[1 CPE] Simplify and Strengthen Your Security with a Platform Approach

  Presented by CompuNet

The tactical strategy of “see a problem, buy a solution” just isn’t enough in today’s threat landscape. Has security become a grind within your organization? Are you stitching together individual products, relying on manual workflows, and managing thousands of daily security alerts? It can feel like the security grind never stops. Where do you struggle?

NEW V11: Eliminate data loss. Eliminate ransomware. 20X lower storage cost.

  Presented by Structured & Veeam

NEW Veeam Backup & Replication™ v11 eliminates data loss and ransomware while saving 20X on your long-term archive retention costs. The 4-in-1 solution combining Backup, Replication, Storage Snapshots, and now Continuous Data Protection (CDP) under a single platform, delivers faster and more flexible data protection, recovery, and retention options. V11 unlocks unprecedented resiliency for any size business offering over 200 new features and enhancements, including:

  • Eliminate data loss with Veeam Continuous Data Protection
  • Eliminate ransomware with immutable backups on a Hardened Repository
  • Eliminate downtime with Instant Recovery for NAS, Microsoft SQL, and Oracle
  • Over 20X lower cost, long-term archive-to-cloud storage on Amazon S3 Glacier & Microsoft Azure Archive Storage
  • Conquer complexities in your way with Veeam-powered BaaS & DRaaS

Expect more from your data protection platform and remain resilient in the face of even the most demanding challenges.

[1 CPE] Payment Card Industry Compliance: How to Become and Stay Compliant

  Presented by Structured

This presentation will discuss the difficulties of becoming and staying compliant with Payment Card Industry (PCI) requirements. Although currently in version 3.2.1, the updated Data Security Standard (DSS) 4.0 is coming soon and there are numerous changes and enhancements that must be complied with. Whether you are just beginning with PCI for your organization or have many years of experience, there are many challenges, both old and new that can create roadblocks to compliance. With emerging technologies such as zero-trust architecture ready for implementation, find out how to best use these controls for your organizational goals. This presentation will cover the requirements, trouble areas to be aware of, and how you can utilize specific technology in your compliance effort.

[1 CPE] Digital Transformation: What’s Next in a Post COVID World?

  Presented by Structured & Aruba, a HPE Company

While the pandemic shuttered many businesses and wreaked havoc with supply chains, it also massively accelerated investment in digital operations in the cloud and at the intelligent edge. Many decisions were made in haste, arising from the need to just “keep the lights on.” The next iteration of our global pandemic response is to revisit these decisions; correct oversights in security, enterprise connectivity, and endpoint access; and chart a sound course forward. Join us and learn how to confidently navigate what comes next regarding your organization’s ability to deliver secure and satisfying user experiences in all critical capabilities across the enterprise.

[1 CPE] The Montana Cybersecurity Report

  Presented by Pine Cove Consulting & Sophos

Each year, Pine Cove Consulting analyzes data reported to the Montana Department of Justice. This report shows how many Montanans fell victim to a data breach, how many organizations fell victim to a data breach that affected Montanans, and the average length of data breaches in Montana. In this presentation, we will share our findings and compare the statistics we have observed year over year to find trends. This is the only report produced that analyzes Montana-specific cybersecurity statistics. If you are an IT leader, business executive, or educator, we strongly recommend attending our breakout session so you can be aware of the cyber-threats right here in our backyard.

We will also be joined by Sophos Security who will share how these statistics relate to national and worldwide cybersecurity trends.

[1 CPE] The American Rescue Act Opportunities for IT in Montana

  Presented by Kevin Gilbertson • Chief Information Officer, State of Montana

Through the American Rescue Plan Act, funding is being distributed through grants within the State of Montana to enhance education, communications, and health and human services, as well provide funds for economic transformation and workforce development. We will discuss how these funds have provided State IT the opportunity to modernize our interactions with citizens to support ARPA efforts as well as provide an avenue for attracting technical jobs and talent to the state.

Kevin Gilbertson serves as the State of Montana’s CIO. He joined the Department of Administration in March of 2021 after spending almost thirty years in the enterprise software industry, which included work with state and federal government customers as well as Fortune 500 corporate customers.

Kevin most recently served as a Vice President of Product Strategy and Enablement at Helix Business Solution before being appointed State CIO by Governor Gianforte. Prior to joining Helix Business Solution, Gilbertson was the owner and principal consultant at Forstara and worked in various IT roles at RightNow Technologies, both based out of Bozeman, MT. He also partnered with federal agency CIOs on open data initiatives while working for Socrata in Seattle, WA.

Gilbertson holds a Master of Science degree from Capella University in psychology specializing in Organizational Leader Development and is currently pursuing his Ph.D. in Industrial and Organizational Psychology.

[1 CPE] How Zero-Trust Enables the Future of “Work from Anywhere” Secure Access

  Presented by Duo Security

The perimeter-focused security model of decades past is no longer adequate for securing the modern enterprise. Now, organizations must secure a mobile workforce using a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks — and this trend only accelerated during 2020’s global shift to remote work. Fortunately, a modern access strategy built on zero-trust fundamentals can defend today’s workforce while paving the way to a passwordless future. Attend this session to learn how the zero-trust access model works, reduce your reliance on passwords and risk of password-based attacks, and how to start planning and staging your zero-trust evolution today.

[1 CPE] What Got Us Here, Won’t Get Us to Where We’re Going…

  Presented by Aruba, a HPE Company

Over the past couple of decades, we’ve relied on a certain predictable and repeatable model of expectations from our infrastructure that has delivered. However, the demands of Digital Transformation, the pace of change, the capabilities within our teams — and of course the pandemic — have created business pressures that traditional ways of building and security infrastructure just can’t keep pace with.

The time is now to reflect, reset, and embrace a different way that will increase agility and flexibility as well as enhance performance and security. Lose the baggage of the past, travel light, and let’s chart a course for the journey ahead.

[1 CPE] Your Office and Workspace Reimagined

  Presented by INTERFACE Advisory Council

Remote working during the pandemic proved to be beneficial for some companies and employees. Even as we are returning to the office, many will want to work remotely on a permanent basis. We are seeing an evolution of the definition of an office. There will certainly still be offices for all organizations where employees perform their work as normal. Now that remote working has shown to be an added value, IT departments need to lead this change in structure.

Join the INTERFACE Advisory Council for a look at what lies ahead. How are you adjusting your security procedures? What have you learned over the last year with employees working remotely? We will discuss how IT departments should be involved in decision-making and execution of policies. Also, this changing model of a traditional office could impact the job pool. Opportunities for IT professionals to find employment from out-of-market companies will only increase.


Panelists:

Jason Emery • Chief Information Officer, Missoula County
Margaret Kauska • Chief Security Officer, Montana Department of Revenue
Peter Martinson • Supervisor, Information Technology, Montana State University

[1 CPE] Security Operations Center: Build Your Own or SOCaaS

  Presented by High Point Networks

Learn how Security Operations as a Service (SOCaaS) may be a good option for your business. In this session, we will compare and contrast many non-product specific aspects of SOCaaS and traditional Security Information and Events Management (SIEM’s) systems using first- hand real-world examples; the good, bad, and ugly. The purpose of this presentation is to equip the audience with enough knowledge so they can make a more informed decision regarding a traditional SIEM/SOC approach, or SOCaaS approach, when building a Security Operations Center. Presenter Dean Sheley recently lead an initiative to build a Central Security Operations Center for a statewide multi-university educational system while CISO for that state-wide university system.