[1 CPE] The Strongest Links in Your Chain: A Conversation on Team Engagement

  Presented by Alan Cunningham • Chief Information Officer, State of Nevada

As information technology professionals, we are used to constant change and the exhilaration that results from solving tough challenges. A chronic high-skilled labor shortage during a global pandemic has been the Everest of organizational challenges that government and all businesses are learning how to navigate, often with a reduction in resources.

Join Nevada State Chief Information Officer Alan Cunningham to learn why your current teams are your organization’s greatest asset, and how to reframe the current challenge of attracting, retaining, and developing technical talent pools as an exciting opportunity to create organizational resilience.

As CIO, Alan Cunningham establishes the strategic direction of Nevada state information technology. He served as the Washoe County School District’s Information Security Officer since 2016, following a 30 plus-year IT career in the private sector. He is a Certified Information Systems Security Professional (CISSP), certified in Strategic Planning, Policy and Leadership (GSTRT) and System and Network Auditor (GSNA) with extensive experience in cybersecurity operations, disaster recovery, business continuity planning, and policy and strategic planning. As an experienced street motorcycle racer, risk assessment is a constantly practiced skill.

[1 CPE] Data Classification and Compliance with Secure Storage

  Presented by Hitachi Vantara

With the continuing expanse of data, many companies struggle to store, categorize, and account for all of their corporate data. Due to this intensifying challenge, companies are unable to retrieve and analyze data in a way that leads to proper data governance. As their data grows, regulatory bodies institute laws and regulations to protect consumers’ data and ensure businesses are operating ethically. Unfortunately, companies that fail to comply with these changing regulations face large fines, loss of market share, and consumer backlash.

Join us for a demo to learn how Hitachi’s solutions can help companies find and manage their data through Data Classification and Secured Storage. Also learn if your company qualifies for the complimentary $100,000 data assessment 700+ customers have benefited from over the past decade.

[1 CPE] Handling the “New Normal” in Security and Beyond

  Presented by Keson Khieu • Chief Information Officer, California Emergency Medical Services Authority

Now that a hybrid workforce is likely to be the standard in both public and private enterprises, IT staffs have had to adapt. There has been an increase in ransomware threats that are making headlines. Handling privacy and compliance requirements has created unique challenges.

Security leaders must now navigate in new waters. We are truly entering a new model of cybersecurity that is here to stay. Join Keson Khieu, CISSP, PMP, ITIL, for a though-provoking discussion. You will get many takeaways about how these new challenges are actually great business opportunities for your firm.

[1 CPE] Privacy in the Age of Big Data: You Want to Know What About Me?

  Presented by Steve Smith • Chief Information Officer, University of Nevada Reno

Do you know who has access to data about you? What data, where it is, how it is shared, when (if ever) it is deleted? Facial recognition and other biometric tracking capabilities may be giving rise to surveillance capitalism. We are normalizing technologies that nobody knows how they will be used in the long term. At the same time laws like the European Union General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) are imposing compliance requirements that impact how business is conducted. Learn the latest about the technologies and the policies that impact privacy and how it may impact the role of IT.

Bio:
Steve Smith is the Vice Provost for Information Technology and CIO for the University of Nevada, Reno (UNR). UNR is a Carnegie Classified R-1 research university and the land grant institution for the state of Nevada. Steve has been at UNR since 2015. Prior to that, he held similar positions at the University of Hawaii system and the University of Alaska system with over 35 years of experience in information technology in higher education. He has extensive experience in networks and large systems for research and education. He is chair of the board for the Pacific Northwest Gigapop and Co-Chair of the Schools, Health & Libraries Broadband (SHLB) Coalition Higher Education Policy Group. Steve is also a member of the Juniper Higher Education Advisory Board and the VMWare Higher Education Peer Advisory Board.

[1 CPE] Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak & Aruba, a HPE Company

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, we’ll discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations

[1 CPE] How Zero-Trust Enables the Future of “Work from Anywhere” Secure Access

  Presented by Duo Security

The perimeter-focused security model of decades past is no longer adequate for securing the modern enterprise. Now, organizations must secure a mobile workforce using a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks — and this trend only accelerated during 2020’s global shift to remote work. Fortunately, a modern access strategy built on zero-trust fundamentals can defend today’s workforce while paving the way to a passwordless future. Attend this session to learn how the zero-trust access model works, reduce your reliance on passwords and risk of password-based attacks, and how to start planning and staging your zero-trust evolution today.

[1 CPE] How to Manage and Simplify Your IT While Lowering Your TCO for Government

  Presented by Nutanix

As Government leaders pivot to meet the unique challenges of an extraordinary 2021, a new normal is emerging: organizations are increasingly tasking IT to find and deliver rapid new business value through increased efficiency, enhanced automation, accelerated time to market, sharp innovation, and rock-solid cost savings.

For these organizations, it’s time to reach a new economic advantage. Learn how you can save your valuable budget, time, and manpower and redistribute resources toward more high-value initiatives. After all, your infrastructure should deliver returns—not add complexity and costs over time.

[1 CPE] Protect Your Applications and Data from Ransomware Threats

  Presented by Airgap Networks

Typical enterprise attack surface has dramatically increased post COVID19. Employees, contractors, and vendors have access to enterprise crown jewels over legacy and insecure VPN technology for their respective home environments. It is no wonder that we are witnessing a rapid increase in cybercrimes in the last 18 months. Is protecting your application and data your top priority? If so, please join us in the session to understand the threat landscape and various technology options to safeguard your assets.

We believe the fundamental issues faced by the organizations relate to excessive trust relationships over VLANs and VPNs. For better security, we must ensure that every transaction is authorized and authenticated, and we must make this happen without the need for a bunch of legwork.

Join us and learn more about our point of view on how you can protect your assets without forklift upgrades. Ritesh Agrawal, Co-Founder and CEO of Airgap Networks, will discuss industry leadership and provide a technology overview, addressing the following:

  • How does the modern Application Access approach compare to the traditional remote access VPN?
  • What’s the best method to deploy and operate Universal Secure Access Solution?
  • How to apply zero trust principles, especially for legacy protocols such as SSH, SMB, WMI, RDP, etc.?
  • What’s the importance of SSO/MFA authentication coupled with intent check?
  • Walkthrough (Demo) real-world use cases across private and public sectors.

Enjoy the INTERFACE event and we look forward to meeting you at the (virtual) booth.

[1 CPE] Secure Connectivity, Delivered in the Cloud

  Presented by Optiv Security & iboss

Come learn what SASE (Secure Access Service Edge) is and understand the decisions you’ll need to make as you map out your own SASE journey.

In this session you’ll learn:

  • What is driving almost every company to consider SASE?
  • What decisions are being considered by Networking and Security teams?
  • What services can you replace with SASE?
  • Architecture matters! What are my options?
  • How do I migrate to SASE with zero downtime?

[1 CPE] Data Protection Predictions for 2021

  Presented by Druva

Phil Goodwin, Research Director at IDC, joins W. Curtis Preston, Druva’s Chief Technical Evangelist, for a discussion on key trends and developments expected from the world of cloud data backup and prediction in 2021.

Curtis Preston is an expert in backup & recovery systems; a space he has been working in since 1993. He has written four books on the subject, the fourth of which is Modern Data Protection from O’Reilly. It was published in May 2021. He is the host of the Restore It All podcast, and the founder and webmaster of backupcentral.com, a website dedicated to backup and recovery.