It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
Ransomware is a growing threat to business operations and reputation. In this presentation, Matt Burns will address how business continuity and disaster recovery technologies can help to provide protection against such attacks.
Every day seems to bring with it news of another ransomware attack or a new strain of the malware. It seems likely too, that there are a lot more incidents than we read about. There have been incidents where companies paid up rather than openly declared they had been targeted and that their data had been at risk. The simple fact is that ransomware attacks are working. Data is one of the most important assets an organization has and the price of paying the ransom is often lower than losing the company’s data, reputation and possibly the entire business. With strains evolving in sophistication and now reportedly capable of encrypting an entire network, no company is safe sticking to the narrow view of ‘keep the virus out’.
When it comes to cybersecurity, the threat landscape is changing every day. From ransomware attacks to the security of the Internet of Things, there’s a lot to take in. Let our experts break it down for you. Join Kaspersky to learn about trends from the past year and predictions for the future of cybersecurity. This talk will give you a sharper focus on how to protect your business and how to plan for your future IT security needs.
Jennifer Skjellum, President of TechBirmingham and INTERFACE-Alabama Advisory Council member, will moderate this discussion to help identify and bridge communication gaps in the workplace. This panel will cover strategies for putting together an enterprise communication strategy, ensuring an effective cross generational communication plan and techniques for aligning technical and business goals for maximum success.
Annie Allen • President of iSeek Solutions, Inc.
Kevin Hicks • VP of Information Technology at M.J. Harris Construction Services, LLC.
Denise Jeffries • SVP Enterprise Data Service at Regions Financial Corporation
Cyber Insurance – How much do you need? What types do you need? You’ve been hit, now what do you do? Join one of INTERFACE-Alabama’s Advisory Council members, Steve Nickolson, as he moderates this discussion with his panel of experts to help frame a detailed picture of Cyber Insurance.
Moderated by: Steve Nickolson • Senior Vice President IT at ServisFirst Bank
Katie Merriman • Manager, Information Security at Blue Cross Blue Shield of Alabama
Jennifer Bolling • Cyber Liability Regional Director at Arthur J. Gallagher & Co.
Daniel Clemens • Founder and Chief Innovation Officer at ShadowDragon
James Brittle • Insurance and Risk Management at Arthur J. Gallagher & Co
Come join 2014 Triumph Innovation Award Winner, Joan Hicks, as she questions: “Why on Earth would I want to be a CIO?”. Joan is the Chief Information Officer at the University of Alabama at Birmingham Health System – one of the nation’s largest premier academic health centers in America. From demand management, constant cyber-attack threats, to work/life balance, Joan will touch on some highs and lows while giving you a peek into her “calling” as UAB Health System’s top information leader.
Joan Hicks has over 40 years of healthcare leadership experience in the areas of information technology and information management. In December 2004, Joan became the Chief Information Officer for UAB Health System. Additionally, Joan served as the Privacy Officer for UAB and UAB Health System. During that time, she established HIPAA Compliance program for UAB and UAB Health System including policies, procedures, training and education for 10,000 staff members within the covered entities and developed a standard process for Accounting of Disclosure and Notice of Information Practices for all Health System Entities thus allowing patients to sign one Acknowledgment for the Health Services Foundation and University Hospital.
Joan had worked as Director of Medical Information Services for Children’s Hospital of Alabama, served as Senior Consultant for HMA, member of the faculty for the Health Information Management Program at UAB and had been the Director of Medical Records, Utilization Review, Medical Staff Services, DRG Coordination, Hospital-wide JCAHO Coordinator, Quality Improvement, Social Services, Discharge Planning, Medical Library Services and Risk Management for Cullman Medical Center.
Joan earned a Master of Science degree from UAB in Health Informatics and an undergraduate degree in Health Information Management, also, from UAB.
In today’s world of security breaches that cost companies millions, understanding how incidents can occur gives insight into protecting the network and managing risk. With the number of incidents on the rise, it’s no longer an option to simply be content with mitigating a breach after the fact, you must also detect any breaches of security before they can cause damage and prevent further intrusions.
The Engineers at Fortinet will walk you through the life cycle of advanced threats, pointing out their common methods of avoiding detection. Additionally, you’ll be shown how a proper security framework gives you multiple options to detect and mitigate an attack before it has the opportunity to inflict damage; costing you time, money, and public confidence.
CIO’s and IT Professionals continue to share the same challenges and concerns year after year. In fact, the recent Forbes “Top Ten CIO Concerns for 2016” was also titled “IT’s Déjà Vu All Over Again”. With a specific focus on the ever competitive storage industry, we will review those concerns and discuss how IT professionals can help break this cycle. The goal is to help IT Professionals understand how they can help keep storage vendors focused on delivering more valuable solutions to the industry, while overcoming the ongoing challenges through advances in technology and services. Topics will include:
Dasher Technologies will be presenting a basic overview of SDN applied to a campus environment. We will also be covering a basic overview of hyper-connected computer as well as levering these technologies to reduce complexity and adding reliability & maintainability while reducing cost.
Cyber-attacks were once mainly the concern of governments, large corporations and other highly visible networks. Not anymore. The financial rewards generated from the theft of credit card information and other sensitive data gave rise to a new breed of malware, the polymorphic threat, and with it, the amount of malware has skyrocketed.
Most of today’s malware is polymorphic and highly adept at changing its identity to evade standard, signature-based security platforms. Alone, these platforms will not recognize many of these threats. Advanced persistent threats, or APTs, increase the threat level by employing sophisticated evasion capabilities to get payloads past a network’s defenses where they persist, undetected. APTs are targeted to an organization or a specific technology and often leverage zero day vulnerabilities – flaws for which no patch is available and no signature has been written. Any organization can become a victim.
In the last few years, ransomware has taken the cybercrime world by storm. CryptoWall 3.0, one of the most lucrative and broad-reaching ransomware campaigns, was alone responsible for 406,887 infection attempts and accounted for about $325 million in damages in 2015.1 According to the Institute for Critical Infrastructure Technology, ransomware promises to wreak more havoc in 2016. While individual users were once the preferred target of ransomware, perpetrators have increasingly set their sights on businesses and organizations. You can bet that with larger targets, the ransom demands will increase accordingly.
Are you prepared for such an attack? Learn how ransomware can impact your business and why legacy security solutions don’t stand a chance against such threats.
|Andrew Martin||Manager, Information Systems||Milo’s Tea Company|
|Annie Allen||Owner and President||iSeek Solutions, Inc|
|Ben Whorton||Director, Information Systems||Birmingham-Southern College|
|Chris Barnett||AVP IT Infrastructure and Operations||Red Diamond, Inc.|
|Chris Mathews||Director, Information Technology||Trinity Contractors|
|Chris Parton||Chief Information Security Officer||BlueCross BlueShield of Alabama|
|Curtis Carver||Vice President and Chief Information Officer||University of Alabama at Birmingham|
|Dale Callahan||Director/Professor||University of Alabama at Birmingham|
|Dan Levine||Chief Technology Officer||GISinc.|
|David George||Manager, Workstation Configuration||BlueCross BlueShield of Alabama|
|Denise Jeffries||Senior Vice President Enterprise Data Service||Regions Financial Corporation|
|George Lasseigne IV||Director of Technology||Warren Manufacturing|
|Jesse McKneely||Assistant Vice President, Information Technology||Birmingham-Southern College|
|Jon Corliss||Executive Director, Infrastructure Effectiveness||University of Alabama at Birmingham|
|Josh Torres||In-House Counsel||Hibbett Sporting Goods, Inc.|
|Kevin Hicks||Vice President, Information Technology||M. J. Harris Construction Services, LLC|
|Kevin Ray||Director, Information Technology||O’Neal Industries|
|Kevin Sena||Chief Executive Officer/Owner||Viperline Solutions|
|Mervyn Chapman||Director, Information Security||Surgical Care Affiliates|
|Michael Stoeckert||Chief Technology Officer||ProAssurance|
|Michelle Alexandra||Chief Financial Officer||Mileage Trakker|
|Neil Gilbert||Manager, Software Development||Children’s of Alabama|
|Paige Boshell||Partner||Bradley Arant Boult Cummings LLP|
|Patrick McLoughlin||Director of Information Technology Operations||NaphCare, Inc.|
|Rob Ferrill||Chief Information Security Officer||UAB Health Systems|
|Scott McGlaun||Chief Information Officer||BlueCross BlueShield of Alabama|
|Sri Karra||Chief Information Officer||City of Birmingham|
|Stephen Pratt||Senior Security Systems Engineer||Sentar, Inc.|
|Steve Nickolson||Senior Vice President, Information Technology Director||ServisFirst Bank|
|Terry Maples||Manager, Information Technology||Covenant Bank|
2101 Richard Arrington Jr. Boulevard North,
Birmingham, Alabama 35203
There is onsite parking available at the venue. Self-Park is $12/day and valet parking is available for $22/day.