[1 CPE] How to Dramatically Transform Employee Satisfaction with Your IT Team

  Presented by Beau Sorensen • Chief Operating Officer, First Choice Home Health & Hospice

One of the most challenging aspects of Information Technology is creating loyalty in your department. IT staff are incredibly smart and can solve almost every problem that comes at them, whether it is a broken computer, a bad connection, or software that isn’t working. Even though they are great at solving problems, IT is often looked at as the department of last resort because people don’t leave a discussion with IT feeling great about the solution. This session will turbocharge your ability to create an IT team that is not just great at problem-solving but is great at both things customers want. You will discover the two things that your customers want and how you and your department can successfully win friends and influence your reputation throughout the organization.

Beau Sorensen is currently the Chief Operating Officer of First Choice Home Health. Beau has over 25 years of experience in the healthcare industry and has extensive experience in leading teams, developing software, and training. He has worked with companies around the country, helping them improve results, increase loyalty, and enhance job satisfaction.

[1 CPE] Panel: Has Security Awareness Been Forgotten?

  Presented by INTERFACE Advisory Council

With all the challenges of the last few years, IT departments have been tasked with keeping remote workers productive, protecting data, safeguarding networks, and many other tasks. Now that companies have solidified their in-office and remote working setups, security awareness needs to be revisited.

As we frequently see, many security issues come from insider threats. Whether intentional or accidental, network users still present a major security issue. Join the INTERFACE Salt Lake City Advisory Council for a discussion to offer some of the best tips to better protect from human errors. Local IT leaders will discuss their approaches, shares success stories, and discuss what else needs to be addressed. Bring your questions for an open conversation to try and help everyone better secure their network from internal threats.

Panelists:

  • Greg Pugh, Information System Security Officer/COMSEC Engineer, Space Dynamics Laboratory
  • Paul Tew, Information Security Officer, Snow College
  • Danny Yeo, Information Technology Director, Brigham Young University Life Sciences

[1 CPE] The Ransomware Recovery Puzzle

  Presented by Peter Martinson, Sr Security Engineer • Sanity Solutions

We all hear about ransomware on the news but are we prepared to deal with it? Join us as we talk through real-life case studies of companies that have gone through ransomware attacks and learn how the process works.

  • Timeline of an attack
  • Recovery of Systems
  • To pay or not to pay
  • Legal concerns
  • Cyber Insurance

We will look at all the pieces of the puzzle and see if we can’t form a picture.

[1 CPE] Zero Trust Microsegmentation – It’s Easier Than You Think

  Presented by Sumi Gorla, Director of Systems Engineering • Illumio

Regardless of the sophistication of the ransomware, the end goal is always the same: get in through a vulnerability and move laterally through your network. Join this presentation as we help peel back the layers to provide you with simple steps to get started that include:

  • Gaining visibility to where you are the most vulnerable
  • Closing risky ports
  • Leveraging tools you already have in place without adding layers of complexity

Sumi Gorla is the Director of Systems Engineering at Illumio. Her responsibilities include executing Illumio strategic product vision, field engineering enablement, and enterprise customer selling and support across US West. Prior to Illumio, Sumi has held several engineering and technical sales leadership roles in companies such as EMC, Brocade, Citrix, and BigSwitch Networks. As a sales leader, Sumi brings a unique approach to problem-solving, from both a technical and a business perspective. Sumi’s strengths are in her ability to explain how technical features can meet business requirements for all levels of audience.

[1 CPE] Open Source Developers Are Security’s New Front Line

  Presented by Neel Thakkar, Sales Engineer • Sonatype

Bad actors have recognized the power of open source and are now beginning to create their own attack opportunities. This new form of assault allows hackers to poison the well, where OSS project credentials are compromised, and malicious code is intentionally injected into open source libraries. In this session, Sonatype will explain how both security and developers must work together to stop this trend or risk losing the entire open source ecosystem.

  • Analyze and detail the events leading to today’s “all-out” attack on the OSS industry.
  • Define the future of open source in today’s new normal.
  • Outline how developers can step into the role of security to protect themselves and the millions of people depending on them.

[1 CPE] Protecting Your Data from Ransomware Where it Lives: Your Last Line of Defense

  Presented by Spencer Tidwell, Hybrid Cloud Enterprise Architect • Hitachi Vantara

If an attack happens and makes it all the way to your data, then they have already broken through all your walls. Where your data lives IS your last line of defense, which is why the Armed Forces that protect the USA trust Hitachi to protect them. Prevention is great but without that last line of defense, you’re a sitting duck. Attend this session to learn how Hitachi serves as your last line of defense against ransomware attacks.

[1 CPE] Seeing Your Attack Surface Through the Eyes of an Adversary

  Presented by Kraig Faulkner, Channel Systems Engineer, Cortex • Palo Alto Networks

Modern attack surfaces are dynamic. Without clear visibility that is constantly updated, it is all too easy to have persistent exposures and unmanaged assets. Security practitioners can only be as good as the data they have, so having a strong foundation of continuous discovery and monitoring ensures you can keep up with modern, dynamic attack surfaces in order to find, prioritize, and mitigate exposures as they arise.

[1 CPE] Why is Critical Data Being Compromised?

  Presented by Thales & Structured

Securing critical data and information was where this industry started a long time ago, but it became more challenging with the rapid growth of enterprise data in an interconnected world. The pandemic forced organizations to support a remote workforce and expose critical systems that were once only accessible from inside the company’s network. We’ve increased the attack surface and the number of vulnerabilities which has led to more data breaches. With the technology advancements in access management, data discovery and encryption we can once again shift the focus to securing our data and information. In this presentation, we will discuss a unified data-centric security approach and strategy to protecting your most critical data and information.

[1 CPE] Security Service Edge (SSE) is redefining Cloud, Data, and Network Security

  Presented by Netskope

The inversion effect of cloud applications, users, and data outside of the corporate network, along with the new hybrid workforce, demands a new approach to IT security and network architecture. Cloud application traffic has overtaken web traffic in the enterprise, creating blind spots and complexity with existing legacy security and network solutions that were designed for access to data centers through on-premises security stacks. These challenges demand a new approach to cloud security that delivers the simplicity and agility for access, security, and performance that businesses need for their successful digital transformation journeys while securing their critical data assets and embracing zero-trust principles. They also demand an intelligent solution approach based on a converged, cloud-native architecture.