Presented by Fortinet
Navigating and securing the eroding edge of your network. A conversation around Zero Trust in the wake of COVID-19.
Presented by Fortinet
Navigating and securing the eroding edge of your network. A conversation around Zero Trust in the wake of COVID-19.
Presented by Veeam
Today’s applications and data sets are larger, more complex, distributed and interdependent than ever. While many have a disaster recovery plan in place, executing, testing and documenting these plans is often complex and cumbersome. Join us to learn more about:
Presented by Zerto
As IT application availability requirements continue to evolve, technology continues change to meet the new requirements. Join us as we discuss planning considerations for bringing your virtualized workloads into the next generation of IT resilience. You will learn about data center options to consider as part of your recovery strategy, business and technical trade-offs that will have to be made, capacity planning considerations, and testing approaches to that are possible that will optimize application up-time.
Presented by Keith Tresh • CISO, State of Idaho
Join the State of Idaho’s Chief Information Security Officer, Keith Tresh, for a rundown of resources that are currently available to all throughout Idaho. Cyber Security is not just the responsibility of one IT professional in an office, it is up to all Information Technology Professionals. Keith will layout the initiatives he is currently involved in to spread awareness and offer up help. He will detail the partnerships he is engaged in with Idaho Counties to combat cybercrime. Help for you is available now, join us to learn more.
Retired Army Colonel and strategic executive with C-level success in strategic planning, capacity/cost projections, IT governance, and BI solutions. Logical thinker and strong communicator noted for transforming IT organizations and building cohesive/productive teams to support enterprise-wide infrastructures. Quality-focused leader with both Federal and State Government expertise.
Builder of productive and responsive IT organizations that enhance customer/user experiences with a strategic vision in mind. Vast experience as an Information Technology and Information Security professional and all aspects of IT management including Strategic Planning. Direct experience in information management/security including cybercrime and cyberwarfare, project management, infrastructure engineering, application development, and budget management. Currently holds a Top Secret (SCI) clearance.
Presented by StorageCraft
Ransomware attacks have increased over 130% since the COVID crisis. Everyone is a target and even those with preventative measures in place are at risk. We will review some of the latest attacks and offer best practices in how to protect your organization without increasing budgets.
Presented by Check Point Software
The IT industry has a new way to utilize current hardware investment and maximize appliance capacity in an easy-to-manage Hyperscale network security solution. Organizations can now simplify their workflow orchestration and scale up their existing security gateways on demand — the same way as they can spin up new servers and compute resources in public clouds. Join Check Point Software for an in-depth look.
Presented by Silver Peak
As cloud adoption and SD-WAN innovation hastens, global enterprises are transforming how they build and secure wide area networks. Leveraging automation, enterprises can deploy, connect and secure hundreds of sites per week, a feat not possible with a traditional device-centric approach.
During this session, we’ll discuss how the unification of SD-WAN, WAN optimization, routing and security in a single, centrally orchestrated platform:
Presented by Trend Micro
Working from home has become almost ubiquitous in these times of COVID-19. Quarantining your devices while away from the office is not an acceptable solution to the many risks that exist outside of your corporate network. Please join Trend Micro to discuss the many ways you can help ensure that working from home does not compromise the security posture of your organization.
Presented by CompuNet
This discussion will present the many issues facing organizations today as applications become more mission-critical than ever. Organizations must adopt new strategies and techniques to ensure that their customer-facing applications remain available and secure, even in the face of ever-changing customer requirements, a shift to a mobile workforce, and more threats than ever before. CompuNet and F5 Networks will discuss the new ways that companies can protect their applications without a dramatic increase in complexity and budget requirements.
Presented by INTERFACE Advisory Council
In March, we were all forced to react quickly to a global pandemic. Companies had to mobilize to enable employees to work from home. This task was placed on the shoulders of IT departments all throughout Nevada. How does this remote working environment change workflow? What challenges remain for IT departments? Will we see permanent remote working in many industries? What security vulnerabilities did this expose and in what ways have we responded?
Join Barbara Guerin and Jeff Jorczak from Renown Health as they discuss these topics and more. They will share their experiences from leading the deployment of remote working and offer insight into what lies ahead. They will also touch on new security challenges that have arisen form a remote working environment.