[1 CPE] The Future of AI-Enabled Data Platforms

  Presented by Ian Clatworthy, Global Director, Infrastructure Product Marketing • Hitachi Vantara

Removing the infrastructure silos and administration complexity around your application’s data gives you the flexibility to consume solutions and deliver total data freedom. Join us as we showcase the future of data storage as a single hybrid cloud platform for applications. Allowing you to consume the data services you need, where and when you need it! Offering a single data plane and control plane across block, file, object, and mainframe, with one common experience for administration, analytics, and automation.

Ian comes from a customer background in Formula 1 and World Rallying. Having a deep understanding of technology and its benefits he took his skills into technology sales and marketing with Dell and HDS. Today he leads Product Marketing for data infrastructure technologies at Hitachi Vantara.

[1 CPE] AI in Cybersecurity: Navigating the Double-Edged Sword

  Presented by Johan Bloomhart, Principal Sales Engineer • WatchGuard & BlackPoint IT

The rise of Artificial Intelligence (AI) has introduced both transformative opportunities and unprecedented risks to the cybersecurity landscape. While AI is a powerful tool for automating threat detection and enhancing security protocols, it also presents new avenues for cybercriminals to launch more sophisticated attacks. In AI in Cybersecurity: Navigating the Double-Edged Sword, we’ll explore AI’s dual impact—empowering both defenders and attackers—and discuss how to harness AI responsibly to protect against emerging threats.

This session will cover:

  • An overview of AI’s evolution and its prominence in the modern business world.
  • How malicious actors exploit AI for nefarious purposes, and the vulnerabilities that arise.
  • How cybersecurity professionals use AI to fortify defenses, identify threats, and mitigate risks.
  • Predictions for AI’s long-term influence on the security industry.
  • The latest technological tools and techniques that can mitigate the risks posed by AI.

We’ll also offer guidance on developing an artificial intelligence policy that allows your organization to leverage AI’s productivity benefits while minimizing risks to data security. Participants will walk away with actionable insights into how to implement AI securely in their business, staying ahead of both competitors and cyber threats.

[1 CPE] People or Machines? An Open Panel Discussion on Building a Balanced IT Team

  Presented by INTERFACE Advisory Council

You may be a small IT shop with limited resources. Using AI applications could help you tremendously but can have drawbacks. What is the correct balance of human workforce and AI supplementation? Every situation is unique and what works for one company, may not work for others. For larger IT shops, the challenges of retaining your top talent and training your staff properly create their own set of challenges. At the end of the day, how you manage your assets to get the job done remains a key responsibility of all IT leaders.

Join the INTERFACE Advisory Council for an open discussion about retaining your workforce, training the next generation of IT leaders, and using AI when appropriate. The difficulty you have in keeping your business operational while secure will never get easier. IT professionals need all the help they can get. Join this panel discussion to hear from your peers about how you can accomplish this tough task.

Moderator: Tony North, Sr Manager, IT Services, King County, Washington

Panelists:

  • Tad Doviak, Cybersecurity Administrator, Globe Machine
  • Sreedhar Pamidiparthi, Director, Technical Architecture, Archway Software
  • Michael Secright, Chief Information Officer, HFS University of Washington
  • Harald Upegui, Director, Information Security, HealthPoint

[1 CPE] Harnessing AI for Better Network Experiences

  Presented by Spencer Rolfs, Product Marketing Manager, Wireless • Juniper Networks & Structured

What if your network could anticipate and solve problems before they affect your users? We believe that fast connectivity alone isn’t enough – it’s the quality of the connection that truly matters. Solutions that leverage AI for IT operations (AIOps) will raise the standards of industry norms with an experience-first approach. By seamlessly managing operations across the full stack, you can ensure not just connectivity, but an exceptional network experience. Join us to discover how an AI-native network can significantly reduce networking trouble tickets by up to 90%, lower OpEx by up to 85%, and improve incident resolution times by up to 50%.

Join us as we explore the future of networking by transforming complex challenges into streamlined operations, making networks more responsive, efficient, and user-centric than ever before.

[1 CPE] The Intersection of AI and Cybersecurity

  Presented by Gregory Pepper, Security Architect • Check Point

As artificial intelligence (AI) permeates our lives, it’s crucial to address the cybersecurity challenges it presents. In this dynamic landscape, AI will be utilized by both attackers and defenders. We will explore the opportunities of leveraging AI to enhance your business and defenses while acknowledging the potential risks. AI-powered attacks, opaque AI systems, and a lack of standardized security practices demand proactive measures, rigorous protocols, and transparent designs to ensure a secure AI ecosystem.

[1 CPE] AI Unleashed: Navigating the AI Landscape for Responsible Adoption

  Presented by Hunter Helfgott, AI Adoption Specialist • Cerium Networks

In today’s digital era, AI is not just a buzzword but a robust toolset that, when wielded with precision, can unlock unprecedented value and competitive advantage. As we embark on this journey, we must anchor our strategies in the bedrock of security, ensuring that our AI systems not only enhance our capabilities but also safeguard our assets. This presentation explores practical steps to weave AI into our business fabric, turning challenges into a springboard for growth and innovation. Our goal is to present you with concepts and avenues to consider as you learn to navigate your adoption. Let’s embark on this journey to harness AI’s potential responsibly and effectively.

[1 CPE] AI: Friend or Foe? An Open Discussion With Your Colleagues

  Presented by INTERFACE Advisory Council

Artificial Intelligence has made a mark already and its use will only continue to expand. Are we fully prepared to embrace AI in our workplaces? Viewpoints differ on how widely AI should be used at this point. Commonly used applications and software now include AI capabilities as a part of their standard offerings. How is this governed in your company? Do you even have an AI policy drafted?

Join the INTERFACE Advisory Council for an open discussion on all things AI. We will cover the risks associated with using AI –– and the risk of NOT using it. What knowledge do you need right now? Bring your questions as we explore the starting points that every IT department needs to consider for an effective AI policy.

Panelists:

  • Jason Boche, Sr Director, Corporate Development & Strategy, Union Pacific
  • Dr. Lisa McKee, Assistant Professor Cybersecurity, Bellevue University
  • Terrance Steinhart, Manager, Cybersecurity, Blue Cross & Blue Shield of Nebraska
  • Justin Williams, Director, Information Security, Hudl

[1 CPE] AI in Cybersecurity: Navigating the Double-Edged Sword

  Presented by Johan Bloomhart, Principal Sales Engineer • WatchGuard & BlackPoint IT

The rise of Artificial Intelligence (AI) has introduced both transformative opportunities and unprecedented risks to the cybersecurity landscape. While AI is a powerful tool for automating threat detection and enhancing security protocols, it also presents new avenues for cybercriminals to launch more sophisticated attacks. In AI in Cybersecurity: Navigating the Double-Edged Sword, we’ll explore AI’s dual impact—empowering both defenders and attackers—and discuss how to harness AI responsibly to protect against emerging threats.

This session will cover:

  • An overview of AI’s evolution and its prominence in the modern business world.
  • How malicious actors exploit AI for nefarious purposes, and the vulnerabilities that arise.
  • How cybersecurity professionals use AI to fortify defenses, identify threats, and mitigate risks.
  • Predictions for AI’s long-term influence on the security industry.
  • The latest technological tools and techniques that can mitigate the risks posed by AI.

We’ll also offer guidance on developing an artificial intelligence policy that allows your organization to leverage AI’s productivity benefits while minimizing risks to data security. Participants will walk away with actionable insights into how to implement AI securely in their business, staying ahead of both competitors and cyber threats.

[1 CPE] Are You AI Ready? Securing M365 Copilot

  Presented by Structured

This presentation dives into the transformative potential of Generative AI (GenAI) and Microsoft’s M365 Copilot. We’ll cover the fundamental differences between GenAI and Machine Learning, highlighting GenAI’s ability to create new content and its applications across various industries. We’ll also provide an in-depth look at Microsoft Copilot, showcasing its role in enhancing productivity through intelligent suggestions and automation. Additionally, we’ll introduce a comprehensive Copilot Assessment service designed to evaluate an organization’s readiness for AI integration, focusing on IT infrastructure, security, data governance, and compliance. Emphasis is placed on ensuring secure integration and adherence to global data privacy standards, making it a critical resource for organizations embarking on their AI journey.

[1 CPE] The Intersection of AI and Cybersecurity

  Presented by Gregory Pepper, Security Architect • Check Point

As artificial intelligence (AI) permeates our lives, it’s crucial to address the cybersecurity challenges it presents. In this dynamic landscape, AI will be utilized by both attackers and defenders. We will explore the opportunities of leveraging AI to enhance your business and defenses while acknowledging the potential risks. AI-powered attacks, opaque AI systems, and a lack of standardized security practices demand proactive measures, rigorous protocols, and transparent designs to ensure a secure AI ecosystem.