[1 CPE] Do You Feel the Need… the Need for Speed? Top Five SQL Server Query Tuning Tips

  Presented by Quest Software

Query tuning is key to peak performance in SQL Server databases. However, lots of developers and DBAs constantly struggle to pinpoint the root cause of performance issues and spend way too much time trying to fix them. In this presentation, Quest will share their tried-and-true best practices for tuning SQL statements and other issues by utilizing Wait Time Analysis, reviewing execution plans, and using SQL diagramming techniques. In addition, we’ll present several case studies to demonstrate these best practices.

Regardless of the complexity of your database or your skill level, this systematic approach will lead you down the correct tuning path with no guessing, saving countless hours of tuning queries and optimizing the performance of your SQL Server databases.

[1 CPE] Aligning Projects to Organizational Strategic Objectives

  Presented by INTERFACE Advisory Council

As investments in projects decrease in organizations, it is important to ensure that authorized and funded projects are aligned with the strategic objectives of the organization. This became a challenge in the last year as many of those objectives were forced to be modified – and many projects felt the impact of the change.

In this session, Greta Blash, a PMI-certified instructor, will explain how to align a project with an organization’s strategic objectives and the impact of overall changes to the organization.

Greta has extensive experience as an executive and consulting IT professional, both domestically and internationally. Her areas of experience include: program management, project management, agile development, and business analysis; with emphasis in the areas of customer relationship management, business intelligence, continuous improvement, system implementations, and conversions. Greta is a PMI-certified instructor and a certified project manager (PgMP, PMP, PMI-PBA, PMI-PBA, and CDAP) whose extensive experiences enable her to manage multiple high-risk, high-tech projects.

[1 CPE] Developing a Vision and Strategy for Security Centric IAM Programs

  Presented by Business Partner Solutions

Learn how to defend new age data breaches through Identity Centric Security. 80% of cyber incidents stem from stolen credentials & privileged accounts. By including Identity Centric Security (ICS), organizations can proactively manage their threat landscape, ensuring better threat intelligence and breach defenses.

Topics discussed will inlcude:

  • What is ICS?
  • How does ICS enable risk-based decision-making?
  • How does ICS strengthen breach defense?
  • Approach to embracing ICS

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

[1 CPE] The Evolution of Vulnerability Management

  Presented by Optiv Security & Tenable

A proactive, risk-driven Vulnerability Management approach delivers comprehensive, continuous visibility and informs technical and business decisions. Join Tenable’s Nathan Wenzler and Optiv’s Doug Drew (a respected Tenable Guardian) as they discuss real-world VM challenges and how to manage and measure your cyber risk.

[1 CPE] Unified Endpoint Management

  Presented by Quest Software

This presentation highlights the reasons and need for Unified Endpoint Management in your business strategy. This presentation’s sole purpose is to educate C-level and system administrators of the need for UEM as well as what aspects are important. One of the problems with endpoint management today is the proliferation of endpoints. During this global health crisis especially, we are seeing a large work-from-home movement in businesses all over the world. In order to combat this issue, you must have an endpoint management strategy that works not only on the network but off of it as well.

[1 CPE] Remote Working – Here to Stay?

  Presented by INTERFACE Advisory Council

Remote working during the pandemic has proved to be beneficial for some companies and employees. Even as we forecast a return to the office soon, many will want to work remotely on a permanent basis.

Join the INTERFACE- Advisory Council for a look at what lies ahead with remote working. How are you adjusting your security procedures? Do you know if your end-users will return to the office? Also, we will address long term items when it comes to in person working for different industries. How much of a shift in business will we see? We will discuss how IT departments be involved in decision making and execution of policies.


Panelists:

Ulf Asplund • Manager of Technical Services, Alaska Court System
Paul Hinsberg • Sr Enterprise Architect, Alaska USA Federal Credit Union
Mark Merchant • Chief Information Security Officer, Municipality of Anchorage

[1 CPE] Work-Life Effectiveness: The Impacts on Employees & Employers

  Presented by Alaska Communications

In this presentation, you will learn the basics of work-life effectiveness and understand how it impacts the company’s bottom line. There are seven key elements of work-life effectiveness. We will explore these elements, which include ideas on how to bring them to your organization. We will also address work-life and wellness issues caused by the COVID-19 pandemic.

[1 CPE] Stay Ahead: Prep and Protect Your Enterprise for a Post-Pandemic World

  Presented by Check Point Software

Organizations worldwide transformed their ways of working with the onset of the COVID-19 pandemic. Now, we’re all forced to face new uncertainties as we transition to a post-pandemic world. Meanwhile, threat actors and cybercriminals are evolving their tactics to take advantage of these hazy times and the pandemic’s disruption as seen by recent surges in attacks across all industry sectors. This new phase of the modern workforce threatens more disruptive change and unpredictability. Join us to better understand what organizations such as yours should be focusing on to avoid being the next victim and stay a step ahead of the world’s leading cybercriminals.