[1 CPE] Panel Discussion: The More Things Change…

  Presented by INTERFACE Advisory Council

For the last two years, there has been no shortage of change in how IT departments are organized. The structure in your shop likely looks nothing like it did in 2019. With the permanence of remote work, how have you evolved? Has your company kept up with the new landscape?

Please join the INTERFACE Salt Lake City Advisory Council for a discussion on the current landscape of leadership in the IT industry. We’ll discuss retaining employees, hiring workers remotely, dealing with the “great resignation,” and other topics of relevance to your IT career. Bring your questions for this open conversation with area leaders who will share their experiences and insights.

Panelists:

  • James Duckett, Manager, Technology Division, City of St George
  • Corona Ngatuvai, Chief Technology Architect, State of Utah
  • Greg Pugh, Information System Security Officer, Space Dynamics Laboratory
  • Kim Schroeder, Chief Technology Officer, Education at Work
  • Jon Shurtliff, Director of Technology, Oakdell Egg Farms

[1 CPE] Infrastructure Modernization: Your Foundation for Innovation and Business Agility

  Presented by Hitachi Vantara

Today’s infrastructure must be engineered to support digital innovation, such as accelerating your cloud, applications, and data. The agility, efficiency, and resilience required for new workloads, applications, and requirements are needed for a modernized infrastructure. Join us as we guide you on your infrastructure, application, and data modernization journey so that you can make smart modernization decisions and build Your Cloud, Your Way.

[1 CPE] Streamlining and Modernizing State Government

  Presented by Alan Fuller, Utah State CIO

Government faces many challenges when it comes to providing services to citizens. Join Alan Fuller to find out what the State of Utah is doing to stay secure, adopt innovative technologies, modernize IT systems, and improve the citizen digital experience with government. Bring your questions as well to find out the latest initiatives from the State of Utah.

Alan Fuller was appointed Chief Information Officer for the state of Utah in March 2021. As CIO, Fuller oversees all IT functions for executive branch agencies in Utah with the goal to improve innovation and improve government services through the use of technology. A resident of Lehi, Utah, Fuller has a bachelor’s degree in economics from Brigham Young University and an MBA from the Wharton School at the University of Pennsylvania.

[1 CPE] Stopping Attacks, Not Your Business: AI & Autonomous Response

  Presented by Darktrace

With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join Maxwell Hopkins in this session where he explores the benefits of Autonomous Response as a must-have that goes beyond ‘defense’. Includes real-world threat finds and attack scenarios.

[1 CPE] IT and the Future of Work

  Presented by Michael Dietrich • Chief Technology Officer, Greater Nevada Credit Union

We keep hearing about the “new normal.” The pandemic brought about many changes. Demand for digital services increased. Remote work became the rule rather than the exception. And as more and more workers decide to pursue other passions it has become increasingly difficult to recruit qualified candidates, resulting in businesses offering worker flexibility and accommodations to expand the talent pool. This sea change has prompted businesses to rethink the workplace permanently. The idea of the “office” or the “campus” as defined physical space is becoming an archaic idea.

Technology professionals were the enablers of this change. During the pandemic, we solved problems to keep business and commerce running – because we were the only ones who could. Now that the new ways of working that were necessary for continuity of business are being permanently adopted, technology shops need to continue to adapt quickly. We no longer have the luxury of reduced budget and resource constraints to make things happen quickly during a crisis. As speed was the priority over quality during that time, we now need to mitigate gaps in the solutions provided. Most importantly, our teams are not simply supporting these changes. Our ways of working have changed dramatically as well. We as technology leaders need to adapt to new leadership, culture, and engagement challenges.

Greater Nevada Credit Union Chief Technology Officer Mike Dietrich discusses what this means to us as IT leaders, and the implications on IT support, security, and ways of working within technology support organizations.

Michael is currently the Chief Technology Officer for Greater Nevada Credit Union. In his 30-year career as a technology professional and leader, he has served as Chief Information Officer for the State of Nevada and held senior leadership roles at Microsoft, LinkedIn, Rackspace, and Ericsson. He has contributed to industry-changing innovations in media delivery, gaming, open hardware platforms, and AV communications.

Michael’s passion is finding the truly meaningful ways that technology can lead to better business outcomes and enhance our lives. To this end he is often heard using the phrase, “Know what done looks like,” which means seeing the result from the point of view of the customer, regardless of their technical skill level, to ensure that a technology solution delivers what is needed seamlessly and effortlessly.

In his words “IT has elevated from a basic requirement to a business enabler. It is now evolving from a business enabler to becoming the core of the business model itself regardless of the industry – an idea further solidified during the pandemic. As such, any conversation about the benefits of a solution should not be about the technology itself, but about what the solution can do for us. The technology we use impresses no one. What we accomplish with it is everything.”

[1 CPE] Defending Against Common Microsoft 365 Attacks

  Presented by Blumira

For organizations that use Microsoft 365, it’s a cornerstone of their business. Users rely on it to log in, receive and send email, and store and share sensitive data.

Microsoft 365 is also the most targeted software for cyberattacks, according to Statista.

These factors alone make Microsoft 365 a critical piece of technology to monitor. Adversaries tend to reuse techniques, tactics, and procedures (TTPs) to launch their attacks — and there are some common Microsoft 365 attacks that you’ll want to watch out for. You’ll learn:

  • How to detect threat actors’ favorite techniques for Microsoft 365 attacks
  • Why Microsoft 365’s built-in security settings aren’t enough protection
  • Easy ways to protect yourself against the rise in Microsoft 365 attacks

Matt Warner is CTO and Co-Founder of Blumira, a leading cybersecurity provider of automated threat detection and response technology. At Blumira, he leads the security and engineering efforts to provide actionable insights into cybersecurity risks at scale. Matt has over 10 years of experience in IT and development, focusing on business strategy, development, compliance, threat detection, and penetration testing. Previously, he was Director of Security Services, Development & Security at NetWorks Group, responsible for defensive information security and services.

[1 CPE] Thinking Upstream: Avoid the Fallout of the next Log4Shell

  Presented by Tidelift

News of a zero-day vulnerability in the popular open-source project Log4j broke in December, leading many organizations scrambling to figure out the impact on their applications. Nearly every organization developing applications was impacted, and the fallout was so broad that the FTC issued guidance.

Log4Shell comes on the heels of the U.S. White House cybersecurity executive order 14028, an attempt by the United States government to use its purchasing power to create positive changes to the way cybersecurity is addressed around the world.

Recent high-profile breaches like Log4Shell, the Colonial Pipeline ransomware attack, or the SolarWinds software supply chain attack have shown that our cybersecurity defenses are woefully inadequate. This executive order forces a higher standard of cybersecurity for any organization selling software to the federal government, which in turn makes it the de facto global standard for all software in the future.

Tidelift CEO and co-founder Donald Fischer shares his perspective on how the Log4Shell vulnerability and the cybersecurity executive order impact software supply chain security. He’ll brief attendees on the key issues addressed by the executive order, including software bill of materials (SBOM), supply chain security, and provenance requirements. He’ll outline the gaps that most organizations will need to close to stay in compliance. And he’ll share a proactive approach to addressing open-source software supply chain health and security upstream.

If you want to ensure your organization is fully prepared for the coming changes, you won’t want to miss this session.

[1 CPE] Leveraging Assessment Findings to Harden Your Security Perimeter

  Presented by Fortinet

Are you regularly evaluating your network security?

Performing assessments is a tried-and-true method for improving your security posture, but they can be a daunting task for network security staff who are often short on manpower, expertise, and/or time. Regardless, the benefits of running assessments almost always outweigh any potential drawbacks. Having a security assessment in hand will increase your security situational awareness and significantly impact your organization’s risk preparedness and mitigation.

Join us as we discuss the importance of periodically validating your existing security controls and provide learnings and best practices from our experts.

[1 CPE] Ransomware – Who, What, Why & How…

  Presented by Check Point

Over the last 12 months, ransomware attacks surged by 93% with a devastating impact on businesses and industries worldwide. In today’s hybrid IT environment, preventing ransomware attacks seems like an impossible feat. But is it?

In this session, we will cover the latest ransomware trends and how you can protect your organization from falling victim to sophisticated ransomware attacks.

[1 CPE] Fast and Furious Attacks: Using AI to Surgically Respond

  Presented by Darktrace

Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join Brianna Leddy, Director of Analysis, to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Explore today’s threats and challenges and learn how advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough. Includes real-world threat finds, case studies and attack scenarios.