[1 CPE] Silos are for Grain, Not Information

  Presented by INTERFACE Advisory Council & ARMA Arizona

Fifty years ago, the corporate Records and Information Management (RIM) department dealt with paper, file cabinets, and boxes in warehouses; microfiche was considered high-tech. The Information Technology (IT) department ran a mainframe computer in the basement that crunched financial numbers; a terminal in the cashier’s office was considered high-tech. And never the twain would meet. Today, such segregation of corporate functions is not only unnecessary, but it could also be counterproductive or even dangerous. RIM and IT represent distinct, and equally valuable, “mindsets,” but they must work together with Privacy, Security, Compliance, Legal, Human Resources, and even Marketing under comprehensive Information Governance (IG) and Information Lifecycle Management strategies. These strategies align all aspects of data creation (capture), gathering (collaboration), management (retention/storage), circulation (version control), security, legal holds/discovery, and final disposition or archiving with organizational mission, policies, and goals.

Three members of the Arizona chapter of the Association of Records Management and Administration International (ARMA), representing three different types of organizations, discuss how RIM and IT can break down legacy silos and work together to achieve information governance – and the value of ARMA membership.

  • President, ARMA Arizona | Mark MacFarlane, Manager, Enterprise Records and Information Management, Cambia Health Solutions
  • Vice President, ARMA Arizona | Tanesha Charity, Manager, Administrative Services, Valley Metro
  • Vice President for Programs and Education, ARMA Arizona | Ken Withers, Deputy Executive Director, The Sedona Conference®

[1 CPE] Navigating Today’s Threat Landscape: A Current State of Cybersecurity

  Presented by Fortinet

Join this session for a comprehensive look at the current state of cybersecurity. Today’s ever-evolving threat landscape requires an integrated, automated approach to security. Learn how you can mitigate risk in your organization, optimize your security team’s operations, and gain best practices to integrate and consolidate your security tools; whether you’ve taken a multi-vendor or single-vendor approach.

[1 CPE] Breaking the Ransomware Attack Chain

  Presented by Guardicore, now part of Akamai

Despite consistent increases in security spending, ransomware remains an ever-growing threat to businesses. Surprisingly, the ransomware itself, the malware that does the encryption, is only a part of a larger, equally dangerous, attack chain. Considering the entire chain offers defenders more opportunities to thwart the attack before mass encryption can occur.

In this session, we’ll provide details on how microsegmentation can prevent adversarial techniques that precede and follow the deployment of ransomware itself. By turning our attention to the entire kill chain, a path towards minimizing the likelihood, impact, and recovery time of ransomware becomes clear.

In this session you will learn:

  • Practical steps you can take to disrupt the kill chain before ransomware can be deployed
  • How to leverage AI to map complex environments and expedite the path towards policy enforcement that drastically reduces the impact of ransomware
  • How advancements in host-based segmentation are helping businesses achieve an infrastructure that enables rapid remediation of ransomware events without disrupting business operations

[1 CPE] Stopping Attacks, Not Your Business: AI & Autonomous Response

  Presented by Darktrace

With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join this session to explore the benefits of Autonomous Response as a must-have that goes beyond ‘defense,’ including real-world threat finds and attack scenarios.

[1 CPE] 2022 Threat Review

  Presented by Malwarebytes

The Malwarebytes 2022 Threat Review is an annual report on the latest threats, attack trends, and privacy breaches impacting individuals, organizations, and national security. Researchers detail threat intelligence across operating systems and examine how privacy has shifted and the ways that cybercriminals and crimes are evolving. With a stronger understanding of the threat landscape, organizations and individuals can make more informed security and cyber-protection decisions.

[1 CPE] Protecting Your Critical Data

  Presented by Optiv & Rubrik

Businesses today rely heavily on technology and data. Though most organizations have developed strategies to access critical data during an outage caused by natural disasters or power disruptions, these strategies are ineffective during a cyber attack. Interconnected users, servers, cloud devices, and continuous web access results in an environment that is open for cybercriminals to significantly disrupt operations and/or take an entire network hostage.

How can you support the identification and protection of critical data that must be shielded from the impact of cyber attacks, while also enabling rapid recovery to a secure state? Join us to learn how you can automatically store backups in a malware-protected, air-gapped vault or a remote cloud-based solution that safeguards your data’s confidentiality, integrity, and availability. We’ll discuss how you can ensure your data is verified and clean before entering the vault and is maintained in an immutable state while within the vault, significantly reducing recovery time by guaranteeing that you are recovering to a known good state.

[1 CPE] Educating Your Guesses: How to Quantify Risk and Uncertainty

  Presented by Novacoast

Asking for a budget and justifying spending in cybersecurity departments can be a difficult task due to limited data and high uncertainty of future events. This talk will dive into quantitative risk analysis as it relates to cybersecurity: how to model uncertain events and understand financial risk. Attendees will see a first-hand demonstration of how quantitative modeling can be used to communicate risk and understand ROI. Attendees will walk away with the tools needed to present cyber risk as a dollar amount that can be easily understood by other business decision-makers at their company.

[1 CPE] Panel Discussion: The More Things Change…

  Presented by INTERFACE Advisory Council

For the last two years, there has been no shortage of change in how IT departments are organized. The structure in your shop likely looks nothing like it did in 2019. With the permanence of remote work, how have you evolved? Has your company kept up with the new landscape?

Please join the INTERFACE Kansas City Advisory Council for a discussion on the current landscape of leadership in the IT industry. We’ll discuss retaining employees, hiring workers remotely, dealing with the “great resignation,” and other topics of relevance to your IT career. Finally, the panel will address the challenge of keeping local Kansas City IT talent from exploring remote opportunities with out-of-state companies. Bring your questions for this open conversation with area leaders who will share their experiences and insights.

  • Britney Kennedy, Business Information Security Officer, Cardinal Health
  • Michael Nixon, Director, Information Security, Stormont Vail Health
  • Altaf Uddin, Director, Information Systems, University of Kansas School of Pharmacy
  • Adam Wasserman, Director, Information Technology, Paris Brothers

[1 CPE] Digital Transformation is Built on a Foundation of APIs – But are Your APIs Secure?

  Presented by 42Crunch

APIs are the core building block of every enterprise’s digital strategy, yet they are also the number one attack surface for hackers. Traditional security and management approaches are failing every day as the scale and reach of API attacks increase. The time is now right for enterprises to consider a new end-to-end continuous approach to protecting their APIs. In this talk, you will learn how Global 2500 enterprises are embracing a positive security model combining shift-left and shield-right methodologies to protect their APIs throughout the API lifecycle.

[1 CPE] The Future of Object Storage: Where Do We Go from Here?

  Presented by Hitachi Vantara

While object storage has surged in popularity as an alternative to NAS due to the technological limitations of NAS, customers are now pushing the limits of object storage as well. Where do we take the technology from here to remain relevant and continue to address the needs of modern AI and ML workloads? We will look at the roots of object storage and what needs to happen to the technology to continue forward with today’s modern workloads. Using flash technology and highly parallelized workloads, we will take an in-depth look at some of the directions we expect the unstructured data storage landscape to take. Do we see a world of all flash storage leading the pack or will we continue to utilize hybrid technologies to optimize the economics of storage? Join us for an in-depth look at the current landscape of unstructured data storage and where we go from here to address modern data workloads.