[1 CPE] Cybersecurity, the Path of Most Resistance

  Presented by Dick Wilkinson • Chief Technology Officer, Supreme Court of New Mexico

As computer users continue to expect an increasingly seamless and touchless user experience from their devices, the cybersecurity industry insists on adding more touches and more seams to keep things locked up. This disconnect from users’ expectations to how we implement security controls leads to a variety of problems. It will take the entire industry shifting course to recognize the user’s demands to overcome this disconnect.

Dick Wilkinson is the Chief Technology Officer on staff with the Supreme Court of New Mexico and the Co-founder and CTO of Proof Labs inc. He is a retired Army Warrant Officer with 20 years of experience in the intelligence and cybersecurity field. He has led diverse technical missions ranging from satellite operations and combat field digital forensics to enterprise cybersecurity and cyber research for the Secretary of Defense.

[1 CPE] Global Supply Chain Cybersecurity

  Presented by New Mexico Tech Council

In today’s complex business environment, supply chains have become equally complex. For many organizations, those supply chains deliver both goods and services where software is a critical component.

The New Mexico Technology Council’s Cybersecurity Peer Group is proud to present on Global Supply Chain Security Concerns with Mark Fidel of RiskSense, Dr. Tyler Lovelly of the Air Force Research Laboratory at Kirtland Air Force Base, and Geoff Wilkerson of Seagate Technology. Join us to learn about the Cybersecurity concerns right now, and what is being done to mitigate these risks. The panel of New Mexico experts will touch on challenges from both the private and public sector.


Bios:

Mark Fidel is currently a co-founder RiskSense and manages all State, Local, and Educational Markets in New Mexico and the United States. He has a J.D. in Law, graduating from the University of Denver – Sturm College of Law. He earned his Executive MBA from the University of New Mexico and his bachelor’s degree in Finance from New Mexico State University.

Dr. Tyler M. Lovelly works within the Space Electronics Technology program at the Air Force Research Laboratory at Kirtland Air Force Base, New Mexico. His previous experience includes working with United Space Alliance supporting the NASA Space Shuttle program, serving as a research group leader at the NSF Center for Space, High-Performance, and Resilient Computing, and participating in the AFRL Space Scholars program. He holds a Ph.D. in Electrical and Computer Engineering from the University of Florida.

Geoff Wilkerson is a member of the Product Security Office at Seagate Technology, where his primary focus is security compliance and managing product certifications. Geoff’s background is in project management, information security, and supply chain security. A member of the OTTF for several years, Geoff was one of the earliest advocates for Seagate to champion the use of the O-TTPS as a product lifecycle standard. Geoff lives in Oklahoma City with his wife and three children.

[1 CPE] Your Office and Workspace Reimagined

  Presented by INTERFACE Advisory Council

Remote working during the pandemic proved to be beneficial for some companies and employees. Even as we are returning to the office, many will want to work remotely on a permanent basis. We are seeing an evolution of the definition of an office. There will certainly still be offices for all organizations where employees perform their work as normal. Now that remote working has shown to be an added value, IT departments need to lead this change in structure.

Join the INTERFACE Advisory Council for a look at what lies ahead. How are you adjusting your security procedures? What have you learned over the last year with employees working remotely? We will discuss how IT departments should be involved in decision-making and execution of policies. Also, this changing model of a traditional office could impact the job pool. Opportunities for IT professionals to find employment from out-of-market companies will only increase.


Panelists:

John Brandt • Director of IT, Santa Fe Opera
Luis Brown • Chief Information Security Officer, Central New Mexico Community College
Bill Halverson • Sr. Technology Advisor, CNM, Ingenuity
Darshana Kanabar • Deputy CIO, NM Taxation and Revenue Dept

[1 CPE] CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

[1 CPE] What Got Us Here, Won’t Get Us to Where We’re Going…

  Presented by Aruba, a HPE Company

Over the past couple of decades, we’ve relied on a certain predictable and repeatable model of expectations from our infrastructure that has delivered. However, the demands of Digital Transformation, the pace of change, the capabilities within our teams — and of course the pandemic — have created business pressures that traditional ways of building and security infrastructure just can’t keep pace with.

The time is now to reflect, reset, and embrace a different way that will increase agility and flexibility as well as enhance performance and security. Lose the baggage of the past, travel light, and let’s chart a course for the journey ahead.

[1 CPE] Securing the Hybrid Cloud: Visibility Best Practices

  Presented by Gigamon

With the move to cloud and the multitude of approaches, your ability to effectively monitor and secure workloads gets even more difficult. IT complexity, the rate of change, lack of skills, and organizational silos have made confidently managing security and performance nearly impossible. Visibility is critical. Join us for a discussion of the security considerations for on-prem private, public, and hybrid clouds. You’ll learn best practices and see how a little planning and design can go a long way. Achieve a secure and viable hybrid cloud implementation and get a high return on your investment.

[1 CPE] Security vs. Compliance: Turning InfoSec Success into Audit Wins

  Presented by Tripwire

Security and compliance teams both strive to design, establish, and enforce controls to protect an organization. But even with shared goals in place, security and compliance teams often manage business risk in relative isolation. So how can these teams set aside tension and work better together to create a winning alliance?

In this session, we explore the key differences between security and compliance initiatives. It’s crucial to understand that being fully compliant doesn’t necessarily mean an organization is fundamentally secure. We’ll cover how the two initiatives complement each other when it comes to minimizing risk and how both teams can collaborate to create efficiencies. Attendees will learn how to leverage compliance policies to set the foundation to a robust information security program, while providing true visibility and coverage, consolidating toolsets, and reducing costs. Lastly, we’ll discuss how to ensure that a successful security program can help organizations prepare for an upcoming audit to ultimately achieve and maintain continuous compliance.

[1CPE] Insider Threat: Education and Awareness

  Presented by InfraGard

Not all organizations have an Insider Threat Program, but they may educate on themes to report on specific behavior. If you see a threat, should you contact law enforcement? Not all insider threats are malicious in intent. Your systems and policies may have vulnerabilities you are not even aware of. Join InfraGard Kansas City for a comprehensive background, as their panel of security awareness professionals provide a range of perspectives on how to deliver messaging to your audiences on Insider Threats. They will also present tips to give you the edge needed to save time when a threat comes your way.


Moderator:

Donna Gomez • Security Risk and Compliance Analyst, Johnson County Government


Panelists:


Theresa Bentch • Director of Physical Security, Garmin
Marc Vasquez • Assistant VP/Security Awareness, UMB Bank
Dr. Cheryl Cooper • Cyber Security Risk Manager, TMobile
Jared Oakden • Regional Security Officer, American Family Insurance
Nick O’Neil • Information Security Administrator, Columbia Insurance Group

[1 CPE] Get the Most Out of SD-WAN Without Over-Investing

  Presented by iboss

Understanding your drivers allows you to expand your bandwidth, maximize scalability, reduce your back-hall data, and simplify and reduce traffic on your network, providing a more efficient, secure experience for your end-users. In this presentation, learn how to integrate seamlessly with SD-WAN solutions to provide cloud-based internet security.

[1 CPE] Discover How SD-WAN Edge and Cloud Security are Enabling Digital Transformation

  Presented by Silver Peak

Adoption of cloud services and the explosive increase in mobile and IoT devices have driven enterprises to transform both their WAN and security architectures – not just one or the other. The strategic imperative is to deploy a more intelligent, highly automated software-defined wide area network (WAN) that can be seamlessly integrated with modern cloud-delivered security services. Gartner coined the term “secure access service edge” (SASE) to describe this cloud-first architecture. During this session, we’ll discuss:

  • SD-WAN and security considerations enterprises must address when migrating to a SASE architecture
  • How to address Zero Trust access security requirements for remote workers and IoT
  • Pros and cons of single vendor vs multi-vendor SASE implementations