Upcoming Event: INTERFACE Portland March 8th
Upcoming Event: INTERFACE Arkansas March 22nd
Upcoming Event: INTERFACE Charlotte March 29th

Building a Culture of Security: How I Learned to Love InfoSec

  Presented by Intrinium, Inc.

Are you struggling to build a culture of security? You can spend a fortune on all the latest security technologies, but the most effective way to reduce the risk of a security incident is education in your organization.

As an MSSP provider, Intrinium has worked with organizations of all sizes to implement a successful culture of security, with buy-in from top to bottom. Learn about successful strategies, dos and don’ts, and how to protect your users and your company.

The Internet of (Too Many) Connected Things

  Presented by Kaspersky Lab

Are your headphones really spying on you? We have passed the first phase of the Internet of Things. Everything we own is now connected to backend systems we know nothing about. The second phase, M2M communication, is already underway.

Can we secure everything, or are we too late? Join us for a journey through the current threat landscape.

DataCenter & The Cloud: How Hybrid Cloud Changes Your Security Visibility

  Presented by Trend Micro

Security requirements do not go away when you move part of your data center to the cloud. Although most security controls can be easily applied to systems in the cloud, the weight of those controls and what constitutes an immediate concern versus a lower priority alert, can be different. We will discuss the requirement for advanced visibility to differentiate your cloud systems versus your internal data center with central visibility. With the dynamic nature of the cloud, and the flexibility of the modern data center, it is important to apply the same security controls but view the alerts differently depending on their origin.

Hierarchy of IT Security Needs

  Presented by Dasher Technologies, Inc.

In 1943, Psychologist Abraham Maslow presented his “Hierarchy of Needs”, a ranked set of motivations that humans tend to build upon in search of their full potential. Today, Dasher Technologies presents a new hierarchy…of IT Security needs! Come learn about this ranked set of priorities, applicable to organizations large and small, who are in search of their fullest (IT security) potential.

Immune System Security: The Shift to Self-Learning, Self-Defending Networks

  Presented by Darktrace

The fight is no longer at the perimeter. In the new era of cyber-threats, machines fight machines on the battleground of corporate networks. No human security team can keep pace. From high-speed global ransomware attacks to sophisticated threats that disguise themselves for months on a network before taking action, these attacks call for a change in the way we protect our most critical assets.

How Better Integration Mitigates Cybercrime Exposure

  Presented by Fortinet

Many solutions exist to solve particular security and technical issues in your network. But as solutions are added, complexity increases as “Silos” are created and visibility suffers. By breaking down these “Security Silos,” you can get a better overall picture of what’s transpiring on your network as well as reducing your overall attack surface. Discussion of Malware propagation, encryption complications, and various security technologies to ensue.

Breaking Security Silos: How Better Integration Mitigates Cybercrime Exposure

  Presented by Fortinet

Many solutions exist to solve particular security and technical issues in your network. But as solutions are added, complexity increases as “Silos” are created and visibility suffers. By breaking down these “Security Silos,” you can get a better overall picture of what’s transpiring on your network as well as reducing your overall attack surface. Discussion of Malware propagation, encryption complications, and various security technologies to ensue.

Let’s Talk IoT (That’s Right): The Internet of THREATS

  Moderated by INTERFACE-Sacramento Advisory Council

Brewing a mocha with your smartphone. Get a live look in at your refrigerator while at the grocery store. Sure, these sound like modern day conveniences. However, the IoT craze must be managed by IT staffs, and the far-reaching aspects of these conveniences are not being considered.

What about compliance standards? Who is liable for devices? Join the INTERFACE Advisory Council for an interactive panel discussion about how the IoT reality is affecting your workplace, and what needs to be considered.
Should we be concerned about data privacy and security with these devices? Are some of these technologies safer than others? We will discuss these questions and more. Your questions will also be welcome.

Panelists:
Keson Khieu – Information Security Officer – State of California
Michael Reese – Chief Information Officer -USA Properties Fund