[1 CPE] Privacy in the Age of Big Data: You Want to Know What About Me?

  Presented by Steve Smith • Chief Information Officer, University of Nevada Reno

Do you know who has access to data about you? What data, where it is, how it is shared, when (if ever) it is deleted? Facial recognition and other biometric tracking capabilities may be giving rise to surveillance capitalism. We are normalizing technologies that nobody knows how they will be used in the long term. At the same time laws like the European Union General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) are imposing compliance requirements that impact how business is conducted. Learn the latest about the technologies and the policies that impact privacy and how it may impact the role of IT.

Bio:
Steve Smith is the Vice Provost for Information Technology and CIO for the University of Nevada, Reno (UNR). UNR is a Carnegie Classified R-1 research university and the land grant institution for the state of Nevada. Steve has been at UNR since 2015. Prior to that, he held similar positions at the University of Hawaii system and the University of Alaska system with over 35 years of experience in information technology in higher education. He has extensive experience in networks and large systems for research and education. He is chair of the board for the Pacific Northwest Gigapop and Co-Chair of the Schools, Health & Libraries Broadband (SHLB) Coalition Higher Education Policy Group. Steve is also a member of the Juniper Higher Education Advisory Board and the VMWare Higher Education Peer Advisory Board.

[1 CPE] Data Classification and Compliance with Secure Storage

  Presented by Hitachi Vantara

With the continuing expanse of data, many companies struggle to store, categorize, and account for all of their corporate data. Due to this intensifying challenge, companies are unable to retrieve and analyze data in a way that leads to proper data governance. As their data grows, regulatory bodies institute laws and regulations to protect consumers’ data and ensure businesses are operating ethically. Unfortunately, companies that fail to comply with these changing regulations face large fines, loss of market share, and consumer backlash.

Join us for a demo to learn how Hitachi’s solutions can help companies find and manage their data through Data Classification and Secured Storage. Also learn if your company qualifies for the complimentary $100,000 data assessment 700+ customers have benefited from over the past decade.

[1 CPE] Situational Awareness Into the Dark Web

  Presented by Check Point Software

In our journey through this session, we take you through the evolution, goals, and motivation of the Dark Web. We will share with you what and whom you can find on the platforms as well as the major conflicts individuals face while exploring this web. The session also exposes you to the syndicates and structures running on the platforms. Surprisingly, we see how those groups were among the first to embrace and implement Blockchain technology and created a major global demand for crypto currencies. This is the time to listen, learn, and be exposed to the deepest secrets of the Dark Web.

[1 CPE] Handling the “New Normal” in Security and Beyond

  Presented by Keson Khieu • Chief Information Officer, California Emergency Medical Services Authority

Now that a hybrid workforce is likely to be the standard in both public and private enterprises, IT staffs have had to adapt. There has been an increase in ransomware threats that are making headlines. Handling privacy and compliance requirements has created unique challenges.

Security leaders must now navigate in new waters. We are truly entering a new model of cybersecurity that is here to stay. Join Keson Khieu, CISSP, PMP, ITIL, for a though-provoking discussion. You will get many takeaways about how these new challenges are actually great business opportunities for your firm.

[1 CPE] Immutable Storage: Level-Up Ransomware Readiness

  Presented by Arcserve & StorageCraft

IDC advises that a 3-2-1-1 strategy is the new best practice for effectively protecting customers against ransomware. The last 1 is the important piece of the puzzle, where a copy is also stored on immutable storage. The growing risk of compromise to your customers’ data – specifically via ransomware DEMANDS the most up to date and complete solutions arsenal.

[1 CPE] Ransomware: Why Does This Keep Happening?

  Presented by Arctic Wolf

Join Coy Thorp, Systems Engineer for Arctic Wolf, as he discusses the history and evolution of ransomware and why it has become so difficult to detect and mitigate. The basic premise is this: organizations spend more today than ever before to address cybersecurity risk, yet breaches are on the rise and there is no end in sight. What can your company do to prepare itself for the attack that is imminently on the horizon?

[1 CPE] What Got Us Here, Won’t Get Us to Where We’re Going…

  Presented by Aruba, a HPE Company

Over the past couple of decades, we’ve relied on a certain predictable and repeatable model of expectations from our infrastructure that has delivered. However, the demands of Digital Transformation, the pace of change, the capabilities within our teams — and of course the pandemic — have created business pressures that traditional ways of building and security infrastructure just can’t keep pace with.

The time is now to reflect, reset, and embrace a different way that will increase agility and flexibility as well as enhance performance and security. Lose the baggage of the past, travel light, and let’s chart a course for the journey ahead.

[1 CPE] Protect Your Applications and Data from Ransomware Threats

  Presented by Airgap Networks

Typical enterprise attack surface has dramatically increased post COVID19. Employees, contractors, and vendors have access to enterprise crown jewels over legacy and insecure VPN technology for their respective home environments. It is no wonder that we are witnessing a rapid increase in cybercrimes in the last 18 months. Is protecting your application and data your top priority? If so, please join us in the session to understand the threat landscape and various technology options to safeguard your assets.

We believe the fundamental issues faced by the organizations relate to excessive trust relationships over VLANs and VPNs. For better security, we must ensure that every transaction is authorized and authenticated, and we must make this happen without the need for a bunch of legwork.

Join us and learn more about our point of view on how you can protect your assets without forklift upgrades. Ritesh Agrawal, Co-Founder and CEO of Airgap Networks, will discuss industry leadership and provide a technology overview, addressing the following:

  • How does the modern Application Access approach compare to the traditional remote access VPN?
  • What’s the best method to deploy and operate Universal Secure Access Solution?
  • How to apply zero trust principles, especially for legacy protocols such as SSH, SMB, WMI, RDP, etc.?
  • What’s the importance of SSO/MFA authentication coupled with intent check?
  • Walkthrough (Demo) real-world use cases across private and public sectors.

Enjoy the INTERFACE event and we look forward to meeting you at the (virtual) booth.

[1 CPE] Ransomware Resilience: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Large organizations are still being forced to pay ransoms due to ransomware attacks. Disruptions to services and supply chains are putting ransomware victims in the news under a negative spotlight. Join recovery and resilience experts from Zerto to discuss best practices to minimize downtime and avoid paying ransoms by being prepared. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • What steps you can take to reduce the likelihood of attacks on your system
  • How to best choose a recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recovery quickly
  • How a company hit twice by ransomware improved recovery time from weeks to minutes by planning ahead

[1 CPE] Secure Connectivity, Delivered in the Cloud

  Presented by Optiv Security & iboss

Come learn what SASE (Secure Access Service Edge) is and understand the decisions you’ll need to make as you map out your own SASE journey.

In this session you’ll learn:

  • What is driving almost every company to consider SASE?
  • What decisions are being considered by Networking and Security teams?
  • What services can you replace with SASE?
  • Architecture matters! What are my options?
  • How do I migrate to SASE with zero downtime?