[1 CPE] Payment Card Industry Compliance: How to Become and Stay Compliant

  Presented by Structured

This presentation will discuss the difficulties of becoming and staying compliant with Payment Card Industry (PCI) requirements. The updated Data Security Standard (DSS) 4.0 has been released, and there are numerous changes and enhancements that must be complied with. Whether you are just beginning with PCI for your organization or have many years of experience, there are many challenges, both old and new that can create roadblocks to compliance. With emerging technologies such as zero-trust architecture ready for implementation, find out how to best use these controls for your organizational goals. This presentation will cover the requirements, trouble areas to be aware of, and how you can utilize specific technology in your compliance effort.

[1 CPE] Delivering the Zero Trust Enterprise

  Presented by Palo Alto Networks

Digital transformation is accelerating due to major shifts like the expansion of the hybrid workforce and the continued migration of applications and data to the cloud. Network security teams now have the opportunity to adopt a modern Zero Trust approach that fits this transformation.

But how do you make Zero Trust principles actionable across users, applications, and infrastructure? How can you put them into practice, set priorities, and effectively rebuild security for new environments? Join this session to learn about the three pillars of Zero Trust: users, applications, and infrastructure, and how you can develop a holistic and consistent approach to Zero Trust that can be made actionable across all three of these key domains. We will review various use cases across the organization and how we can support you with our unique blend of the highest level of capabilities, an integrated platform, and extensive in-house expertise around Zero Trust.

[1 CPE] How to Advance Strategic Business Goals with IoT

  Presented by Aruba, a HPE Company

Whether it’s the allure of the concept of the Internet of Things (IoT), a fear of being viewed as a laggard, or internal pressure to do something new, many companies rush head-first into IoT projects without clearly defined objectives or value propositions. The result is a high rate of failure and subsequent disillusionment about the real value of IoT. If your company’s strategic goals require human productivity monitoring, human productivity organizational redesign, augmented reality, energy monitoring, and/or building security, Aruba’s ESP can expedite time-to-insight and time-to-value. The solutions can securely handle all manner of IoT devices and integrate them with enterprise business applications and processes. Join us to learn how you can reduce IoT deployment time to a fraction of what a custom-developed solution would require.

[1 CPE] How to Successfully Manage Technology Challenges for a Remote Workforce

  Presented by INTERFACE Advisory Council

Your workforce will be dispersed permanently following the pandemic. Companies will no longer have their staff under one roof. Employees are working remotely in your city and throughout the country. This certainly has brought many challenges for IT departments everywhere. This is however the new business reality and adjustments have been made over the last year and a half to deal with the permanent remote workforce.

What are the best programs for basic monitoring of work? Can a VPN be trusted to securely handle your security needs? Is there really any difference between Zoom and Teams? Join the INTERFACE Advisory Council for a discussion about these questions and more. These challenges are nothing new but have quickly become more complex and common. Also, we will address the mix of workers coming back into your office and how that affects physical workspace changes.

Panelists:

Michael Agtunong • Manager, Information Technology, Gather Federal Credit Union
Jeromy Giacosa • Vice President, Information Services, Exagen
Matthew Linzer • Manager, Information Technology, University of California Office of The President

[1 CPE] Endpoint Systems Management: Time to Rethink

  Presented by Quest Software

See the recent changes to the endpoint environment and how these affect your infrastructure. Learn how these changes affect your network design and what this means for your daily business. Learn more about the new technologies available for managing your endpoints and see some tips and guidelines to be prepared for what’s next.

[1 CPE] Reinforce Your Operations Through Network Modernization

  Presented by Spectrum Enterprise

With the rise in remote workforce models, protecting your network is imperative. In this session, you’ll discover how to achieve resiliency, redundancy, and diversity through a wholly-owned national network. How can you secure required upgrade certifications and meet compliance requirements when you need a tailored and customized solution with the option of a fully managed or co-managed network? Join us to learn more about how to reinforce your operations through network modernization to successfully overcome the impacts and challenges that we have collectively faced in the last two years.

[1 CPE] How to Advance Strategic Business Goals with IoT

  Presented by Aruba, a HPE Company

Whether it’s the allure of the concept of the Internet of Things (IoT), a fear of being viewed as a laggard, or internal pressure to do something new, many companies rush head-first into IoT projects without clearly defined objectives or value propositions. The result is a high rate of failure and subsequent disillusionment about the real value of IoT. If your company’s strategic goals require human productivity monitoring, human productivity organizational redesign, augmented reality, energy monitoring, and/or building security, Aruba’s ESP can expedite time-to-insight and time-to-value. The solutions can securely handle all manner of IoT devices and integrate them with enterprise business applications and processes. Join us to learn how you can reduce IoT deployment time to a fraction of what a custom-developed solution would require.

[1 CPE] Payment Card Industry Compliance: How to Become and Stay Compliant

  Presented by Structured

This presentation will discuss the difficulties of becoming and staying compliant with Payment Card Industry (PCI) requirements. Although currently in version 3.2.1, the updated Data Security Standard (DSS) 4.0 is coming soon and there are numerous changes and enhancements that must be complied with. Whether you are just beginning with PCI for your organization or have many years of experience, there are many challenges, both old and new that can create roadblocks to compliance. With emerging technologies such as zero-trust architecture ready for implementation, find out how to best use these controls for your organizational goals. This presentation will cover the requirements, trouble areas to be aware of, and how you can utilize specific technology in your compliance effort.

[1 CPE] Health and Safety Innovations Lay a Smart Digital Foundation

  Presented by Hitachi Vantara & IT1 Source

The pandemic has accelerated innovation to protect health and safety, while laying a foundation for broader digital transformation across industries. Learn how automated detection of PPE, social distancing, collision avoidance, thermal scanning, and compliance analytics are helping companies reduce risk while protecting their workers and customers, and how this shift is preparing them to thrive in our digital future.

[1 CPE] Drive Digital Transformation with Offices of the CIO and CISO Collaboration

  Presented by Secureworks

The last 18 months have seen IT organizations rapidly move workloads to the cloud, support hybrid work, and drive end user adoption of new business applications. But without a robust security structure integrated into these new architectures, companies leave themselves at risk.

In this session, learn first-hand from the partnership between the Offices of the CIO and CISO at Secureworks on how to:

  • Align IT initiatives to security transformation programs
  • Reduce the complexity of implementing new digital initiatives by aligning security models early
  • Protect their organization’s critical data through early threat detection and response