[1 CPE] Handling the “New Normal” in Security and Beyond

  Presented by Keson Khieu • Chief Information Officer, California Emergency Medical Services Authority

Now that a hybrid workforce is likely to be the standard in both public and private enterprises, IT staffs have had to adapt. There has been an increase in ransomware threats that are making headlines. Handling privacy and compliance requirements has created unique challenges.

Security leaders must now navigate in new waters. We are truly entering a new model of cybersecurity that is here to stay. Join Keson Khieu, CISSP, PMP, ITIL, for a though-provoking discussion. You will get many takeaways about how these new challenges are actually great business opportunities for your firm.

[1 CPE] Privacy in the Age of Big Data: You Want to Know What About Me?

  Presented by Steve Smith • Chief Information Officer, University of Nevada Reno

Do you know who has access to data about you? What data, where it is, how it is shared, when (if ever) it is deleted? Facial recognition and other biometric tracking capabilities may be giving rise to surveillance capitalism. We are normalizing technologies that nobody knows how they will be used in the long term. At the same time laws like the European Union General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) are imposing compliance requirements that impact how business is conducted. Learn the latest about the technologies and the policies that impact privacy and how it may impact the role of IT.

Bio:
Steve Smith is the Vice Provost for Information Technology and CIO for the University of Nevada, Reno (UNR). UNR is a Carnegie Classified R-1 research university and the land grant institution for the state of Nevada. Steve has been at UNR since 2015. Prior to that, he held similar positions at the University of Hawaii system and the University of Alaska system with over 35 years of experience in information technology in higher education. He has extensive experience in networks and large systems for research and education. He is chair of the board for the Pacific Northwest Gigapop and Co-Chair of the Schools, Health & Libraries Broadband (SHLB) Coalition Higher Education Policy Group. Steve is also a member of the Juniper Higher Education Advisory Board and the VMWare Higher Education Peer Advisory Board.

[1 CPE] Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak & Aruba, a HPE Company

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, we’ll discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations

[1 CPE] How Zero-Trust Enables the Future of “Work from Anywhere” Secure Access

  Presented by Duo Security

The perimeter-focused security model of decades past is no longer adequate for securing the modern enterprise. Now, organizations must secure a mobile workforce using a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks — and this trend only accelerated during 2020’s global shift to remote work. Fortunately, a modern access strategy built on zero-trust fundamentals can defend today’s workforce while paving the way to a passwordless future. Attend this session to learn how the zero-trust access model works, reduce your reliance on passwords and risk of password-based attacks, and how to start planning and staging your zero-trust evolution today.

[1 CPE] How to Manage and Simplify Your IT While Lowering Your TCO for Government

  Presented by Nutanix

As Government leaders pivot to meet the unique challenges of an extraordinary 2021, a new normal is emerging: organizations are increasingly tasking IT to find and deliver rapid new business value through increased efficiency, enhanced automation, accelerated time to market, sharp innovation, and rock-solid cost savings.

For these organizations, it’s time to reach a new economic advantage. Learn how you can save your valuable budget, time, and manpower and redistribute resources toward more high-value initiatives. After all, your infrastructure should deliver returns—not add complexity and costs over time.

[1 CPE] Protect Your Applications and Data from Ransomware Threats

  Presented by Airgap Networks

Typical enterprise attack surface has dramatically increased post COVID19. Employees, contractors, and vendors have access to enterprise crown jewels over legacy and insecure VPN technology for their respective home environments. It is no wonder that we are witnessing a rapid increase in cybercrimes in the last 18 months. Is protecting your application and data your top priority? If so, please join us in the session to understand the threat landscape and various technology options to safeguard your assets.

We believe the fundamental issues faced by the organizations relate to excessive trust relationships over VLANs and VPNs. For better security, we must ensure that every transaction is authorized and authenticated, and we must make this happen without the need for a bunch of legwork.

Join us and learn more about our point of view on how you can protect your assets without forklift upgrades. Ritesh Agrawal, Co-Founder and CEO of Airgap Networks, will discuss industry leadership and provide a technology overview, addressing the following:

  • How does the modern Application Access approach compare to the traditional remote access VPN?
  • What’s the best method to deploy and operate Universal Secure Access Solution?
  • How to apply zero trust principles, especially for legacy protocols such as SSH, SMB, WMI, RDP, etc.?
  • What’s the importance of SSO/MFA authentication coupled with intent check?
  • Walkthrough (Demo) real-world use cases across private and public sectors.

Enjoy the INTERFACE event and we look forward to meeting you at the (virtual) booth.

[1 CPE] Secure Connectivity, Delivered in the Cloud

  Presented by Optiv Security & iboss

Come learn what SASE (Secure Access Service Edge) is and understand the decisions you’ll need to make as you map out your own SASE journey.

In this session you’ll learn:

  • What is driving almost every company to consider SASE?
  • What decisions are being considered by Networking and Security teams?
  • What services can you replace with SASE?
  • Architecture matters! What are my options?
  • How do I migrate to SASE with zero downtime?

[1 CPE] Data Protection Predictions for 2021

  Presented by Druva

Phil Goodwin, Research Director at IDC, joins W. Curtis Preston, Druva’s Chief Technical Evangelist, for a discussion on key trends and developments expected from the world of cloud data backup and prediction in 2021.

Curtis Preston is an expert in backup & recovery systems; a space he has been working in since 1993. He has written four books on the subject, the fourth of which is Modern Data Protection from O’Reilly. It was published in May 2021. He is the host of the Restore It All podcast, and the founder and webmaster of backupcentral.com, a website dedicated to backup and recovery.

[1 CPE] Building a Response Strategy to Advanced Threats

  Presented by ExtraHop Networks

The SolarWinds SUNBURST attack was a rude awakening for many security teams, and it won’t be the last time Security leaders face tough questions about how an adversary evaded defenses and stayed hidden. With threats persisting inside the network for months, security teams need a new plan. In this session, CISO Jeff Costlow discusses strategies, including revising existing mental models and incident response processes, to build resilience in the fight against advanced threats.

[1 CPE] Cybersecurity Maturity Model Certification: Considerations for Compliance

  Presented by Matanuska Telephone Association

Everything You Need to Know About CMMC:

In 2007, Chinese hackers successfully targeted a Department of Defense (DoD) subcontractor leading to the creation of a powerful fighter jet. During this cyberattack, the Chinese stole enough data to make their J-20 stealth fighter jet a real threat to the USA. The reality of this attack is that it wasn’t just a one-off event—over $600 billion is lost globally due to cyber theft every year. With that in mind, the DoD knew something needed to change.

Changes to cybersecurity compliance are coming. Before the introduction of the cybersecurity maturity model certification (CMMC), any self-attesting defense contractors could say that they were compliant with specific cybersecurity guidelines—without having to prove it. This not only left room for contractors to become complacent but diminished all compliant defense contractors’ credibility. In short, contractors who were reckless with sensitive information weren’t held accountable—until now.

With the rollout of the CMMC, contracting with the DoD is more specialized than ever—especially if you’re dealing with controlled unclassified information (CUI). But these new guidelines also mean the space will become more lucrative. It’s estimated that 129,810 businesses will likely pursue CMMC certification in the first 5 years.

CMMC boils down to 3 major points:

  1. It’s mandatory. All CMMC requirements will explicitly address what level your company needs to be at to send or receive any future federal agency RFIs and RFPs.
  2. It’s verifiable. Proof of certification will be accessible electronically.
  3. It’s a long-term investment. Many organizations see between 12-18 months of continual effort to complete their compliance projects fully.

Presented by Rob Thurston, Chief Technology Officer at Ampersand, Alaska’s leading technology services provider, attendees will learn about compliance requirements, sustainability, and risks for DoD contractors.