State of Business Continuity Disaster Recovery, What Hinders DR Planning?

  Presented by Veeam

Today’s applications and data sets are larger, more complex, distributed and interdependent than ever. While many have a disaster recovery plan in place, executing, testing and documenting these plans is often complex and cumbersome. Join us to learn more about:

  • Why a backup strategy is not a DR strategy.
  • Democratized DR of today
  • How tedious, manual procedures can be completely automated, and at accessible cost

IT Interrupted: Best Practices in Disaster Recovery Planning

  Presented by Zerto

As IT application availability requirements continue to evolve, technology continues change to meet the new requirements. Join us as we discuss planning considerations for bringing your virtualized workloads into the next generation of IT resilience. You will learn about data center options to consider as part of your recovery strategy, business and technical trade-offs that will have to be made, capacity planning considerations, and testing approaches to that are possible that will optimize application up-time.

Idaho’s Cyber Security Initiatives and Resources

  Presented by Keith Tresh • CISO, State of Idaho

Join the State of Idaho’s Chief Information Security Officer, Keith Tresh, for a rundown of resources that are currently available to all throughout Idaho. Cyber Security is not just the responsibility of one IT professional in an office, it is up to all Information Technology Professionals. Keith will layout the initiatives he is currently involved in to spread awareness and offer up help. He will detail the partnerships he is engaged in with Idaho Counties to combat cybercrime. Help for you is available now, join us to learn more.

Retired Army Colonel and strategic executive with C-level success in strategic planning, capacity/cost projections, IT governance, and BI solutions. Logical thinker and strong communicator noted for transforming IT organizations and building cohesive/productive teams to support enterprise-wide infrastructures. Quality-focused leader with both Federal and State Government expertise.

Builder of productive and responsive IT organizations that enhance customer/user experiences with a strategic vision in mind. Vast experience as an Information Technology and Information Security professional and all aspects of IT management including Strategic Planning. Direct experience in information management/security including cybercrime and cyberwarfare, project management, infrastructure engineering, application development, and budget management. Currently holds a Top Secret (SCI) clearance.

Ransomware Protection Doesn’t Have to Break the Bank

  Presented by StorageCraft

Ransomware attacks have increased over 130% since the COVID crisis. Everyone is a target and even those with preventative measures in place are at risk. We will review some of the latest attacks and offer best practices in how to protect your organization without increasing budgets.

Hyperskill Network Security Introduced

  Presented by Check Point Software

The IT industry has a new way to utilize current hardware investment and maximize appliance capacity in an easy-to-manage Hyperscale network security solution. Organizations can now simplify their workflow orchestration and scale up their existing security gateways on demand — the same way as they can spin up new servers and compute resources in public clouds. Join Check Point Software for an in-depth look.

SD-WAN Edge Transformation for the Cloud-First Enterprise

  Presented by Silver Peak

As cloud adoption and SD-WAN innovation hastens, global enterprises are transforming how they build and secure wide area networks. Leveraging automation, enterprises can deploy, connect and secure hundreds of sites per week, a feat not possible with a traditional device-centric approach.

During this session, we’ll discuss how the unification of SD-WAN, WAN optimization, routing and security in a single, centrally orchestrated platform:

  • Delivers superior application performance wherever apps are hosted
  • Increases the quality of experience for end users and for IT
  • Simplifies branch WAN edge architecture

Staying Secure While Working from Home

  Presented by Trend Micro

Working from home has become almost ubiquitous in these times of COVID-19. Quarantining your devices while away from the office is not an acceptable solution to the many risks that exist outside of your corporate network. Please join Trend Micro to discuss the many ways you can help ensure that working from home does not compromise the security posture of your organization.

Modern Applications Need Modern Network and Security Controls

  Presented by CompuNet

This discussion will present the many issues facing organizations today as applications become more mission-critical than ever. Organizations must adopt new strategies and techniques to ensure that their customer-facing applications remain available and secure, even in the face of ever-changing customer requirements, a shift to a mobile workforce, and more threats than ever before. CompuNet and F5 Networks will discuss the new ways that companies can protect their applications without a dramatic increase in complexity and budget requirements.

Plan, Mobilize and Act: How the IT Industry in Nevada Securely Responded to a Pandemic

  Presented by INTERFACE Advisory Council

In March, we were all forced to react quickly to a global pandemic. Companies had to mobilize to enable employees to work from home. This task was placed on the shoulders of IT departments all throughout Nevada. How does this remote working environment change workflow? What challenges remain for IT departments? Will we see permanent remote working in many industries? What security vulnerabilities did this expose and in what ways have we responded?

Join Barbara Guerin and Jeff Jorczak from Renown Health as they discuss these topics and more. They will share their experiences from leading the deployment of remote working and offer insight into what lies ahead. They will also touch on new security challenges that have arisen form a remote working environment.

Motivating Employees in 2020

  Presented by INTERFACE Advisory Council

So many companies have been utilizing remote working for several months now. What are the tricks we have learned about motivating employees to stay productive? Is positive reinforcement a better approach than negative? How have IT departments been involved in this process? Join the INTERFACE-Reno Advisory Council for a discussion on getting the most out of employees. We will also look forward to what processes will continue to be like for all your employees and customers alike.