Cyber Considerations During a Pandemic: Cyber Leaders’ Perspectives

  Presented by Jodi Ito • Chief Information Security Officer, University of Hawaii

Join us for a panel discussion, led by Jodi Ito, Information Security Officer for the University of Hawaii. This panel will cast a wide net around the multitude of cyber-related considerations and issues that society is facing with our current pandemic situation. From securing telework locations, health screening when re-opening, servicing customers during a shutdown in a secure manner, to providing equitable distance-delivered education – the panelists will engage in a lively roundtable discussion of these topics and more.

Panelists:

Jodi Ito • Chief Information Security Officer, University of Hawaii

Vince Hoang • Chief Information Security Officer, State of Hawaii
Alan Ito • Information Security Officer, Hawaii Pacific Health
Ryan Field • Sr. Vice President, Director of Technology & Architecture, American Savings Bank

Jodi Ito is the Chief Information Security Officer with the University of Hawaii (UH) System in the Office of the Vice President for Information Technology since 2000 and has been with the University since 1982.

Jodi is responsible for the security and protection of information assets across the University of Hawaii System. These responsibilities include developing and managing policies and procedures for the UH information security program, conducting risk & vulnerability analysis for critical assets, overseeing investigations into cyber incidents, & developing and conducting training on information policy & security issues across all 10 UH campuses and affiliated research & education centers. She has also organized several large scale red/blue team cybersecurity exercises on the UH cyber range involving University students, Hawaii National Guard, military, state, and federal government agencies.

Jodi is a Principal Investigator and Program Director for the NSA’s GenCyber Camps in Hawaii to introduce cybersecurity to high school students and teachers. She is also the co-PI on the NSF/NSA Scholarship For Services grants to provide full-ride scholarships for students pursuing cybersecurity degrees and the NSF Computer Science Principles for Hawaii to train high school teachers to be able to teach AP Computer Sciences Principles. She is also a member of the REN-ISAC, MS-ISAC, Educause, and Infragard. Most recently, she is an active founding member of the newly organized CyberHawaii and co-chairs the Education and Workforce Development Committee.

Jodi graduated from the University of Hawaii at Manoa with both a Bachelors of Science degree in Computer Science in 1982 and a Masters of Science degree in Information and Computer Science in 1987.

Top 5 Use Cases for Endpoint Protection in Operational Technology

  Presented by VPLS

The Air Gap: A Double-edged Sword

Endpoints are frequently the target of initial compromise or attacks. It can take just minutes, if not seconds, to compromise the endpoints, putting industrial environments at risk. One recent study found that 30% of breaches involved malware being installed on endpoints.

Operational Technology (OT) endpoints are particularly vulnerable given the legacy technology powering environments like our manufacturing plants, power stations, and other critical infrastructure. Many organizations rely on an air gap for cybersecurity to protect their industrial environments.

Unfortunately, the air gap is a double-edged sword. While it may help insulate and shrink the attack surface, like all prevention measures, it is not 100%.

Join this presentation to explore how you can:

  • Stop breaches and prevent data loss and ransomware damage with no dwell time.
  • Eliminate alert fatigue and optimize operations with customizable, standardized incident response processes.
  • Ensure business continuity in the event of a security incident, keeping systems online.
  • Reduce the cost of legacy EDR solutions, enabling response and remediation without negatively impacting business.

Staying Secure While Working from Home

  Presented by Trend Micro

Working from home has become almost ubiquitous in these times of COVID-19. Quarantining your devices while away from the office is not an acceptable solution to the many risks that exist outside of your corporate network. Please join Trend Micro to discuss the many ways you can help ensure that working from home does not compromise the security posture of your organization.

Modern Applications Need Modern Network and Security Controls

  Presented by CompuNet

This discussion will present the many issues facing organizations today as applications become more mission-critical than ever. Organizations must adopt new strategies and techniques to ensure that their customer-facing applications remain available and secure, even in the face of ever-changing customer requirements, a shift to a mobile workforce, and more threats than ever before. CompuNet and F5 Networks will discuss the new ways that companies can protect their applications without a dramatic increase in complexity and budget requirements.

Cyber AI and Geopolitics: Managing Tomorrow’s Cyber Risk

  Presented by Darktrace

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher. Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and Americas CISO, JR Tietsort to discuss this new era of cyber-threat and how Cyber AI can help defenders regain the upper hand.

This speaking session will include a Q&A with our experts, and explore:

  • How nation-state attacks are changing
  • How organizations can respond to the classic balance of security and productivity
  • How organizational maturity in risk management is maintained whilst ensuring cyber defense

Plan, Mobilize and Act: How the IT Industry in Idaho Securely Responded to a Pandemic

  Presented by INTERFACE Advisory Council

In 2020, Idaho was forced to react quickly to a global pandemic. Companies had to mobilize to enable employees to work from home. IT departments all throughout the state took on this task. How does this remote working environment change workflow? What challenges remain? Will we see permanent remote working in many industries? What security vulnerabilities did this expose and in what ways have we responded?

Join the INTERFACE-Boise Advisory Council to discuss these topics and more. Each panelist will share their experiences from leading the deployment of remote working and offer insight into what lies ahead. The group will also touch on new security challenges that have arisen from a remote working environment.

Presenters:
Laurel Caldwell • Director of ITS, Latah County
Herman Doering • HIPAA Information Security Officer, St Luke’s Health System
Jerry Hindberg • Associate Director of Network & Cybersecurity, Lewis-Clark State College

Idaho’s Cyber Security Initiatives and Resources

  Presented by Keith Tresh • CISO, State of Idaho

Join the State of Idaho’s Chief Information Security Officer, Keith Tresh, for a rundown of resources that are currently available to all throughout Idaho. Cyber Security is not just the responsibility of one IT professional in an office, it is up to all Information Technology Professionals. Keith will layout the initiatives he is currently involved in to spread awareness and offer up help. He will detail the partnerships he is engaged in with Idaho Counties to combat cybercrime. Help for you is available now, join us to learn more.

Retired Army Colonel and strategic executive with C-level success in strategic planning, capacity/cost projections, IT governance, and BI solutions. Logical thinker and strong communicator noted for transforming IT organizations and building cohesive/productive teams to support enterprise-wide infrastructures. Quality-focused leader with both Federal and State Government expertise.

Builder of productive and responsive IT organizations that enhance customer/user experiences with a strategic vision in mind. Vast experience as an Information Technology and Information Security professional and all aspects of IT management including Strategic Planning. Direct experience in information management/security including cybercrime and cyberwarfare, project management, infrastructure engineering, application development, and budget management. Currently holds a Top Secret (SCI) clearance.

Hyperskill Network Security Introduced

  Presented by Check Point Software

The IT industry has a new way to utilize current hardware investment and maximize appliance capacity in an easy-to-manage Hyperscale network security solution. Organizations can now simplify their workflow orchestration and scale up their existing security gateways on demand — the same way as they can spin up new servers and compute resources in public clouds. Join Check Point Software for an in-depth look.

What is HCI and How Does it Enable a Public Cloud On-Prem?

  Presented by Nutanix

Hyperconverged Infrastructure (HCI) has been taking the IT industry by storm the past 5 years. As businesses are exploring what this means to them, they need to ask themselves should we consider changing our infrastructure? During this session we will cover the following discussions:

  • What is HCI exactly and why consider it?
  • Why are companies moving to the cloud and why are they now moving back?
  • How do I create the Public Cloud experience in my own On-Prem solution?
  • What hypervisors work with HCI solutions?

Gaining Network Visibility with Application Intelligence

  Presented by Gigamon

Come discuss how gaining visibility into your network has become more of a challenge than ever before. With the evolution from the Data Center to Virtual Environments, Public and Private Clouds, our exposure has never been greater.

In this session we will cover Span vs. TAP, Traffic Aggregation, Packet Brokers, Traffic Intelligence, Virtual Environments and how to get that one view of all your data.

Learn how to maximize the ROI on your existing tools while increasing your scope of visibility.

Who knows, you might even have fun?! Heckling Encouraged!