CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

A Regional Approach to Public Safety Infrastructure

  Presented by Bill Zielinski • Chief Information Officer, City of Dallas

Developing regional partnerships which leverage shared interests and common mission can create opportunities for significant cost savings, heightened capabilities and improved interoperability that can benefit the entire region. Join Bill Zielinski, CIO for the City of Dallas, as he discusses the model used in developing a regional Public Safety digital mobile radio network covering more than 1000 square miles across the greater Dallas area.

Bill Zielinski is the Chief Information Officer (CIO) for the City of Dallas, Texas where he directs IT operations for the 9th largest city in the United States, serving a population of more than 1.3 million people.

Most recently, Mr. Zielinski was the Assistant Commissioner for the Office of Information Technology Category (ITC) in GSA’s Federal Acquisition Service (FAS) where he managed a portfolio of government-wide IT acquisition contracts providing more than $25 billion in IT products and services from more than 5,000 providers to government at a Federal, State and Local level.

Mr. Zielinski formerly served as the Acting Unit Chief for Agency Oversight in the Office of the Federal Chief Information Officer (OCIO) in the Office of Management and Budget (OMB). There he provided oversight of the Federal Government’s Information Technology Capital Planning and Investment Control (CPIC) process on behalf of the Federal CIO. The Federal CIO is responsible for providing guidance on the formulation and oversight of an annual IT investment portfolio in excess of $85 billion.

Additionally, he has served as the Chief Information Officer for the Social Security Administration (SSA), where he was responsible for the delivery of IT solutions that allowed the Agency to effectively manage more than $800 billion in annual benefits to more than 60 million people around the world.

You Are No Longer Forgotten: The Small Business Security Challenge

  Presented by Chris Roberts • HillBilly Hit Squad

Most of the security industry is chasing “around” 31,000 larger enterprise sized companies for their business. The list is well known, circulated and targets are on the backs of ALL the C-Suite, most of the technical folks and the MSP/VARS that support them. The Security industry circles them like packs of hyena or vultures waiting for one of them to fall, get breached, or for a vendor to be thrown out… pouncing on the fresh kill with glee…

Meanwhile, you’re sitting there getting slaughtered by every adversary known to mankind because you ARE the forgotten, you’re too small for the multi-billion $$ cyber companies whom IF they decide to deal with you will flood you with MSA’s, SOW’s and NDA’s that would take a week’s worth of lawyer time JUST to understand, let alone realize that they’re not accountable for anything, unlikely to want to support you and in all honestly you’ll get a 1-800-YOU-AREN’T-SPECIAL number as your sole source of support.

We’re going to address the current situation, the state of play, and give you some thoughts, suggestions, ideas AND plans. We’ll provide resources on HOW to evaluate, where to look, what to do AND importantly we’ll do it because it’s what we’re doing. We live, breath and deal with this daily. We’ve sat in the meetings when the large cybersecurity companies state, “we’re done dealing with the SMB market” and we’ve got the battle scars from dealing with those subsequent consequences.

What Does the Future Hold for Teleworking?

  Presented by INTERFACE Advisory Council

With the current pandemic, companies have mobilized to enable employees to work from home. IT departments took on this task in March. Many security and compliance challenges have been dealt with, but some remain.

Join the INTERFACE Advisory Council for a look at what lies ahead with remote working. How are you adjusting your security procedures? Do you know if your end-users will return to the office? The dreaded elephant in the room will be addressed as well – BUDGETS! What do you need? What is expected of your IT staff? You will get tips on what has worked and what still is a challenge in keeping your users active and ensuring your business is fully operational.


Panelists:

Aaron Baillio • Chief Information Security Officer, University of Oklahoma
Chris Martin • Director, Technical Services, MYCON General Contractors
Shamoun Siddiqui • Vice President & CISO, Neiman Marcus
Craig Broussard • Director, Global Infrastructure, NCH Corporation

Alan Chuang • Director, Information Technology, Trinity Consultants

Critical Planning: Timeline and Lifecycle of Responding to a Ransomware Attack

  Presented by Shawn E. Tuma • Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP

This session will discuss the lifecycle of a ransomware attack and address key phases such as: how they happen, what the process is for recovery and investigation, and what can be done ahead of time to prepare for and hopefully prevent them from happening.

Bio:
Shawn is an attorney internationally recognized in cybersecurity, computer fraud and data privacy law, areas in which he has practiced for over two decades. Shawn helps businesses protect their information and protect themselves from their information.

He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice Group where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises, across the United States and globally in dealing with cybersecurity, data privacy, data breach and incident response, regulatory compliance, computer fraud related legal issues, and cyber-related litigation. While this area of the law has evolved greatly in the 20+ years while Shawn has been practicing, he continues to evolve with it as a practitioner representing his clients, academically as an author and instructor, and as an analyst for the national media.

Situational Awareness Into the Dark Web

  Presented by Check Point Software

In our journey through this session, we take you through the evolution, goals, and motivation of the Dark Web. We will share with you what and whom you can find on the platforms as well as the major conflicts individuals face while exploring this web. The session also exposes you to the syndicates and structures running on the platforms. Surprisingly, we see how those groups were among the first to embrace and implement Blockchain technology and created a major global demand for crypto currencies. This is the time to listen, learn, and be exposed to the deepest secrets of the Dark Web.

Enduring from Home: COVID-19’s Impact on Business Security

  Presented by Malwarebytes

All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.

Automating the Analyst

  Presented by Darktrace

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks are rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms. Join Darktrace as we discuss the Cyber AI Analyst in action.

DRaaS for Everyone

  Presented by StorageCraft

Are you really ready for a data disaster? Learn more about how disaster recovery has changed the last couple years and how to put together a DR strategy for your business. Learn about a simple and economic DRaaS solution.