What’s Next?

  Presented by Mike Baca • Chief Information Officer, New Mexico Taxation and Revenue Department

Interesting developments, new approaches to old problems, new paradigms of doing business, even the talent pool is changing. 2020 presented a huge catalyst for transformation and we can see the customer experience, and our professional lives, will dramatically change forever. Government institutions are choosing to keep up with the industry leaders, and in many ways are laying the groundwork and spearheading the lasting evolution.

As the CIO for both the NM Motor vehicle and Tax Department, Mike will share an interesting cross jurisdictional perspective that demonstrates the convergence of technology with new ways of performing. We are going places faster than we ever dreamed possible. Join us for an exciting look at “What’s next?”

Mike Baca is the CIO for New Mexico’s Taxation and Revenue Department (TRD) and has over 25 years of experience in information technology. Prior to joining the TRD, Mike was the Director of the New Mexico Department of Information Technology Enterprise Project Management Office (EPMO). While building NM’s EPMO, Mike worked directly with NM CIO’s focusing on legislative policy, technology budgeting, and ensuring successful enterprise project implementation (we went from huge failures to an 87% success rate – on time, on budget, complete adoption). Other significant milestones include the passage of legislation consolidating technology in NM under the Department of Information Technology, NM’s Sunshine laws, and a long history of successful business case and technology appropriations. Mike also has background data analytics.

Mike is many things – poet, painter, teacher, vegetarian cowboy, the Director of NM’s EPMO, and most recently the CIO for New Mexico’s Taxation and Revenue Department and Motor Vehicle Division.  His background includes holistic data mining, rescuing endangered IT projects, and organizational transformation. On the personal side he loves chocolate chip cookies, motorcycles, and libraries.

Responsible Administration: The Admin Insider (Threat)

  Presented by One Identity

System Administrators are critical people to every organization. They design, build, and maintain all the parts and pieces that enable business, whether that’s retail, healthcare, or even a government agency. Ensuring sysadmin tasks are performed as securely as possible without hampering their ability to keep our business running is a delicate balance. These “insiders” not only know how the systems operate but have the credentials and privileges to operate them.

In this session, we will demonstrate an Active Directory breach using pass-the-hash and discuss ways to enable the System Administrators to operate in a way that not only protects the business from threats but also enables them to perform the intricate tasks they accomplish daily to keep business flowing under the covers.

Unified Endpoint Management

  Presented by Quest Software

This presentation highlights the reasons and need for Unified Endpoint Management in your business strategy. This presentation’s sole purpose is to educate C-level and system administrators of the need for UEM as well as what aspects are important. One of the problems with endpoint management today is the proliferation of endpoints. During this global health crisis especially, we are seeing a large work-from-home movement in businesses all over the world. In order to combat this issue, you must have an endpoint management strategy that works not only on the network but off of it as well.

Unified Endpoint Management

  Presented by Quest Software

This presentation highlights the reasons and need for Unified Endpoint Management in your business strategy. This presentation’s sole purpose is to educate C-level and system administrators of the need for UEM as well as what aspects are important. One of the problems with endpoint management today is the proliferation of endpoints. During this global health crisis especially, we are seeing a large work-from-home movement in businesses all over the world. In order to combat this issue, you must have an endpoint management strategy that works not only on the network but off of it as well.

What is HCI and How Does it Enable a Public Cloud On-Prem?

  Presented by Nutanix

Hyperconverged Infrastructure (HCI) has been taking the IT industry by storm the past 5 years. As businesses are exploring what this means to them, they need to ask themselves should we consider changing our infrastructure? During this session we will cover the following discussions:

  • What is HCI exactly and why consider it?
  • Why are companies moving to the cloud and why are they now moving back?
  • How do I create the Public Cloud experience in my own On-Prem solution?
  • What hypervisors work with HCI solutions?

What is HCI and How Does it Enable a Public Cloud On-Prem?

  Presented by Nutanix

Hyperconverged Infrastructure (HCI) has been taking the IT industry by storm the past 5 years. As businesses are exploring what this means to them, they need to ask themselves should we consider changing our infrastructure? During this session we will cover the following discussions:

  • What is HCI exactly and why consider it?
  • Why are companies moving to the cloud and why are they now moving back?
  • How do I create the Public Cloud experience in my own On-Prem solution?
  • What hypervisors work with HCI solutions?

Top 5 Use Cases for Endpoint Protection in Operational Technology

  Presented by VPLS

The Air Gap: A Double-edged Sword

Endpoints are frequently the target of initial compromise or attacks. It can take just minutes, if not seconds, to compromise the endpoints, putting industrial environments at risk. One recent study found that 30% of breaches involved malware being installed on endpoints.

Operational Technology (OT) endpoints are particularly vulnerable given the legacy technology powering environments like our manufacturing plants, power stations, and other critical infrastructure. Many organizations rely on an air gap for cybersecurity to protect their industrial environments.

Unfortunately, the air gap is a double-edged sword. While it may help insulate and shrink the attack surface, like all prevention measures, it is not 100%.

Join this presentation to explore how you can:

  • Stop breaches and prevent data loss and ransomware damage with no dwell time.
  • Eliminate alert fatigue and optimize operations with customizable, standardized incident response processes.
  • Ensure business continuity in the event of a security incident, keeping systems online.
  • Reduce the cost of legacy EDR solutions, enabling response and remediation without negatively impacting business.

Responsible Administration: The Admin Insider (Threat)

  Presented by One Identity

System Administrators are critical people to every organization. They design, build, and maintain all the parts and pieces that enable business, whether that’s retail, healthcare, or even a government agency. Ensuring sysadmin tasks are performed as securely as possible without hampering their ability to keep our business running is a delicate balance. These “insiders” not only know how the systems operate but have the credentials and privileges to operate them.

In this session, we will demonstrate an Active Directory breach using pass-the-hash and discuss ways to enable the System Administrators to operate in a way that not only protects the business from threats but also enables them to perform the intricate tasks they accomplish daily to keep business flowing under the covers.

The Digital Transformation of Education

  Presented by INTERFACE Advisory Council

As the Hawaii State Department of Education responds to the changing situation of the “New Normal”, we have accelerated the modernization of our legacy systems. By focusing on automation and software as a service, the Department has been able to meet the rapidly evolving needs of telework and distance learning. By focusing on the work that is good enough, a technology transformation that was already well under way has been able to accelerate and meet the needs of students across the state.

Presenter:
Brook Conner • Assistant Superintendent & CIO, Hawaii Department of Education

First Quarter of Containment

  Presented by Malwarebytes

All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.