Monitoring Considerations to Maintain Healthy Environment

  Presented by Quest Software

IT Administrators need to keep an eye on Availability, Performance, and Storage of mission-critical environments. There are several things to consider and prioritize.

In this session, the following topics will be covered:

  • Architecture: Agents? Overhead? Flexibility?
  • Configuration: On-premise? Cloud? Hybrid?
  • Real-time diagnostics vs. 24×7 monitoring
  • Build vs ‘Out of the box’ vs Custom
  • Alerting, Notifications, Actions
  • How do I determine what is ‘normal’ activity?
  • All-in-one or Specialized?
  • …and more…

    What I Wish I Knew BEFORE I Moved to the Cloud

    Presented by INTERFACE Advisory Council

    As more companies have to interact with cloud to drive their business forward, more do so without truly understanding security and the long-term ramifications in doing so. Join our experts for an in-depth discussion. This session will talk about what things we wish we knew before moving to the cloud. Bring your questions for this interactive discussion!

    How Can a Diverse Workforce Contribute to the Success of Your Business?

    Moderated by INTERFACE Advisory Council

    Now, more than ever, the workforce is comprised of a diverse group of talented professionals. With more women in the tech industry than ever before and a broad range of generations bringing different work styles and values to the table, ultimately organizations can benefit from having a diverse group of individuals on their team.

    Join our panel discussion as we discuss the tech landscape, workforce diversity and how to hire and retain top talent to obtain the high achieving teams we desire.

    Panelists:

    Deveeshree Nayak • Instructor, University of Washington Tacoma

    Alicia Evans • Metro Market Manager, Robert Half Technology

    You Are Never Alone: How to Humanize Tech and Work in Your Organization and in Life

    Presented by Dan Gaul • CTO, Digital Trends

    As one of the world’s largest technology curators, Digital Trends’ co-founder Dan Gaul explores what it takes to balance technology inside and outside of the organization while challenging traditional Silicon Valley ideas about what it takes to thrive.

    Dan Gaul is the co-founder and Chief Technical Officer (CTO) for Digital Trends, a Portland, Oregon-based publisher of consumer-targeted websites. In his role, Dan is charged with oversight of tech operations for Digital Trends’ suite of platforms including: Digital Trends, the popular site for news, information and reviews on personal tech (which reaches over 30 million viewers each month); its Spanish-language companion, DT Español, and The Manual, an aspirational-living site.

    Deep Learning: A Radical New Way to Detect Malware

    Presented by Blue Hexagon

    The transformative power of deep learning is being applied to every aspect of our lives– from speech recognition and cancer imaging to autonomous driving cars. Deep learning is the security weapon of the future as attackers evolve their techniques using sophisticated malicious, morphing malware variants created at unprecedented volume and velocity. In fact, deep learning neural networks can learn and intelligently make decisions on malware, even zero days seen for the first time.

    In this session, hear about how deep learning has evolved, why advances are possible today, and why it is ideal to address the new threat landscape of automated attacks without having to rely on an army of security analysts. Finally, explore a case study of how a multi-vector, polymorphic variant of the Emotet malware was detected with “deep learning inspection”. Deep dive into how the deep learning models were executed on different phases of the Emotet attack kill chain.

    A New Era of Data Protection: Converged DR and Backup

    Presented by Zerto

    In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

    • The cost and business impact of downtime and data loss can be immense
    • Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters
    • Having a plan and process in place will help you mitigate the impact of an outage on your business.

    In this presentation we will address the challenges, needs, strategies, and solutions.

    Securing the Public Cloud

    Presented by Check Point

    Securing the public cloud requires a different approach than what was required historically. We need to not only utilize a different design and tools but also shift the security focus to the user and not the location of a device.

    Deep Learning: A Radical New Way to Detect Malware

    Presented by Blue Hexagon

    The transformative power of deep learning is being applied to every aspect of our lives– from speech recognition and cancer imaging to autonomous driving cars. Deep learning is the security weapon of the future as attackers evolve their techniques using sophisticated malicious, morphing malware variants created at unprecedented volume and velocity. In fact, deep learning neural networks can learn and intelligently make decisions on malware, even zero days seen for the first time.

    In this session, hear about how deep learning has evolved, why advances are possible today, and why it is ideal to address the new threat landscape of automated attacks without having to rely on an army of security analysts. Finally, explore a case study of how a multi-vector, polymorphic variant of the Emotet malware was detected with “deep learning inspection”. Deep dive into how the deep learning models were executed on different phases of the Emotet attack kill chain.

    Transforming Your Business with Unified Communications

    Presented by Intermedia

    Modern business requires modern business tools. These tools should be well integrated and help to serve employees be more collaborative and efficient. They should be deployed in a way that is not only cost effective but create value for the business. We will highlight a case study of a local business that dramatically transformed their business by moving from an on prem phone system, to a cloud based Unified Communications platform.