Let’s Look to the Future, Shall We?

  Presented by INTERFACE Advisory Council

You were ready for a power outage. Cooling equipment has worked properly in your server room or data center. You had plenty of backup in the cloud and you felt good about your BC/DR plan, until a pandemic hit. The sudden shift to remote working for many industries forced rapid change for IT staffs to keep businesses functional. Some of these changes were temporary, while some longer lasting.

Join the INTERFACE-Spokane Advisory Council for a look at what lies ahead with remote working. How are you adjusting your security procedures? Do you know if your end-users will return to the office? The dreaded elephant in the room will be addressed as well – BUDGETS! What do you need? What is expected of your IT staff? You will get tips on what has worked and what still is a challenge in keeping your users active and ensuring your business is fully operational.

Presenters:
Laurel Caldwell • Director of ITS, Latah County, Idaho
Carol DeMuth • Programmer & Analyst, Spokane Regional Health District
Clint Hagen • Manager of Information Technology, NEW Health

SD-WAN Edge Transformation for the Cloud-First Enterprise

  Presented by Silver Peak

As cloud adoption and SD-WAN innovation hastens, global enterprises are transforming how they build and secure wide area networks. Leveraging automation, enterprises can deploy, connect and secure hundreds of sites per week, a feat not possible with a traditional device-centric approach.

During this session, we’ll discuss how the unification of SD-WAN, WAN optimization, routing and security in a single, centrally orchestrated platform:

  • Delivers superior application performance wherever apps are hosted
  • Increases the quality of experience for end users and for IT
  • Simplifies branch WAN edge architecture

One Company’s Journey to a Modern Data Center Environment

  Presented by Structured

When the facilities team at a healthcare organization in the Pacific Northwest announced to the IT team that they were undertaking a campus remodel project and they needed the on-prem data center for office space, the IT team quickly sprang into action to find a new home for their DR environment. From learning of this management decision, to performing a due diligence assessment of their ability to use a DRaaS solution, into an RFI and RFP process, and coming to agreement on a contract, this was one of the most rigorous evaluation projects the company has undertaken. This presentation will describe that journey of evaluation and discovery, including the rest of the story which describes the onboarding process and challenges faced along the way. Craig Rhodes is an experienced professional actively engaged with various clients providing Data Center and Program Management consulting services.

Zero-Trust Network Access

  Presented by Fortinet

Controlling users and devices on today’s networks is challenging. Many types of users requiring different levels of access need an automated solution. Devices are sneaking onto networks without approval and require visibility and control. Learn how Zero-Trust Network Access solution addresses the issue of knowing who, what, where and when and controlling everyone and everything on and off the network.

IT Interrupted: Best Practices in Disaster Recovery Planning

  Presented by Zerto

As IT application availability requirements continue to evolve, technology continues change to meet the new requirements. Join us as we discuss planning considerations for bringing your virtualized workloads into the next generation of IT resilience. You will learn about data center options to consider as part of your recovery strategy, business and technical trade-offs that will have to be made, capacity planning considerations, and testing approaches to that are possible that will optimize application up-time.

Why Every Business Needs a Business Continuity & Disaster Recovery Strategy

  Presented by Veeam

Today’s applications and data sets are larger, more complex, distributed and interdependent than ever. While many have a disaster recovery plan in place, executing, testing and documenting these plans is often complex and cumbersome.

We’ll also discuss:

  • State of BCDR today and what hinders DR planning for most companies
  • Why backup strategy is not DR strategy
  • Democratized DR of today (how tedious, manual procedures can be completely automated, and at accessible cost)

It Ain’t Done ‘Til It’s Automated: Security at the Speed of DevOps

  Presented by Check Point

Companies are rapidly migrating applications and workloads to the cloud. For many this is a Software as a Service for a first option, with migration to public cloud second, and only if necessary will workloads be deployed inside of the legacy data center. This is further complicated by the desire to accelerate the development lifecycle allowing devops to drive the IT migration. InfoSec is playing catchup to the business and devops constant acceleration.

In this session, you will learn strategies and best practices for allowing SecOps to keep up with the Speed of DevOps, as well as fundamental security knowledge applicable for any workload migration to any cloud provider.

Your Complete Business Communications Solution in the Cloud

  Presented by Mitel & Structured

Are you ready to move communication and collaboration to the cloud with confidence? If so, attend this session to learn how. MiCloud Connect is a full-featured communications and collaboration solution that is easy to deploy and manage. Blend traditional phone system features such as call transferring, extension dialing and more with instant messaging, conferencing, video and screen sharing. This allows you and your team to save time, reduce travel and efficiently collaborate with others. Plus, with the ability to make changes in real time, you can change your call routing or presence on the fly.

You’ve Got Mail

  Presented by LGIT

Cyber threats in email are still a useful tool from malicious groups. In this session, we will discuss how to forensically analyze emails from head to foot and everything in between. You will learn how to spot suspicious email and confidently determine if it is malicious. Join the LGIT group for a practical discussion on dealing with threats.

Speakers:
Zach Tielking • Information Security Analyst, State of Montana
Trever Hass • Information Security Analyst, State of Montana

Cyber-Threats in Montana and Worldwide

  Presented by Pine Cove Consulting

In this presentation we will share our findings on the current outlook of cyber-attacks in Montana including the number of organizations that have suffered a data breach that has affected Montanans, the number of Montanans that have been affected by data breaches, and the average length of data breaches. We will also analyze the three-year trend for each of these statistics. Sophos Security will join us and give us a nation and worldwide state of affairs for cyber-threats and ransomware.

You can’t protect your organization if you aren’t educated on the threats. Join our presentation to get a better view of the current threat landscape to organizations in Montana, the United States, and worldwide. We will also share tips and best practices for securing your organization against these threats.