Do You Know What is Plugged in to Your Networks, Data Centers & Clouds?

  Presented by Check Point

The connected network is undergoing significant transformation! A proliferation of connected Smart IOT devices for (in)security cameras, building management, Audio/Video Systems, Printers, Badge Readers and Access Points are just some of the IOT devices on all of our networks. Let alone the industry specific connected devices across manufacturing, healthcare, SCADA and other verticals which have their own alphabet soup of IOT and MOT assets. The Intelligent network must be able to identify, classify and integrate with the networks, security controls and data center deployments to securely allow the whitelisted application flows, while blocking unauthorized and malicious traffic. This challenge is amplified in that many of the applications which used to live inside of our physical data centers have migrated to the cloud or Software as a Service offerings requiring Smart IOT devices needing access to internet and cloud resources. Without proper security controls in place, IOT devices can and will be an entry point of malware infection and breach of our computer networks. Tools do exist allowing for dynamic profiling and monitoring of our physical and virtual network giving visibility and access controls back into the hands of IT. In this Session you will learn strategies & best practices for actively monitoring and enforcing dynamic access controls on the network with automated integrations across network & security controls.

Virtual Desktops & Virtual Applications: What’s New

  Presented by IVOXY Consulting & NetApp

Over the last year we have witnessed tremendous growth in the virtual desktop/virtual application segment, as a significant number of organizations began to work remotely. VDI has replaced traditional VPN technology, providing a faster, more seamless experience for the end-user, while reducing administrative overhead for their IT support team.

In this seminar Alec will catch you up on the latest advancements in virtual desktop technology, as well as dive into what’s new in the virtual applications space. From rapid provisioning to self-service provisioning, we have you covered!

Building a Secure and Sustainable Remote Work Environment

  Presented by Eric Finch • Chief Innovation and Technology Officer, City of Spokane

This presentation looks at how to build a more sustainable remote work environment, now that COVID-19 has made an enduring part of the technology support landscape. Using examples and lessons learned from Spokane and other organizations, we’ll give a quick look at the rapid expansion, evolving best practices for security and support, and what this means for technology and organizations going forward.

Eric Finch started as Chief Information & Technology Officer (CITO- a combined CIO/CTO position) for the City of Spokane, Washington in March 2015 and is chartered to bring a new level of integration and service partnership to the City with an increasing focus on citizen engagement and access to City services through Strategic Planning, Smart City, Open Data, Emergency Management, and other initiatives. In 2016 the department name “Information” was changed to “Innovation” to better represent the many varied service needs and strategic future focus of the department and role.

Mr. Finch transitioned from the U.S. Army in November 2014 as Chief Operating Officer responsible for planning and operations of a U.S. Army Division of over 12,000 personnel. This included a final tour to Afghanistan in 2013 where he was responsible for all operations for two provinces in southern Afghanistan. Mr. Finch is currently an active member of the California Army National Guard in State level Army Operations.

In his previous 25-year civilian technology career, Eric was an I.T. Director for a Fortune 500 financial company and principal for a small technology and management consulting firm for 12 years. His roles included providing strategic direction and tactical leadership for information technology and innovation in the public and private sectors. His private sector work included consulting on technology, economic development, and tax base development for hundreds of City and County government organizations.

Eric has a Master’s of Business from the University of Southern California (USC) and holds over a dozen technical, management, and FEMA emergency management certifications including Project Management Professional and Lean Six Sigma Black Belt.

Office 365 Security Best Practices: At the Office, at Home, and on the Road

  Presented by Mimecast

Cyber-hygiene has become a source of great concern of late. And while the Office 365 suite has helped communication and collaboration from multiple location points (at the office, at home, and on the road) there are still security concerns that must be mitigated. In this presentation, we will hear best practice suggestions for remaining safe while using Office 365. First, we’ll talk about security attitudes, then review CISA concerns with Office 365, and finally offer best practice suggestions and thought leadership. This presentation will be driven by J. Peter Bruzzese… cyber-security advisor and 8x awarded Microsoft MVP (Exchange/Office 365).

SD-WAN Edge Transformation for the Cloud-First Enterprise

  Presented by Silver Peak

As cloud adoption and SD-WAN innovation hastens, global enterprises are transforming how they build and secure wide area networks. Leveraging automation, enterprises can deploy, connect and secure hundreds of sites per week, a feat not possible with a traditional device-centric approach.

During this session, we’ll discuss how the unification of SD-WAN, WAN optimization, routing and security in a single, centrally orchestrated platform:

  • Delivers superior application performance wherever apps are hosted
  • Increases the quality of experience for end users and for IT
  • Simplifies branch WAN edge architecture

Office 365 Security Best Practices: At the Office, at Home, and on the Road

  Presented by Mimecast

Cyber-hygiene has become a source of great concern of late. And while the Office 365 suite has helped communication and collaboration from multiple location points (at the office, at home, and on the road) there are still security concerns that must be mitigated. In this presentation, we will hear best practice suggestions for remaining safe while using Office 365. First, we’ll talk about security attitudes, then review CISA concerns with Office 365, and finally offer best practice suggestions and thought leadership. This presentation will be driven by J. Peter Bruzzese… cyber-security advisor and 8x awarded Microsoft MVP (Exchange/Office 365).

Improving the Government Experience

  Presented by Mike Hussey • Chief Information Officer, State of Utah
Phil Bates • Chief Information Security Officer, State of Utah

State Government faces many challenges when it comes to providing services to citizens. Join Michael Hussey to find out what the State of Utah is doing to stay secure, adopt innovative technologies, collaborate with public sector and private sector, adapt to the new way of working, and upskill employees. Michael will also be joined by Phil Bates, Chief Information Security Officer for the State of Utah.

Michael Hussey was appointed Chief Information Officer (CIO) for the Department of Technology Services in October 2015. As CIO, he is responsible for the administration and supervision of a dedicated IT workforce that provides innovative services to Utah agencies and residents.

The Department of Technology Services is the IT service provider for over 20 state agencies in Utah. Utah is a leader in providing innovative, secure, and cost-effective technology solutions that are convenient and empower partner agencies to better serve the residents of the state. Mike has led Utah in eGovernment to provide over 1,300 services online, modernized all mainframe applications, made developments for data center migration to cloud, and has created efficiencies through easy-to-use, accessible, and innovative government services. Mike currently serves as the Vice President of the National Association of State Chief Information Officers (NASCIO), the premier network and resource for state CIOs and leading advocate for technology policy at all levels of government.

Hussey was born in West Covina, California and moved to Utah with his family at the age of 15. He and his wife are the parents of five children. He is a loyal University of Utah sports fan. Hussey has a passion for learning and enjoys staying current on emerging technologies.

Phil Bates is the Chief Information Security Officer for the Department of Technology Services, State of Utah. He has been involved in Cyber Security for many years, as the IT Director for the Department of Public Safety Phil aided in the creation of the Utah Cyber Task Force. Phil began his career in Law Enforcement, retiring as a Lieutenant from the West Jordan Police Department. While at West Jordan, Phil directed the deployment of the first large-scale use of Commercial Mobile Data for Public Safety in the US.

Architecting for the Agentless

  Presented by Gigamon

Today’s networks are swarming with IoT, OT, and virtual devices of every size and shape. As they have proliferated, and the security attack surface has likewise increased, the market has responded with a wide variety of technologies to help understand, manage, and secure just what is on your network. This is the rise of the technologies classified as “agentless” and there is a good chance you will be looking, now or in the future, at a project that comprises such technologies. While much of what is fundamentally required to enable these technologies is not new, organizations struggle with trying to implement these on an “ad hoc” basis, with little thought to future considerations or scale. This presentation will take about a more strategic approach to handling these implementations, what a visibility fabric is, and how today’s organizations can architect their environments for their future needs.

Zero-Trust Network Access

  Presented by Fortinet

Controlling users and devices on today’s networks is challenging. Many types of users requiring different levels of access need an automated solution. Devices are sneaking onto networks without approval and require visibility and control. Learn how Zero-Trust Network Access solution addresses the issue of knowing who, what, where and when and controlling everyone and everything on and off the network.

Unified Endpoint Management

  Presented by Quest Software

This presentation highlights the reasons and need for Unified Endpoint Management in your business strategy. This presentation’s sole purpose is to educate C-level and system administrators of the need for UEM as well as what aspects are important. One of the problems with endpoint management today is the proliferation of endpoints. During this global health crisis especially, we are seeing a large work-from-home movement in businesses all over the world. In order to combat this issue, you must have an endpoint management strategy that works not only on the network but off of it as well.