Cyber AI and Geopolitics: Managing Tomorrow’s Cyber Risk

  Presented by Darktrace

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher. Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and Americas CISO, JR Tietsort to discuss this new era of cyber-threat and how Cyber AI can help defenders regain the upper hand.

This speaking session will include a Q&A with our experts, and explore:

  • How nation-state attacks are changing
  • How organizations can respond to the classic balance of security and productivity
  • How organizational maturity in risk management is maintained whilst ensuring cyber defense

Plan, Mobilize and Act: How the IT Industry in Idaho Securely Responded to a Pandemic

  Presented by INTERFACE Advisory Council

In 2020, Idaho was forced to react quickly to a global pandemic. Companies had to mobilize to enable employees to work from home. IT departments all throughout the state took on this task. How does this remote working environment change workflow? What challenges remain? Will we see permanent remote working in many industries? What security vulnerabilities did this expose and in what ways have we responded?

Join the INTERFACE-Boise Advisory Council to discuss these topics and more. Each panelist will share their experiences from leading the deployment of remote working and offer insight into what lies ahead. The group will also touch on new security challenges that have arisen from a remote working environment.

Presenters:
Laurel Caldwell • Director of ITS, Latah County
Herman Doering • HIPAA Information Security Officer, St Luke’s Health System
Jerry Hindberg • Associate Director of Network & Cybersecurity, Lewis-Clark State College

Idaho’s Cyber Security Initiatives and Resources

  Presented by Keith Tresh • CISO, State of Idaho

Join the State of Idaho’s Chief Information Security Officer, Keith Tresh, for a rundown of resources that are currently available to all throughout Idaho. Cyber Security is not just the responsibility of one IT professional in an office, it is up to all Information Technology Professionals. Keith will layout the initiatives he is currently involved in to spread awareness and offer up help. He will detail the partnerships he is engaged in with Idaho Counties to combat cybercrime. Help for you is available now, join us to learn more.

Retired Army Colonel and strategic executive with C-level success in strategic planning, capacity/cost projections, IT governance, and BI solutions. Logical thinker and strong communicator noted for transforming IT organizations and building cohesive/productive teams to support enterprise-wide infrastructures. Quality-focused leader with both Federal and State Government expertise.

Builder of productive and responsive IT organizations that enhance customer/user experiences with a strategic vision in mind. Vast experience as an Information Technology and Information Security professional and all aspects of IT management including Strategic Planning. Direct experience in information management/security including cybercrime and cyberwarfare, project management, infrastructure engineering, application development, and budget management. Currently holds a Top Secret (SCI) clearance.

Hyperskill Network Security Introduced

  Presented by Check Point Software

The IT industry has a new way to utilize current hardware investment and maximize appliance capacity in an easy-to-manage Hyperscale network security solution. Organizations can now simplify their workflow orchestration and scale up their existing security gateways on demand — the same way as they can spin up new servers and compute resources in public clouds. Join Check Point Software for an in-depth look.

Building A Security Culture in a Customer Service World

  Presented by Dan Hammerling • Chief Information Security Officer, Peppermill Casinos, Inc.

Whether we like it or not, all IT positions are involved with customer service. At the same time, the changing nature of cybersecurity and external regulations has necessitated that we consider business opportunities in light of the security and privacy risks. Through relationship building with key decisionmakers and providing continuous training to all members of an organizational team, we can work to make security a foundational element of our business operations.

H. Daniel Hammerling is an accomplished IT Security leader and US military veteran. He brings over 20 years of IT and IT Security experience to his current role with Peppermill Casinos Inc. Dan holds a Bachelor’s Degree in Business management as well as a CISSP and CISM. Among his volunteer work and family life, Dan is a member of ISACA, (ISC)2, ASIS International, InfraGard, and the USSS-ECTF. In his most recent endeavor, Dan has become a content creator and twitch streamer.

What is HCI and How Does it Enable a Public Cloud On-Prem?

  Presented by Nutanix

Hyperconverged Infrastructure (HCI) has been taking the IT industry by storm the past 5 years. As businesses are exploring what this means to them, they need to ask themselves should we consider changing our infrastructure? During this session we will cover the following discussions:

  • What is HCI exactly and why consider it?
  • Why are companies moving to the cloud and why are they now moving back?
  • How do I create the Public Cloud experience in my own On-Prem solution?
  • What hypervisors work with HCI solutions?

Gaining Network Visibility with Application Intelligence

  Presented by Gigamon

Come discuss how gaining visibility into your network has become more of a challenge than ever before. With the evolution from the Data Center to Virtual Environments, Public and Private Clouds, our exposure has never been greater.

In this session we will cover Span vs. TAP, Traffic Aggregation, Packet Brokers, Traffic Intelligence, Virtual Environments and how to get that one view of all your data.

Learn how to maximize the ROI on your existing tools while increasing your scope of visibility.

Who knows, you might even have fun?! Heckling Encouraged!

Offensive AI vs. Defensive AI: Battle of the Algorithms – Cyber AI & Geopolitics

  Presented by Darktrace

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher. Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and Americas CISO, JR Tietsort to discuss this new era of cyber-threat and how Cyber AI can help defenders regain the upper hand.

This speaking session will include a Q&A with our experts, and explore:

  • How nation-state attacks are changing
  • How organizations can respond to the classic balance of security and productivity
  • How organizational maturity in risk management is maintained whilst ensuring cyber defense

Vendor Management and Data Privacy

  Presented by AT&T

Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous and harder to identify. In the near future, we will begin to see supercharged, AI-powered cyber-attacks leveraged at scale. To protect against Offensive AI attacks, organizations are turning to defensive cyber AI, which can identify and neutralize emerging malicious activity, no matter when, or where, it strikes.

In this session, learn about:

  • Paradigm shifts in the cyber landscape
  • Advancements in offensive AI attack techniques
  • The Immune System Approach to cyber security and defensive, Autonomous Response capabilities
  • Real-world examples of emerging threats that were stopped with Cyber AI

Why Protecting Crypto Keys is More Important Than the Data They are Protecting

  Presented by nCipher

In Part 1 Mr. Beutlich talked about the history of cryptography. As Brad discussed, throughout history, the weakest link of every encryption solution (no matter how simple or complex) was exchanging and protecting the cryptographic key. In Part 2 of this series, Brad will discuss in detail why, in the 21st century, the creation and protection of a crypto key is even more important than it’s ever been. Join Brad for another lively presentation on how important it is to protect crypto keys.