Responsible Administration: The Admin Insider (Threat)

  Presented by One Identity

System Administrators are critical people to every organization. They design, build, and maintain all the parts and pieces that enable business, whether that’s retail, healthcare, or even a government agency. Ensuring sysadmin tasks are performed as securely as possible without hampering their ability to keep our business running is a delicate balance. These “insiders” not only know how the systems operate but have the credentials and privileges to operate them.

In this session, we will demonstrate an Active Directory breach using pass-the-hash and discuss ways to enable the System Administrators to operate in a way that not only protects the business from threats but also enables them to perform the intricate tasks they accomplish daily to keep business flowing under the covers.

Adapting and Implementing the New Normal for Education

  Presented by Ardham & Extreme Networks

Education Institutions and staff are rapidly preparing their organizations for success in a changed world. As they continue to drive towards digital transformation this global pandemic heightened these unique IT challenges into full force. Continuing to focus on their main challenges; some have been re-prioritized to accommodate remote learning to drive better learning outcomes.

Join our interactive session to see a showcase of key approaches and ideas in the education industry, plus the critical building blocks, to help advance your own IT response.

  • Key considerations for the new normal – technology and education trends.
  • A showcase of strategies and best practices from some of the leaders in the education industry.
  • How Education IT departments are coping with and adapting to the COVID-19 pandemic.
  • How Teachers and Staff are evolving their classrooms into remote learning environments and still continue to drive better learning outcomes.
  • Best Practices for Remote and Online Learning.
  • Facilitating agile environments, by delivering simple and secure remote and extended connectivity, with centralized IT control.
  • How to better enable contact tracing and occupancy management with ubiquitous, real-time location analytics and long-term data horizons.

What’s Next?

  Presented by Mike Baca • Chief Information Officer, New Mexico Taxation and Revenue Department

Interesting developments, new approaches to old problems, new paradigms of doing business, even the talent pool is changing. 2020 presented a huge catalyst for transformation and we can see the customer experience, and our professional lives, will dramatically change forever. Government institutions are choosing to keep up with the industry leaders, and in many ways are laying the groundwork and spearheading the lasting evolution.

As the CIO for both the NM Motor vehicle and Tax Department, Mike will share an interesting cross jurisdictional perspective that demonstrates the convergence of technology with new ways of performing. We are going places faster than we ever dreamed possible. Join us for an exciting look at “What’s next?”

Mike Baca is the CIO for New Mexico’s Taxation and Revenue Department (TRD) and has over 25 years of experience in information technology. Prior to joining the TRD, Mike was the Director of the New Mexico Department of Information Technology Enterprise Project Management Office (EPMO). While building NM’s EPMO, Mike worked directly with NM CIO’s focusing on legislative policy, technology budgeting, and ensuring successful enterprise project implementation (we went from huge failures to an 87% success rate – on time, on budget, complete adoption). Other significant milestones include the passage of legislation consolidating technology in NM under the Department of Information Technology, NM’s Sunshine laws, and a long history of successful business case and technology appropriations. Mike also has background data analytics.

Mike is many things – poet, painter, teacher, vegetarian cowboy, the Director of NM’s EPMO, and most recently the CIO for New Mexico’s Taxation and Revenue Department and Motor Vehicle Division.  His background includes holistic data mining, rescuing endangered IT projects, and organizational transformation. On the personal side he loves chocolate chip cookies, motorcycles, and libraries.

Responsible Administration: The Admin Insider (Threat)

  Presented by One Identity

System Administrators are critical people to every organization. They design, build, and maintain all the parts and pieces that enable business, whether that’s retail, healthcare, or even a government agency. Ensuring sysadmin tasks are performed as securely as possible without hampering their ability to keep our business running is a delicate balance. These “insiders” not only know how the systems operate but have the credentials and privileges to operate them.

In this session, we will demonstrate an Active Directory breach using pass-the-hash and discuss ways to enable the System Administrators to operate in a way that not only protects the business from threats but also enables them to perform the intricate tasks they accomplish daily to keep business flowing under the covers.

Unified Endpoint Management

  Presented by Quest Software

This presentation highlights the reasons and need for Unified Endpoint Management in your business strategy. This presentation’s sole purpose is to educate C-level and system administrators of the need for UEM as well as what aspects are important. One of the problems with endpoint management today is the proliferation of endpoints. During this global health crisis especially, we are seeing a large work-from-home movement in businesses all over the world. In order to combat this issue, you must have an endpoint management strategy that works not only on the network but off of it as well.

Unified Endpoint Management

  Presented by Quest Software

This presentation highlights the reasons and need for Unified Endpoint Management in your business strategy. This presentation’s sole purpose is to educate C-level and system administrators of the need for UEM as well as what aspects are important. One of the problems with endpoint management today is the proliferation of endpoints. During this global health crisis especially, we are seeing a large work-from-home movement in businesses all over the world. In order to combat this issue, you must have an endpoint management strategy that works not only on the network but off of it as well.

What is HCI and How Does it Enable a Public Cloud On-Prem?

  Presented by Nutanix

Hyperconverged Infrastructure (HCI) has been taking the IT industry by storm the past 5 years. As businesses are exploring what this means to them, they need to ask themselves should we consider changing our infrastructure? During this session we will cover the following discussions:

  • What is HCI exactly and why consider it?
  • Why are companies moving to the cloud and why are they now moving back?
  • How do I create the Public Cloud experience in my own On-Prem solution?
  • What hypervisors work with HCI solutions?

What is HCI and How Does it Enable a Public Cloud On-Prem?

  Presented by Nutanix

Hyperconverged Infrastructure (HCI) has been taking the IT industry by storm the past 5 years. As businesses are exploring what this means to them, they need to ask themselves should we consider changing our infrastructure? During this session we will cover the following discussions:

  • What is HCI exactly and why consider it?
  • Why are companies moving to the cloud and why are they now moving back?
  • How do I create the Public Cloud experience in my own On-Prem solution?
  • What hypervisors work with HCI solutions?

Top 5 Use Cases for Endpoint Protection in Operational Technology

  Presented by VPLS

The Air Gap: A Double-edged Sword

Endpoints are frequently the target of initial compromise or attacks. It can take just minutes, if not seconds, to compromise the endpoints, putting industrial environments at risk. One recent study found that 30% of breaches involved malware being installed on endpoints.

Operational Technology (OT) endpoints are particularly vulnerable given the legacy technology powering environments like our manufacturing plants, power stations, and other critical infrastructure. Many organizations rely on an air gap for cybersecurity to protect their industrial environments.

Unfortunately, the air gap is a double-edged sword. While it may help insulate and shrink the attack surface, like all prevention measures, it is not 100%.

Join this presentation to explore how you can:

  • Stop breaches and prevent data loss and ransomware damage with no dwell time.
  • Eliminate alert fatigue and optimize operations with customizable, standardized incident response processes.
  • Ensure business continuity in the event of a security incident, keeping systems online.
  • Reduce the cost of legacy EDR solutions, enabling response and remediation without negatively impacting business.

Responsible Administration: The Admin Insider (Threat)

  Presented by One Identity

System Administrators are critical people to every organization. They design, build, and maintain all the parts and pieces that enable business, whether that’s retail, healthcare, or even a government agency. Ensuring sysadmin tasks are performed as securely as possible without hampering their ability to keep our business running is a delicate balance. These “insiders” not only know how the systems operate but have the credentials and privileges to operate them.

In this session, we will demonstrate an Active Directory breach using pass-the-hash and discuss ways to enable the System Administrators to operate in a way that not only protects the business from threats but also enables them to perform the intricate tasks they accomplish daily to keep business flowing under the covers.