It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
The traditional WAN was not designed to keep up with today’s modern workforce – there are people who expect robust access to apps and data regardless of location, time of day or device. To satisfy end-user demands, and to stay competitive in the marketplace, many organizations are eager to optimize application delivery to remote branches and mobile workers. Historically, this has also meant significant cost.
Today, Software-Defined WAN helps IT approach these challenges with a vision for a service delivery network “fabric” that can transparently aggregate and deliver services across enterprise data centers and external clouds. SD-WAN ensures the user experience at the branch and mobile level are just as rich and seamless as at headquarters. Because SD-WAN reduces bandwidth requirements and simplifies branch networking, it’s cost-effective. Attend this session and learn why SD-WAN technology makes so much sense for business.
When it comes to cybersecurity, the threat landscape is changing every day. From ransomware attacks to the security of the Internet of Things, there’s a lot to take in. Let our experts break it down for you. Join Kaspersky to learn about trends from the past year and predictions for the future of cybersecurity. This talk will give you a sharper focus on how to protect your business and how to plan for your future IT security needs.
Join us for an exploration into the mind of hackers and how to stop them. We’ll cover best security practices; from securing your wireless, to what to address with your network users, to addressing the APT kill chain, and more.
With new breaches reported nearly every day, IT professionals have an increasing list of security challenges to deal with. Join us for a session designed by the INTERFACE-Boise Advisory Council. This panel will cover topics around security training in the disciplines of identity management, secure software development, and cyber threat intelligence sharing and usage.
Moderated By: Bob Duker • Director of Services, Advotech Consulting
Rachel Zahn, Cybersecurity Unit Manager, Idaho Department of Labor
Vince Skinner, President, Boise ISSA Chapter
Kathy Bacon, Risk & Bank Security Officer, Idaho Trust Bank
All those vendors that tell you that “there is no silver bullet” and “we are not doing enough” and “we need to do more because the ‘bad guys’ are doing more… Well, they’re right-ish. So what’s the answer? Well…to “the cloud” my good man, and be quick about it!
Come join the discussion on a real life cloud adventure. We will check in on month 17 of a local small business who made the jump. Hear all about what worked, what didn’t, and how you too can be part of the 21st century’s latest technological wonder. All the cool kids are doin’ it… I’m just sayin’…
An effective information security program is standards based, integrated into organizational long-term objectives, properly resourced, and has executive sponsorship. Even with these critical elements present, information security programs fall flat because of organizational inertia. Security professionals frequently blame resource constraints and often ignore the negative impacts outdated values and traditions have on the program. These values and traditions together with the organization’s established systems, assumptions, and habits form its culture. Cultural changes are often required in order to implement an effective information security program. Because these type of changes are some of the most difficult challenges an organization will ever face, leveraging industry and government compliance requirements to enable a cybersecurity centric culture is critical.
Prior to joining the State of Idaho as the Chief Information Security Officer (CISO), Tom Olmstead provided cybersecurity instruction to graduate and undergraduate students as an adjunct professor for the DeVry & Keller Universities. Tom has over 20 experience supporting a myriad of IT domains including information security accreditation, systems engineering and IT program management. As CISO, Tom sets strategic security direction, develops and implements information security policies and promotes information security compliance and collaboration among State agencies. Tom has a Master’s Degree in Information Security and Assurance and holds numerous industry certifications (PMP, GSLC, CCNA, ITILv3, G-2700, CEH, CHFI, and SSCP).
There are two key elements to a successful security program: policies and tools. Without good policies, tools cannot be used to maximum efficiency. Without good tools, policies cannot be implemented. If these two spheres are not in unison, one or the other becomes untenable. Tools without context are not useful and policies without implementation are just ideas. Using first-hand experience and giving concrete examples seen from a managed security services perspective, Andy Hutchinson will talk about some of the common gaps that may occur in practical applications.
It’s 2016, but organizations still struggle to deliver consistent and predictable performance for their cloud and virtualized applications. Even with advances in flash technology, storage remains designed for physical, not virtual, workloads, and it shows with unpredictable performance, difficult troubleshooting and fragile scalability. Storage needs to be aligned to virtualization, but what is VM-Aware Storage besides a buzzword? We will investigate the five requirements of VM-Aware Storage, and which technologies enable those requirements.
As your organization implements more and more digital channels for customer service, how do you keep up with ensuring your contact center is aligned, integrated, and in sync with your organization’s digital strategy?
Come hear how Campus Networks are evolving to be managed by the cloud for both wired switching and wireless access points. Learn more about how enterprises and public agencies with staffing constraints can benefit from the ease of use and resiliency that comes from cloud enabled networking.
Innovation Matters. Without innovation IT is stuck in the 80/20 rule. IT can’t keep up with data demands, data protection and data mobility. Innovation is important to IT as we try to help reduce costs and manage data.
Despite the differences in vertical sector between banks, governments, retail, and manufacturing customers, education has the same technology needs as all of these organizations. The ironic thing is that having more Information Security funding alone does not help these organizations keep their networks secure and their data from being ex-filtrated. Our nation’s top industries continue to be targeted for attacks with numerous breaches disclosed throughout the year.
In each case of these recent breaches, the organizations had the tools, technology, and information security resources to detect, prevent, and respond to such attacks. Nonetheless, cyber-attacks on corporate, government, and critical infrastructure is on the rise. Securing the network, perimeter, and data center is the same as in other industries. Come learn best practices Check Point’s leading experts acquired from helping secure our customers’ networks for two decades and how to best apply them in today’s networks.
No one thinks they need disaster recovery until they do. The fact is that most “disasters” and datacenter outages are not caused my hurricanes or severe weather. Random power outages, human errors and many other non-weather factors are the typical causes of service interruptions. Join us to see the results of a survey of IT professionals just like you and learn:
We will cover two use cases which outline gaps in their DR strategy and how you are able to overcome these gaps. Join us to learn more!
In recent years, government and commercial organizations have placed significant focus on establishing state-of-the-art, intelligent information networks to thwart ever-evolving security threats and attacks. It is no longer acceptable for cyber to be a reactive game. Government and commercial agencies can’t afford to wait for the next attack to determine what security measures need to be put into place. The key to hunting and mitigating unknown threats is establishing a proactive defense—knowing your network inside and out to actively prevent security vulnerabilities and risks.
In today’s threat landscape all data is security relevant, thus a new approach to understanding networks is required. It is imperative for government and commercial agencies to employ continuous, shared operational and situational awareness to fully comprehend their network infrastructure as there are different views for each user level. Ingestion of cyber intelligence from any source is necessary to anticipate at risk systems on a network and proactively defend them. IT security teams must also leverage analytics to discover critical systems on a given network to help visualize and monitor system components separate from the rest of the network. These efforts will further facilitate indications and warnings of an attack based on external data sources and internal signaling between security devices across the enterprise. Understanding data’s value is imperative to address challenges and determine valuable solutions that are necessary to achieve a stable security infrastructure.
Simplicity is often the best policy. Whether creating a mobile app or implementing a new IT budget, simplicity tends to get the best and fastest results. When it comes to disaster recovery and preparedness, a simple plan is the easiest to follow through on in a quick and efficient manner. With the right solution for data protection, a business can integrate email, social media, customer service, and communications with its disaster recovery efforts. This way, when it comes time to return to operations following a failure, staff members will remember what to do and will do it quickly.
Keeping disaster recovery efforts simple — and remembering the simple things when implementing these plans — is a sure way to keep employees comfortable during a crisis, make recovery efficient, and reduce resulting downtime throughout the process. With simplicity comes results, and when trouble strikes, that is what a business needs most: positive results.
Join us as we discuss the current security threat which made major breaches of 2015 possible, and the practical steps which organizations must take to defend themselves. Organizations are spreading their efforts too thin by scattering their defenses too distant from the primary target. The primary target of modern attackers is sensitive, private DATA. Imperva will be sharing over a decade of experience gained from working with Universities, State and Local Governments on DATA security, audit, and governance challenges.
In this discussion, we will present an overall framework for governing access, monitoring activity, and implementing effective security around your critical or private DATA.
In this session, we’ll go over key points for securing guest wireless, reducing the daily effort involved in providing guest wireless, and reducing end-user frustration with wireless services.
Every business today relies on applications to support business critical processes, and these applications, in turn, rely on rapid and timely access to data from the underlying infrastructure. When something in the infrastructure layer slows down the applications, it can negatively impact business outcomes – better known as the App-Data gap. This presentation will discuss the infrastructure complexities that drive the App-Data gap and how, through Predictive Analytics and a Unified Flash Fabric, organizations can understand the data derived from applications, compute, networking, storage, converged infrastructure themselves and turn it into meaningful action.
The world of Identity Management is dangerously fragmented and needlessly complex. Don’t settle for half a solution when you need full protection for both end users and privileged users. Secure enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. Protect against the leading point of attack used in data breaches compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.
In this session, we will discuss a platform approach to securing enterprise identities and:
Our apologies, but there are currently no details available for this presentation. While attending the event, please be sure to listen to our announcements and check the mobile app for updates.
This session will show attendees how flash technology in the datacenter is transforming applications, performance, and the financial impacts of this revolution. This presentation will demonstrate the impact that legacy storage platforms have on your applications, and how the next generation of all flash arrays address the shortcomings of disk technologies. We will also attempt to dispel some of the myths that make customers hesitant to seek out all-flash alternatives to traditional storage arrays.
In today’s world of security breaches that cost companies millions, understanding how incidents can occur gives insight into protecting the network and managing risk. With the number of incidents on the rise, it’s no longer an option to simply be content with mitigating a breach after the fact, you must also detect any breaches of security before they can cause damage and prevent further intrusions.
The Engineers at Fortinet will walk you through the life cycle of advanced threats, pointing out their common methods of avoiding detection. Additionally, you’ll be shown how a proper security framework gives you multiple options to detect and mitigate an attack before it has the opportunity to inflict damage; costing you time, money, and public confidence.
|Adam Reno||Information Technology Infrastructure Services Manager||City of Boise|
|Bob Duker||Director of Services||Advotech IT Consulting|
|Bob Geddes||Chief Information Officer||State of Idaho|
|Bob Tanabe||Manager, Voice Networks||Boise Inc|
|Brad Frazer||Partner||Hawley Troxell|
|Brandon Cheyney||Information Technology Manager||City of Nampa|
|Brian Currin||Information Technology Operations Manager||Boise School District|
|Dan Bond||Manager, IS Systems Engineering||Boise Inc|
|Danny Rowell||Program Manager||Rampart Research|
|David Wentland||Information Technology Resource Manager||Idaho State Tax Commission|
|Dennis Elledge||Chief Information Officer||City of Nampa|
|Devin Throngard||Manager, Information Technology||Hawkins Companies LLC.|
|Doug Ooley||Director of ITGRC/Cybersecurity||Boise State University|
|Fred Warr||Information Technology Director||College of Idaho|
|Herman Doering||System Information Security Officer||St. Luke’s Health System|
|Jared Mattravers||Manager, Information Technology Data Center||St. Luke’s Health System|
|Jerry Hindberg||Associate Director, Network Support Services||Lewis-Clark State College|
|John Sacchi||Manager, Information Security||CSHQA|
|Jon Spence||Information Technology Network Analyst||Idaho State Liquor Division|
|JR Tietsort||Chief Information Security Officer||Micon Technology|
|Kathy Bacon||Risk & Information Security Officer||Idaho Trust Bank|
|Ken Malach||President||CRI Advantage|
|Kenneth Duran||Computer Specialist||US Bureau of Reclamation|
|Kristopher Wilson||Program Manager||Anderson & Wood Construction|
|Larry Sweat||Information Technology Manager||PERSI|
|Laura Hill||Branch Chief, Information Technology||US Forest Service|
|Laurel Caldwell||Information Technology Manager||Latah County|
|Lisa Schoenfelder||Enterprise Project Manager||City of Boise|
|Marlin Snyder||Director, Information Technology||Beef Northwest Feeders|
|Mary Howard||Director, Information Technology||Shoshone-Paiute Tribes|
|Michael Heywood||Information Security Officer||Blue Cross of Idaho|
|Michael Rowell||Vice President, Information Technology||Turn-Key Medical, Inc.|
|Morgan Poyser||Information Systems Manager||Preco Electronics|
|Patrick Abernathy||Director, Information Technology||Jacksons Food Stores|
|Patti Henderson||Information Technology Director||Givens Pursley|
|Paula Williams||Information Technology Quality & Compliance Manager||Idaho Power|
|Rachel Zahn||Cyber Security Unit Manager||Idaho Dept. of Labor|
|Randy LaPorte||Systems Engineer||Sunwest Bank|
|Raul Pena||Information Technology Manager||Payette County|
|Rick O’Donnell||Supervisor, Information Technology||Keller Associates|
|Rody Cummings||Information Technology Director||Western Power Sports, Inc|
|Scott Knights||Senior Information Security Officer||Idaho Dept of Health and Welfare|
|Scott Wilson||Manager, Information Technology||Integrated Technologies|
|Shelby Weimer||Director, Information Technology||CradlePoint|
|Terrance Patternoster||Manager, Information Systems||Hawley Troxell|
From the Airport
Travel north on Vista Avenue for approximately 2 miles, you will loop around the historic Boise Train Depot, and will continue on as Vista turns into Capitol Boulevard. In approximately one mile, you will turn left on Front Street; go one block to the corner of 9th and Front Streets. The Boise Centre is on the right.
From I-84 West
Take I-84, the Downtown Boise exit, for approximately 5 miles to Capitol Boulevard, turn left, go one block to Front Street, turn left, go one block to the corner of 9th and Front Streets. The Boise Centre is on the right.
From I-84 East
Take the Broadway Avenue (Exit 54), go right. As you travel north for approximately 3 miles, go left on Front Street. Travel on Front Street for a little less than a mile, at the corner of 9th and Front, the Boise Centre is on the right.
Parking for events at the Boise Centre on the Grove is available at all public lots. Parking costs range from $2.50/hr to a maximum of $12.00/day. (First hour is Free).
For more information visit: http://boisecentre.com/directions/