Do You Know What is Plugged in to Your Networks, Data Centers & Clouds?

  Presented by Check Point

The connected network is undergoing significant transformation! A proliferation of connected Smart IOT devices for (in)security cameras, building management, Audio/Video Systems, Printers, Badge Readers and Access Points are just some of the IOT devices on all of our networks. Let alone the industry specific connected devices across manufacturing, healthcare, SCADA and other verticals which have their own alphabet soup of IOT and MOT assets. The Intelligent network must be able to identify, classify and integrate with the networks, security controls and data center deployments to securely allow the whitelisted application flows, while blocking unauthorized and malicious traffic. This challenge is amplified in that many of the applications which used to live inside of our physical data centers have migrated to the cloud or Software as a Service offerings requiring Smart IOT devices needing access to internet and cloud resources. Without proper security controls in place, IOT devices can and will be an entry point of malware infection and breach of our computer networks. Tools do exist allowing for dynamic profiling and monitoring of our physical and virtual network giving visibility and access controls back into the hands of IT. In this Session you will learn strategies & best practices for actively monitoring and enforcing dynamic access controls on the network with automated integrations across network & security controls.

SD-WAN Edge Transformation for the Cloud-First Enterprise

  Presented by Silver Peak

As cloud adoption and SD-WAN innovation hastens, global enterprises are transforming how they build and secure wide area networks. Leveraging automation, enterprises can deploy, connect and secure hundreds of sites per week, a feat not possible with a traditional device-centric approach.

During this session, we’ll discuss how the unification of SD-WAN, WAN optimization, routing and security in a single, centrally orchestrated platform:

  • Delivers superior application performance wherever apps are hosted
  • Increases the quality of experience for end users and for IT
  • Simplifies branch WAN edge architecture

Office 365 Security Best Practices: At the Office, at Home, and on the Road

  Presented by Mimecast

Cyber-hygiene has become a source of great concern of late. And while the Office 365 suite has helped communication and collaboration from multiple location points (at the office, at home, and on the road) there are still security concerns that must be mitigated. In this presentation, we will hear best practice suggestions for remaining safe while using Office 365. First, we’ll talk about security attitudes, then review CISA concerns with Office 365, and finally offer best practice suggestions and thought leadership. This presentation will be driven by J. Peter Bruzzese… cyber-security advisor and 8x awarded Microsoft MVP (Exchange/Office 365).

Office 365 Security Best Practices: At the Office, at Home, and on the Road

  Presented by Mimecast

Cyber-hygiene has become a source of great concern of late. And while the Office 365 suite has helped communication and collaboration from multiple location points (at the office, at home, and on the road) there are still security concerns that must be mitigated. In this presentation, we will hear best practice suggestions for remaining safe while using Office 365. First, we’ll talk about security attitudes, then review CISA concerns with Office 365, and finally offer best practice suggestions and thought leadership. This presentation will be driven by J. Peter Bruzzese… cyber-security advisor and 8x awarded Microsoft MVP (Exchange/Office 365).

Improving the Government Experience

  Presented by Mike Hussey • Chief Information Officer, State of Utah
Phil Bates • Chief Information Security Officer, State of Utah

State Government faces many challenges when it comes to providing services to citizens. Join Michael Hussey to find out what the State of Utah is doing to stay secure, adopt innovative technologies, collaborate with public sector and private sector, adapt to the new way of working, and upskill employees. Michael will also be joined by Phil Bates, Chief Information Security Officer for the State of Utah.

Michael Hussey was appointed Chief Information Officer (CIO) for the Department of Technology Services in October 2015. As CIO, he is responsible for the administration and supervision of a dedicated IT workforce that provides innovative services to Utah agencies and residents.

The Department of Technology Services is the IT service provider for over 20 state agencies in Utah. Utah is a leader in providing innovative, secure, and cost-effective technology solutions that are convenient and empower partner agencies to better serve the residents of the state. Mike has led Utah in eGovernment to provide over 1,300 services online, modernized all mainframe applications, made developments for data center migration to cloud, and has created efficiencies through easy-to-use, accessible, and innovative government services. Mike currently serves as the Vice President of the National Association of State Chief Information Officers (NASCIO), the premier network and resource for state CIOs and leading advocate for technology policy at all levels of government.

Hussey was born in West Covina, California and moved to Utah with his family at the age of 15. He and his wife are the parents of five children. He is a loyal University of Utah sports fan. Hussey has a passion for learning and enjoys staying current on emerging technologies.

Phil Bates is the Chief Information Security Officer for the Department of Technology Services, State of Utah. He has been involved in Cyber Security for many years, as the IT Director for the Department of Public Safety Phil aided in the creation of the Utah Cyber Task Force. Phil began his career in Law Enforcement, retiring as a Lieutenant from the West Jordan Police Department. While at West Jordan, Phil directed the deployment of the first large-scale use of Commercial Mobile Data for Public Safety in the US.

Architecting for the Agentless

  Presented by Gigamon

Today’s networks are swarming with IoT, OT, and virtual devices of every size and shape. As they have proliferated, and the security attack surface has likewise increased, the market has responded with a wide variety of technologies to help understand, manage, and secure just what is on your network. This is the rise of the technologies classified as “agentless” and there is a good chance you will be looking, now or in the future, at a project that comprises such technologies. While much of what is fundamentally required to enable these technologies is not new, organizations struggle with trying to implement these on an “ad hoc” basis, with little thought to future considerations or scale. This presentation will take about a more strategic approach to handling these implementations, what a visibility fabric is, and how today’s organizations can architect their environments for their future needs.

CI/CD for Networking: Adopting DevOps Principles for a More Robust Network

  Presented by Infoblox

In recent years, continuous integration and continuous deployment, aka CI/CD, have become de facto standards for DevOps-minded software development organizations. Adoption of CI/CD enables software architects and IT specialists to create more flexible, secure and agile infrastructure with new features and functionality that are continually improved and deployed. While compute and storage aspects of environments have benefited greatly from CI/CD, network infrastructure has lagged behind.

This presentation pulls back the covers on efforts taking place to bring CI/CD philosophies to the work of revamping legacy, monolithic network architectures using cloud-native principles, microservices and containerization. The end goal is to create networks that are inherently more adaptable, scalable, automated and simpler to manage.

Speaker Bio: Glenn Sullivan is a Principal Product Manager for Emerging Technologies at Infoblox and joined the Infoblox team when SnapRoute, a company he co-founded in 2015, was acquired by Infoblox. At SnapRoute, Sullivan was responsible for product direction by advocating for the end-user. Prior to founding SnapRoute, Sullivan was responsible for building out hyperscale data center environments at Apple. In addition to core network operational functions, Sullivan led efforts to automate the lifecycle management of various platforms in a multivendor environment. Before Apple, Sullivan was a specialist support engineer on the LAN Switching team in Cisco TAC. While there, his specialty was in turning around customer sentiment by focusing on escalated issues and transforming the customer experience into a positive one. Sullivan has a BS in Network and Systems Administration from RIT (Rochester Institute of Technology).

Zero-Trust Network Access

  Presented by Fortinet

Controlling users and devices on today’s networks is challenging. Many types of users requiring different levels of access need an automated solution. Devices are sneaking onto networks without approval and require visibility and control. Learn how Zero-Trust Network Access solution addresses the issue of knowing who, what, where and when and controlling everyone and everything on and off the network.

Unified Endpoint Management

  Presented by Quest Software

This presentation highlights the reasons and need for Unified Endpoint Management in your business strategy. This presentation’s sole purpose is to educate C-level and system administrators of the need for UEM as well as what aspects are important. One of the problems with endpoint management today is the proliferation of endpoints. During this global health crisis especially, we are seeing a large work-from-home movement in businesses all over the world. In order to combat this issue, you must have an endpoint management strategy that works not only on the network but off of it as well.

Digital Transformation: The ASU University Technology Office Story

  Presented by Chris Richardson • Deputy CIO of Development, Mobility, and Smart Cities • ASU

COVID-19 has accelerated digital transformation to a point we thought we’d reach in 2025. But the groundwork for such a leap was laid some time before at the ASU University Technology Office. Deputy CIO IT Development, Mobility and Smart Cities, Chris Richardson, will share how the culture of innovation at UTO, and its agile mindset, represent an exciting new definition of digital transformation.

Chris Richardson is the Deputy Chief Information Officer Development, Mobility, and Smart Cities at Arizona State University, organized as part of ASU’s University Technology Office. Mr. Richardson and his team are responsible for aligning with key stakeholders to lead the strategy, upgrade cycle, new functionality enhancements, and maintenance of a number of Enterprise applications across the diverse landscape of ASU; key applications to note include myASU, eAdvisor, uAchieve, Salesforce, and Peoplesoft. In addition to development and business analysis with these and other applications, Mr. Richardson’s team is advancing the landscape and vision of mobile applications and standards, web standards, and a User Experience Center of Excellence.

Chris Richardson recently joined ASU from Honeywell where he held several positions over an 11- year career. His most recent role was Senior Director of IT Service Delivery for the Performance Materials and Technologies business group, global accountability of all application and infrastructure operations for a $12B organization. As Director Service Operations Support of the centralized infrastructure organization, his team supported more than 120,000 employees globally for their Service Desk and desktop support experiences, the identity and access management for their systems, the monitoring of critical infrastructure, and all ITIL process ownership for incident, problem, knowledge, access and event management. He has also held responsibility as Director for Desktop Services, Senior Program Manager, IT Audit Manager, European Manager Co-Sourcing, and Senior Business Analyst in the Transportation Systems business group.

Mr. Richardson has also been responsible for product and web development at his own companies, Tru Realty and ASPACT Schools (no longer in existence), as well as at Talisma Corporation and License Online.

Chris holds a double Bachelor of Science in Zoology and Fisheries from the University of Washington, a Master of Arts in Teaching from the University of Puget Sound, and a Master of Business Administration (MIS, Finance, and Entrepreneurship emphases) from the University of Arizona. During Chris’ working career he has obtained PMP, CIPP, and ITIL Expert Lifecycle certifications; he was also a part of Honeywell’s Pathways, IT Leadership Development, and HITS Leadership IT Functional training programs.