2/3 switching with the industry’s first hardware-accelerated programmable processor. This new tool augments your malware and ransomware detection and response capabilities by delivering stateful firewall services inline, at scale, with wire-rate performance and orders of magnitude improvement over traditional data center L2/3 switches. You will learn how to gain visibility and enforce security policy for all East/West flows between workloads to protect the critical assets in your data center.