It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
Panel discussion on Vulnerability Management with a focus on what works and how to get your program off the ground. For most organizations, they struggle with keeping up with patches and vulnerabilities in their networks. A vulnerability management program is a foundational program for Information Security for keeping up with assets and vulnerabilities associated with them. The amount of time available to patch a system before being exploited is less and less each year. “Half of the CVEs exploited in 2014 fell within two weeks” – Verizon DIBR for 2015. Come hear from this panel discussion of what works for Vulnerability Management programs, presented by the ISACA Anchorage Chapter.
Moderated by: Mack Avery II – President, ISACA Anchorage Chapter
Panelists for this discussion will be named soon. Please check back for updates!
In this second installment of our Executive Panels, you will hear from some of the top IT Executives in the area discuss important issues facing IT Professionals in the State, including:
• Security: What is the IT role in cyber security?
• How is IT an enabler to the organization?
• How can we be doing more with less, considering Alaska economy and oil prices?
• What is cloud and its benefits?
• Monitoring data – what it means to your customers
Aurora David • VP, IT Alaska Communications
Patrick Shier • CIO, Vice Provost University of Alaska Anchorage
Rick Kessler • CIO, Chenega Corporation
Stephen Shobe • Director, IT – Akeela
Debbie Shannon • Director, IT – Beacon OHSS
Attend this panel focusing on the Project Management aspect of IT. You plan projects, you come across challenges, now learn answers to questions like:
• How do we insure that we are covered for Exit Clauses, Indemnification, Regulatory Compliance / Security, and Bandwidth?
• What are the metrics we use for buying, building, and renting?
• What are the PROS and CONS?
Moderated by: Jim Bates • President/CEO, Business Improvement Group / Former CIO, State of Alaska
Chris Kehoe • Cyber Security Engineer Lead, Alyeska Pipeline Services Company
Chris Smith • Director, Operations / CIO, Southcentral Foundation
JP Vasseur • Chief Architect Self Learning Networks, Cisco
State of Alaska CISO Chris Letterman will offer his views on why the fundamentals must be top of mind for today’s security professional. Staggering resources are being allocated all across private industry and government agencies, yet outcomes seem to indicate failure to improve. Why?
Attend this informative session learn answers to questions like, Are you suffering from security spending paralysis? Why limitless funding will never fix your most risky cybersecurity problems. Simple, low investment solutions should be at the top of your strategy. How winning support for security means being relevant and relevance means value.
Chris Letterman is the current CISO for the State of Alaska. After attending the University of Louisville, he joined the US Navy and served in the Naval Security Group Command specializing in communications security. After leaving military service, Chris worked for various communications companies in Alaska before joining state service in 1998. Since being at the State of Alaska, he has served on Lieutenant Governor Ulmer’s Security and Privacy committee – which was the first formal push to establish statewide information technology security and privacy policies. He led the state’s Security Functional Work group for many years and helped with the development of the Security Framework for establishing the ISMS for Alaska Executive branch. While involved in these pursuits, Chris also served as the Department Information Technology Manager for the Alaska Department of Education and Early Development. It was there that he intertwined new hire on-boarding with mandatory Security Awareness training before it was cool, implemented the first department Firewall DMZ internal external topology, and adopted hardened desktop and server images into standard operating procedures. In 2007, he moved to the Department of Health and Social Services taking on the challenge of formally establishing the department’s security and privacy office. Serving as the HSS Chief Security Officer, Letterman hired staff, established security policies, and brought needed leadership and attention to HIPAA, Privacy, and Security at the agency. In 2009, he left state service and accepted a position as Vice President for Information Technology at a regional financial institution only to find his way back to start service, and in 2013 was promoted to CISO.
Letterman holds CISM, CRISC, and CGEIT certifications from ISACA, has appeared in SC Magazine, and was recognized as an ISE Security Executive of the Year Nominee in 2010. He can be reached at Chris.Letterman@Alaska.gov
Join us for an exploration into the mind of a hacker and how to stop them. We’ll cover best security practices from securing your wireless, what to address with your network users, addressing the APT kill chain, and more.
Companies looking to succeed in 2016 and beyond are changing the IT model from order taking and trouble shooting to a strategic business partner. Successful organizations are shifting the conversation from IT costs and service levels to how technology can be leveraged to gain a competitive advantage.
Information security is in a perpetual struggle for resources and attention. However, comprehension is what causes the most trouble. As security practitioners, it is not enough for us to implement security controls or write policies. We must communicate the complexities of risk to executives who do not have information security experience.
Current risk management practices are too dense, complex, and arcane for most business leaders. When leaders do not understand the threats the business faces, they cannot make informed decisions about how to respond. Likewise, they will reject sound risk management practices in favor of knee-jerk reactions and “silver bullet” solutions, which can exacerbate the risk landscape.
We need a new way to communicate risk to leadership. We need a way that condenses risk into simple, easy to understand structures. We need language that business leaders can implicitly understand. Moreover, we need to dramatically accelerate the risk assessment process to put actionable intelligence in front of leadership before the threat landscape changes.
In this presentation, veteran security leader, as well as a chief executive officer, Andrew Plato will discuss how to use business risk intelligence (BRI) to improve the conversation with leadership. We will discuss why current methods are failing, and how we can reorganize security data into structures that executives can use to fuel better decision making.
In the last several years, flash storage has become increasingly common in the data center. However, due to the relative high cost and other factors, only a small percentage of the overall capacity deployed within the data center is flash. Hybrid storage arrays combine a small amount of flash for caching, or as a high-speed tier and hosts can utilize flash for localized performance, or to cache reads off an external storage array. While flash does provide very high performance compared to a magnetic hard drive, there are many unique challenges to flash that must be overcome; such as managing write endurance. The recent introduction of a new generation of storage architectures designed specifically for flash, along with the ongoing innovation from flash vendors, is making the all-flash data center affordable in 2016.
“Come one, come all! You won’t believe your eyes! Not for the faint of heart! Enter the darknets if you dare!”
The terms “darknets” and “darkweb” are being tossed around a lot, but what exactly do these terms mean? How does it work? Can you really find anything in the seedy underbelly of the internet? How anonymous is the darknet? How much of the darknets is just the urban legends of our time? These questions and more will be answered in this interactive tour of the darknets!
The problem of third party risk has gotten the attention of security professionals, executives, and boards of directors. Peter H Gregory discusses the nature of third party risks and steps organizations can take to identify and manage the risks associated with third parties.
Think the landmark Target uber-breach of Christmas 2013: When millions of customers’ credit cards were compromised and cost Target $162 million dollars. PCI compliance is vital to the long-term success of all companies who process card payments. There are tangible threats and real vulnerabilities that could potentially impact the organization negatively. Ask yourself, could your organization fully recover from a data breach when the loss is greater than the data itself? Following PCI security standards is just good business. Such standards help safeguard healthy and trustworthy payment card transactions for everybody worldwide that uses their cards every day.
Industry Experts will highlight the ways networking and security are coming together in this age of the New IP. Infrastructure is a strategic resource in mission critical networks and in the data center. Listen to how machine learning will be important to providing a framework for security being built in and not bolted on, laying a foundation for an open and agile network.
In this session, you will hear more about:
Businesses of all sizes face similar challenges keeping up with technology: shrinking budgets, increased user demands, and a shortage of trained IT staff. Learn about approaches to insulate your business from shifting IT requirements and how you can better focus on critical projects to increase profitability.
Today, all business need to share huge amounts of content, videos, photos, and documents without the loss of quality, and they need it shared now to colleagues down the hall or across the country. The massive storing, accessing, and distributing of this content can be challenging. Shipping a disc or hard drive is not safe or fast. There is a better way. We have good news — for the first time, you can reach the Cloud from Alaska.
It’s 2016, but organizations still struggle to deliver consistent and predictable performance for their cloud and virtualized applications. Even with advances in flash technology, storage remains designed for physical, not virtual, workloads, and it shows with unpredictable performance, difficult troubleshooting and fragile scalability. Storage needs to be aligned to virtualization, but what is VM-Aware Storage besides a buzzword? We will investigate the five requirements of VM-Aware Storage, and which technologies enable those requirements.
No one thinks they need disaster recovery until they do. The fact is that most “disasters” and datacenter outages are not caused my hurricanes or severe weather. Random power outages, human errors and many other non-weather factors are the typical causes of service interruptions. Join us to see the results of a survey of IT professionals just like you and learn:
We will cover two use cases which outline gaps in their DR strategy and how you are able to overcome these gaps. Join us to learn more!
With the recent rash of high profile security attacks in the industry the question is raised as to whether your IT security is fit to handle breaches of that magnitude or whether you’re merely practicing security theater. This presentation goes behind the scenes to address whether ‘compliant’ means secure, how to look beyond the ‘checkbox’ and how to provide a comprehensive secure environment with actionable threat intelligence to quickly identify and mitigate events as they’re occurring.
Join us for an interactive discussion and review of current pain points in providing secure and manageable access to devices brought from home or used by guests. As an answer to the problem, Aruba will explain ClearPass, a vendor-agnostic and complete authentication, access, BYOD, on-boarding, posturing and guest management system that works on any wired or wireless network.
Join us for an introduction of this remarkable new platform, built on a single software code base that gives you the freedom to design your business communications system any way you choose: as a managed service from the cloud, as an internally-managed hardware system, or as a hybrid of the two.
Enter the cloud-enabled campus—a powerful conduit between the enterprise network edge and the cloud. Providing a common, unified network that supports a diverse set of devices, applications, people and things, the cloud-enabled campus delivers highly available access to resources in the cloud, data center, or WAN—with reliability and scalability to fuel your business growth. Join Juniper Networks for a presentation on building a next-generation network that seamlessly connects devices, applications, people and things in campus and branch environments.
There are several steps that IT departments can take to gain control of SaaS usage. Join us for an illuminating demonstration of Aperture, a SaaS security solution from Palo Alto Networks that will show you how to empower your workers while protecting corporate data.
|Adam Paulick||Director, Infrastructure Services||University of Alaska, Anchorage|
|Alan Fisher||Manager, Information Technology||ARCTEC Alaska|
|Aurora David||Chief Information Officer||Alaska Communications|
|Ben Craig||Chief Technology Officer||Northrim Bank|
|Bev Stocker||Information Technology Manager||MTA Telco|
|Bill Jacob||Chief Information Officer||ASRC|
|Bill Khoe||Manager, Information Systems||Matanuska Valley Credit Union|
|Bill Rosetti||Chief Information Officer||Alyeska|
|Bill Sorrells||Chief Executive Officer||Sorell & Associates|
|Bill Yockell||Director, Strategy and Architecture||Providence Health and Services|
|Brian Hippel||Chief||Defense Information Systems Agency Pacific|
|Brian Metras||President||AIIM, Anchorage Chapter|
|Brian Noonan||Director, Information Technology||Altman Roger & Co.|
|Chris Doucette||Information System Security Officer||Southcentral Foundation|
|Chris Farmer||Director, Information Technology||City of Valdez|
|Chris Javier||Manager, Information Technology||Galena City School District|
|Chris Letterman||Chief Information Security Officer||State of Alaska|
|Colin Underwood||Healthcare Program Manager||Alaska Communications|
|Dali Osmane||Manager, Information Technology||Ravn Alaska|
|Damien Hull||Information Technology Manager||Tikigaq Corporation|
|Dan Monarch||Director, Information Technology||Matanuska Telephone Association, Inc.|
|Dana Gonderzik||Information Systems Auditor II||Alaska USA|
|Darrell Aldridge||Computer Security Manager||Credit Union 1|
|David Brand||Chief Information Officer||673 Civil Engineer Group|
|David Edge||Information Technology Security Manager||US Bureau of Land Management|
|David Elder||Sr. Project Manager||GCI|
|David Roes||Manager, Information Technology||Christian Health Associates|
|Debbie Shannon||Chief Information Officer||Carlisle Trucking|
|Doug Adams||Chief Digital Officer||Anchorage Museum at Rasmuson Center|
|Doug Miller||Sr. Management Consultant||Wostmann & Associates|
|Finn Rye||Information Security Officer||Matanuska Telephone Association|
|Greg Burns||President||SQL/Sharepoint Users Groups|
|Hugh Towe||Manager, Information Technology||State of Alaska Fish and Wildlife|
|Irene Houdek||Director, Information Technology Services||Alaska Christian College|
|Jack Johnson||Director, Technical Services||Anchorage School District|
|Jason Cheney||Special Agent/InfraGard Coordinator||FBI|
|Jason Christy||Director, Information Technology||Copper River Seafoods|
|Jason Tompkins||Chief Information Officer||JBER|
|Jason Williams||Vice President, Information Technology Audit||Geneva Woods Health Services|
|Jerry Tibor||Manager, LAN||University of Alaska – Anchorage|
|Jim Bates||Chief Information Officer||State of Alaska|
|Jim Henry||Manager, Operations||Tex R Us|
|Joe Carlton||Director, Telecom & Network Infrastructure||Alaska Railroad Corp.|
|Joe Michael||Supervisor, Information Technology||Altman Rogers & Co.|
|John Baley||Acting Chief Information Officer||NANA Corp.|
|John Emery||Director, Information Technology||St. Elizabeth Ann Seton Catholic School|
|John Ramey||Senior Vice President, Information Technology||Alaska National Insurance|
|John Tibor||President||Network Users Group of Alaska|
|Jorge Matute||Manager, Information Technology||Shoreside Petroleum.|
|Justin Michaud||Senior Program Analyst||Mat-Su Borough School District|
|Karl McLaughlin||Sr. Vice President, Information Technology||Afognak Native Corporation|
|Kenneth Kanack||Manager, Information Technology||TerraSond Limited|
|Koenraad Adams||Chief Information Officer||Adams IT|
|Kris Brewster||Manager, Information Technology||Alutiiq, LLC|
|Lance Ahearn||Chief Information Officer||Municipality of Anchorage|
|Lance Johnson||Vice President, Information Technology Audit||Denali Federal Credit Union|
|Mack Avery||President||ISACA – Anchorage Chapter|
|Mark Beckmann||Manager, Information Technology||Alaska Gasline Development Corporation|
|Mark Geuss||Manager, Information Technology||Kakivik|
|Mark Merchant||Chief Information Security Officer||Municipality of Anchorage|
|Mary Bradley||Deputy Director, Network Enterprise Ctr.||United States Army|
|Michael Mayfield||Manager, Information Technology Systems||Bristol Bay Resource Solutions|
|Natalia Newman||Chief||59th Signal Battalion|
|Nathan Zierfuss-Hubbard||Chief Information Security Officer||University of Alaska|
|Niel Smith||Director, Information Technology||Bristol Alliance of Companies|
|Pamela McFarland||Manager, Information Technology Systems||Chugach Government Services|
|Pat Berry||Vice President, Chief Audit Executive||Credit Union 1|
|Pat Shier||Chief Information Officer||U. of Alaska Anchorage|
|Patrick Gray||Director, Information Technology Operations||McKinley Capital Management LLC|
|Ravnit LaChapelle||Manager, Risk||Alaska Gasline Development Corporation|
|RC Woodson||Chief Information Officer||Doyon Limited|
|Rick Reese||Director, Enterprise Infrastructure||NANA Development corp.|
|Rob Barnett||Director, Information Technology||Olgoonik Development, LLC|
|Ryan Haller||Senior Systems Administrator||US Bureau of Safety &Environmental Enforcement|
|Sam Blankenship||Technology Director||City of Bethel|
|Sandy Knechtel||Account Executive||Gartner Group|
|Scott Denton||Chief, Systems Operations Division||National Weather Service|
|Selena Dobbs||Data Manager||State of Alaska|
|Shannon Wold||Information System Mgr.||SCA Alaska Surgery Center|
|Stan Halfacre||Chief Information Officer||Matanuska Electric Association|
|Stephen Shobe||Director, Information Technology||Akeela|
|Steve Smith||Network Services Manager||Fairbanks North Star Borough|
|Terrance Pearson||Systems/Communications Manager||Anchorage Power & Light|
|Terri Walker||Manager, Information Technology S Security||Northern Air Cargo|
|Terry Ameline||Manager, Information Technology||CRW Engineering Group, LLC|
|Terry Swenor||Director, Information Systems||Alaska Child and Family|
|Thor Ryan||Department Security Officer||Alaska Dept of Health & Social Svcs.|
|Tom Carrell||Chief Information Officer||Udelhoven Companies|
|Tom Remaklu||Chief Information Officer||Alaska Home Finance Corp.|
|Tony Vita||Data Processing Manager II||State of Alaska|
|Travis Johnson||Manager, Information Technology Systems||Southcentral Foundation|
|Ubon Boutsomsi||Vice President, Information Technology||Petro 49, Inc.|
|Ulf Asplund||Technical Services Manager||Alaska Court System|
|Viji Srinivasan||Data Processing Manager||ETS, Dept. of Administration, State of Alaska|
Dena’ina Convention Center
600 W. Seventh Avenue
Anchorage, AK 99501
The parking fee in EasyPark garages and Pacillo Open-to-the-Public hours is currently $1 per hour.
JC PENNEY’S (580 SPACES)
Entrance: On Sixth Avenue, one way driving East, immediately past E street between, E & D Streets, to the South (right), OR On E Street, one way driving North, immediately past the alley, between Sixth & Seventh Avenues, on the East (right)
Exit: Onto D Street driving either direction, between Sixth & Seventh Avenues, North or South
Hours: Open 24 Hours
FIFTH AVENUE (1,160 SPACES)
Entrances: On B Street driving either direction, between Fifth and Fourth Avenues, on the East, OR On Fourth Avenue driving either direction, between B and C Streets, on the South
Exit: Onto C Street driving one way South (left) only, between Fourth & Fifth Avenues, OR Onto Fourth Avenue driving either direction, between B and C Streets, East or West, OR Onto B Street driving either direction, between Fourth & Fifth Avenues, North or South
Hours: Open 24 Hours
SIXTH AVENUE (570 SPACES)
Entrance: On H Street driving either direction, adjacent to the alley, between Sixth and Seventh Avenues, to the East
Exit: Onto G Street driving one way South (right) only, between Sixth and Seventh Avenues
Hours: Open 24 Hours
SEVENTH AVENUE (471 SPACES)
Entrance: On G Street one way driving South, immediately past the alley to the West (right), between Sixth and Seventh Avenues
Exit: Onto H Street driving either direction, North or South, between Sixth and Seventh Avenues
Hours: Open 24 hours