Why Every Business Needs a Business Continuity & Disaster Recovery Strategy

  Presented by Veeam

Today’s applications and data sets are larger, more complex, distributed and interdependent than ever. While many have a disaster recovery plan in place, executing, testing and documenting these plans is often complex and cumbersome.

We’ll also discuss:

  • State of BCDR today and what hinders DR planning for most companies
  • Why backup strategy is not DR strategy
  • Democratized DR of today (how tedious, manual procedures can be completely automated, and at accessible cost)

IT Interrupted: Best Practices in Disaster Recovery Planning

  Presented by Zerto

As IT application availability requirements continue to evolve, technology continues change to meet the new requirements. Join us as we discuss planning considerations for bringing your virtualized workloads into the next generation of IT resilience. You will learn about data center options to consider as part of your recovery strategy, business and technical trade-offs that will have to be made, capacity planning considerations, and testing approaches to that are possible that will optimize application up-time.

Architecting for the Agentless

  Presented by Gigamon

Today’s networks are swarming with IoT, OT, and virtual devices of every size and shape. As they have proliferated, and the security attack surface has likewise increased, the market has responded with a wide variety of technologies to help understand, manage, and secure just what is on your network. This is the rise of the technologies classified as “agentless” and there is a good chance you will be looking, now or in the future, at a project that comprises such technologies. While much of what is fundamentally required to enable these technologies is not new, organizations struggle with trying to implement these on an “ad hoc” basis, with little thought to future considerations or scale. This presentation will take about a more strategic approach to handling these implementations, what a visibility fabric is, and how today’s organizations can architect their environments for their future needs.

Improving the Government Experience

  Presented by Mike Hussey • Chief Information Officer, State of Utah
Phil Bates • Chief Information Security Officer, State of Utah

State Government faces many challenges when it comes to providing services to citizens. Join Michael Hussey to find out what the State of Utah is doing to stay secure, adopt innovative technologies, collaborate with public sector and private sector, adapt to the new way of working, and upskill employees. Michael will also be joined by Phil Bates, Chief Information Security Officer for the State of Utah.

Michael Hussey was appointed Chief Information Officer (CIO) for the Department of Technology Services in October 2015. As CIO, he is responsible for the administration and supervision of a dedicated IT workforce that provides innovative services to Utah agencies and residents.

The Department of Technology Services is the IT service provider for over 20 state agencies in Utah. Utah is a leader in providing innovative, secure, and cost-effective technology solutions that are convenient and empower partner agencies to better serve the residents of the state. Mike has led Utah in eGovernment to provide over 1,300 services online, modernized all mainframe applications, made developments for data center migration to cloud, and has created efficiencies through easy-to-use, accessible, and innovative government services. Mike currently serves as the Vice President of the National Association of State Chief Information Officers (NASCIO), the premier network and resource for state CIOs and leading advocate for technology policy at all levels of government.

Hussey was born in West Covina, California and moved to Utah with his family at the age of 15. He and his wife are the parents of five children. He is a loyal University of Utah sports fan. Hussey has a passion for learning and enjoys staying current on emerging technologies.

Phil Bates is the Chief Information Security Officer for the Department of Technology Services, State of Utah. He has been involved in Cyber Security for many years, as the IT Director for the Department of Public Safety Phil aided in the creation of the Utah Cyber Task Force. Phil began his career in Law Enforcement, retiring as a Lieutenant from the West Jordan Police Department. While at West Jordan, Phil directed the deployment of the first large-scale use of Commercial Mobile Data for Public Safety in the US.

Office 365 Security Best Practices: At the Office, at Home, and on the Road

  Presented by Mimecast

Cyber-hygiene has become a source of great concern of late. And while the Office 365 suite has helped communication and collaboration from multiple location points (at the office, at home, and on the road) there are still security concerns that must be mitigated. In this presentation, we will hear best practice suggestions for remaining safe while using Office 365. First, we’ll talk about security attitudes, then review CISA concerns with Office 365, and finally offer best practice suggestions and thought leadership. This presentation will be driven by J. Peter Bruzzese… cyber-security advisor and 8x awarded Microsoft MVP (Exchange/Office 365).

Zero Trust and the Flaming Sword of Justice

  Presented by Cisco

Security breaches pervade the headlines. What was seen as a rare instance just 5 years ago now seems to occupy the daily news cycle. A lot of these data breaches are made possible due to missteps and misconfigurations. There are many security issues introduced into website authentication mechanisms that further compound the security issues in addition to enforcing bad behavior by the end users. Security debt is a real problem for the vast majority of organizations in the world today and the attackers will utilize this to their advantage. In addition to keeping system hygiene at the front of the mind, defenders need to focus on proper network zone segmentation or, as it is a more popular term these days, zero-trust networks. The old conceptual style of a castle wall and moat to defend a network was deprecated several years ago. As a result of the dissolution of the traditional perimeter, a stronger focus has to be placed on the strength of authentication, authorization, and trust models for the users.

The antiquated notion of an information security practitioner running through the office brandishing their flaming sword of justice above their heads screaming “thou shall not pass” has at long last reached the denouement. Whether you are responsible for the security in a financial organization or one that makes teddy bears it is necessary to adapt and learn to trust, but verify.”

Cyber AI and Geopolitics: Managing Tomorrow’s Cyber Risk

  Presented by Darktrace

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher. Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and Americas CISO, JR Tietsort to discuss this new era of cyber-threat and how Cyber AI can help defenders regain the upper hand.

This speaking session will include a Q&A with our experts, and explore:

  • How nation-state attacks are changing
  • How organizations can respond to the classic balance of security and productivity
  • How organizational maturity in risk management is maintained whilst ensuring cyber defense

First Quarter of Containment

  Presented by Malwarebytes

All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.

Updating Your BC/DR Plan to Include Pandemic

  Presented by INTERFACE Advisory Council

You were ready for a power outage. Cooling equipment has worked properly in your server room or data center. You had plenty of backup in the cloud and you felt good about your BC/DR plan, until a pandemic hit. The sudden shift to remote working for many industries forced rapid change for IT staffs to alter their business continuity process. Some of these changes were temporary, while some longer lasting.

Join the INTERFACE-Phoenix Advisory Council for a look at what BC/DR adjustments they have made in 2020. You will get tips on what has worked and what still is a challenge in keeping your users active and ensuring your business is fully operational.

Panelists:
Steven Porter • Manager of Information Technology, Alpha Geotechncial & Materials
Joanne Storbeck • Director of Business Continuity, HealthEquity
Jerry Simpson • Manager of Fire Technology, Phoenix Fire Technical Services

Zero-Trust Network Access

  Presented by Fortinet

Controlling users and devices on today’s networks is challenging. Many types of users requiring different levels of access need an automated solution. Devices are sneaking onto networks without approval and require visibility and control. Learn how Zero-Trust Network Access solution addresses the issue of knowing who, what, where and when and controlling everyone and everything on and off the network.