Managing the New Team Dynamic in a Teleworking World

  Presented by INTERFACE Advisory Council

Migrating data to the cloud has been a transition many years in the making. With the move to teleworking in 2020, many organizations have sped up their cloud usage out of necessity. Many new security challenges have come from this. In addition, monitoring productivity of staff has been difficult. Managing all team dynamics has brought questions of effective policies and procedures.

Join the INTERFACE-Sacramento Advisory Council for a discussion of these topics and more. We will present practical suggestions in managing your cloud providers to allow maximum work efficiency while also meeting your cyber security needs.


Panelists:

Keson Khieu • Chief Information Officer, Emergency Medical Services Authority
Maisha Dottery • Chief Technology Strategist, California State Treasurers Office
Tony Coronas • Director of Information Technology, Roebbelen Contracting, Inc

Enduring from Home: COVID-19’s Impact on Business Security

  Presented by Malwarebytes

All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.

DRaaS for Everyone

  Presented by StorageCraft

Are you really ready for a data disaster? Learn more about how disaster recovery has changed the last couple years and how to put together a DR strategy for your business. Learn about a simple and economic DRaaS solution.

SD-WAN Edge Transformation for the Cloud-First Enterprise

  Presented by Silver Peak

As cloud adoption and SD-WAN innovation hastens, global enterprises are transforming how they build and secure wide area networks. Leveraging automation, enterprises can deploy, connect and secure hundreds of sites per week, a feat not possible with a traditional device-centric approach.

During this session, we’ll discuss how the unification of SD-WAN, WAN optimization, routing and security in a single, centrally orchestrated platform:

  • Delivers superior application performance wherever apps are hosted
  • Increases the quality of experience for end users and for IT
  • Simplifies branch WAN edge architecture

Digital Transformation in 2020 and Beyond: What’s Changed and What’s the Same

  Presented by Ann Dunkin • Chief Strategy & Innovation Officer, Dell Technologies

While our lives have changed dramatically this year, some things, like the need to have a highly capable, well trained and motived workforce haven’t changed. We’ll discuss how the pandemic accelerated government digital transformation and the challenges that still exist.

IT departments worked quickly and efficiently to support remote workforces. While productivity in many departments and industries has been effective, there have been adverse effects from remote working. While technology has been a driving force, it can’t replace some elements. Join Ann Dunkin for a look at the gaps that have been created and what lies ahead.

Ann Dunkin is Chief Strategy and Innovation Officer at Dell Technologies. Prior to joining Dell, Ms. Dunkin was the Chief Information Officer for the County of Santa Clara. Located in the heart of Silicon Valley, Santa Clara is the 15th largest county in the United States. Ms. Dunkin also served in the Obama Administration as the Chief Information Officer of the United States Environmental Protection Agency. Prior to her time in Washington D.C., she was the Chief Technology Officer for the Palo Alto Unified School District. Ms. Dunkin joined the School District after a long career at Hewlett Packard in a variety of leadership roles.

Ms. Dunkin is a published author, most recently of the book Industrial Digital Transformation, and sought-after speaker on the topics of technology modernization, digital services and organizational transformation. Throughout her career she has served on a wide range of professional boards and committees. She currently serves on the OptimEyes.io Board of Advisors, the WSC Board of Directors, the Agile Government Leaders (AGL) Board of Directors and the Georgia Tech President’s Advisory Board.

She holds a Master of Science and a Bachelor of Industrial Engineering, both from The Georgia Institute of Technology. She is a licensed professional engineer in the states of California and Washington.

Staying Secure While Working from Home

  Presented by Trend Micro

Working from home has become almost ubiquitous in these times of COVID-19. Quarantining your devices while away from the office is not an acceptable solution to the many risks that exist outside of your corporate network. Please join Trend Micro to discuss the many ways you can help ensure that working from home does not compromise the security posture of your organization.

Own Your Data

  Presented by Commvault

Take ownership of data that already belongs to you.

Today organizations are storing their corporate data across multiple locations and platforms. On prem data centers, co-lo facilities, hybrid/multi cloud, SaaS and endpoint devices. With company data being so widely dispersed it’s difficult to know if you have full visibility, access and the flexibility to move data and workloads across locations and platforms. Protecting your data is only one component to maintaining ownership of your data. Along with having a robust data protection platform for on prem data you would also need the same level of control/protection of data assets that live outside the data center.

To truly own your data you must:

  • Protect and secure your data regardless of location or platform
  • Have access to it all
  • Have the tools to move your data/workloads where it makes sense for the business today and the flexibility adjust as business circumstances change.
    (On-Prem, hybrid/multi cloud, SaaS)
  • Have insight into your data, not only to understand the “what and where” but to provide governance and compliance

We will discuss what this all means and why you should rethink your approach to data management.

2020 Aftermath and Beyond: Top Focus Areas on Cybersecurity, Privacy and Business Risk

  Presented by INTERFACE Advisory Council

2020 has been a transformational year. The COVID-19 pandemic certainly has made a big impact and expedited our business-IT efforts in different areas within our organizations. Cybersecurity, privacy, business risk received more attention from leadership. So, what happened and what is next? Join to our highly distinguished panel for an engaging discussion and walk away with valuable insight on top focus areas that every business executive needs to know and be prepared for in this coming year.

Moderated by:

Tolgay Kizilelma PhD. • Chief Information Security Officer, UC Merced

Panelists:

Jack Freund PhD. • Head of Cyber Risk Methodology, VisibleRisk

Jimmy Sanders • Head of Information Security, Netflix

Melissa Bendana • Information Security, Governance and Risk Management, Blue Shield of CA

Rand Morimoto PhD. • CISSP, Convergent Computing

Read more
about our Moderator and Panelists >>

IT Interrupted: Best Practices in Disaster Recovery Planning

  Presented by Zerto

As IT application availability requirements continue to evolve, technology continues change to meet the new requirements. Join us as we discuss planning considerations for bringing your virtualized workloads into the next generation of IT resilience. You will learn about data center options to consider as part of your recovery strategy, business and technical trade-offs that will have to be made, capacity planning considerations, and testing approaches to that are possible that will optimize application up-time.

Responsible Administration: The Admin Insider (Threat)

  Presented by One Identity

System Administrators are critical people to every organization. They design, build, and maintain all the parts and pieces that enable business, whether that’s retail, healthcare, or even a government agency. Ensuring sysadmin tasks are performed as securely as possible without hampering their ability to keep our business running is a delicate balance. These “insiders” not only know how the systems operate but have the credentials and privileges to operate them.

In this session, we will demonstrate an Active Directory breach using pass-the-hash and discuss ways to enable the System Administrators to operate in a way that not only protects the business from threats but also enables them to perform the intricate tasks they accomplish daily to keep business flowing under the covers.