It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
Cyber criminals are mounting attacks on your wired and wireless networks with increasing sophistication, using coordinated means to gain access to your network from any and every connection. Organizations of all sizes need a solution that utilizes a holistic approach to security from the network to the endpoint. Learn how you can leverage world class solutions to detect, prioritize, and enable immediate action to stop malware attacks. Don’t just think there might be a problem, know if there is with industry-leading solutions that help illuminate your endpoint, detect and correlate threats, and protect your most important assets.
Even if we focus on the nuanced sophistication of external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply insufficient to combat new and evolving attacks; no human cyber analyst can watch or react quickly enough. In order to avoid full-blown crises, a new fundamental approach to cyber defense is imperative in order to detect and investigate preexisting threats inside the network.
Self-learning systems represent a critical step-change in automated cyber defense. Organizations around the world rely on these systems, which can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s “patterns of life.” Hence, such security systems can spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
What is the current state of security? With the growing attack surface and high incentives to hackers, what is the best approach to protecting the increasingly complex network? We’ll talk about what attacks are most common and what measures you should consider to prevent and combat them.
Designing your security architecture can be a daunting task. Let’s face it, you can’t do everything. Budgets are a reality that all IT professionals deal with. You need to protect your most valuable assets and protect against the biggest risk. Join the INTERFACE Advisory Council for an interactive panel discussion. Bring your questions as we discuss the design of your system all the way through the details of daily engineering.
The proliferation of cybersecurity risks and threats presents significant challenges for small and medium sized businesses, which do not have the security budget to addresses all potential challenges. By applying a risk based approach, and utilizing fundamental security principles, small and medium sized businesses can present a harder target for cyber-attacks. This presentation will provide information on the current small and medium sized business cyber risk environment, and then discuss mitigations strategies for budget conscious companies and organizations.
Traditionally speaking, winning is done on the field in sports. That said, when the caliber of a sport reaches entertainment-industry status, the steps taken to win the game are more involved and complex than ever. Competition is always fierce, and technology is playing a pivotal role in the evolution of sports. From scouting methods to skill development, to the multiuse application of data analytics, and even to the theatrics of gameday fan experience, technology is a pervasive and vital player in sports’ success. Join Brian Keys for a look into how the Cincinnati Reds are utilizing technology to continually improve all aspects of the organization on and off the field.
Brian Keys, the VP of Technology for the Cincinnati Reds, will present this year’s keynote. Now in his fourteenth season with the Reds, Brian manages all Reds technologies (including the major league team, six minor leagues clubs, and all network/computing infrastructure for the club’s facilities in Arizona and the Dominican Academy. Brian’s mastery of technology is multifold; he is not only responsible for all information security, application development, and the Reds Analytics development and hardware/ software deployment, but also runs the ticketing systems CRM system, audio/video systems, and fan experience technologies.
As enterprises look at IT playing a broader role around digitalization using next generation workloads, including cloud-native applications and DevOps, they should consider how technologies such as software-defined infrastructure and cloud can drive real-world benefits. Learn how IT can move away from traditional environments to transformational data center technologies and product innovations, including hyper-converged infrastructure and onward to Enterprise Clouds, to handle all their existing and emerging applications and business needs with clear agility, productivity and availability/security benefits.
Join your peers from the IT industry to discuss the ingredients of the new Enterprise Cloud infrastructure and a wide variety of other topics, including:
• Infrastructure to enable DevOps for a modern application life cycle
• Ability to innovate with flat IT budgets while continuing to align IT resource to business imperatives
• Building business cases and managing stakeholders for new initiatives
The shift to cloud is on. The challenge is to adopt the right mix of cloud models for your organization. Public cloud is setting the pace with agility and scale, and that has inspired a few myths (that we’ll de-bunk). Can private cloud and the IT department keep pace? We’ll make the case for a building block architecture — introducing public cloud-like web services in your data center. We will share the stories of organizations that have deployed this type of enterprise cloud to guarantee performance, enable self-service, quiet shadow IT and manage a massive footprint with a fraction of the effort.
We will cover the key characteristics of great Wi-Fi, what to consider when evaluating Wi-Fi, some common pitfalls to avoid during planning and design, how to securely on-board mobile devices and finally a look toward the future of Wi-Fi including 802.11AC Wave 2 and beyond!
Virtualization, the cloud, and the promise of containers have evolved the data center, bringing both better application delivery and cost reduction. However, with these benefits come new risks which include increased East/West traffic and the potential for new cyber threats. Adaptive micro-segmentation is transforming and improving security inside the data center and clouds while speeding up app delivery.
There are plenty of lists which share best practices in the many areas of the modern data center. But where are the lists of pitfalls to avoid? What do you need to know (about what NOT to do) so that you can ensure the highest levels of availability? Attend this session from Veeam with Dan Weisseg and learn practical immediate tips on how to increase your data center availability. Takeaways from this webinar include: identifying data surfaces that may be missing from your backup strategy, a list of pitfalls to avoid from the changes in the modern data center, and free tools for increasing your data center availability.
Cyber Threats are only increasing. Attackers are shifting their tactics as we shift our security strategies. Join us for a discussion about the every changing threat landscape and how you can more effectively protect your company from these threats. In this session we will talk about how cyber threats increased in 2016, where attackers are shifting to, and what industry experts are recommending to address these shifts.
|Allison Shubert||SVP. Senior Application Security Architect||Citigroup|
|Andrew Seitz||Vice President, Information||AFCEA|
|Andy Willingham||Chapter Leader||OWASP|
|Andy Gill||Assistant Vice President & Director (IT Audit), Internal Audit||Western and Southern Financial|
|Brandon Crowley||Chief Data Officer||City of Cincinnati|
|Brian Keys||Vice President of Technology||Cincinnati Reds|
|Brian Cunningham||Governance Manager||American Financial Group|
|Casey Marquette||Senior Director, Information Security||CVS|
|Diana McGhee||Director of Technology and Information||Director of Technology and Information|
|Grant Jacoby||Deputy Chief Informaiton Security Officer||Fifth Third Bank|
|Hubert Kirchgaessner||CISSP||The Procter & Gamble Company|
|Jason Allerding||Vice President, Information Technology||Parts Express|
|Karl Hart||Information Security Manager||Pure Romance|
|Karl Treier||Chief Technology Officer||OrthoLive|
|Kristy Calhoun||VP of Professional Development||PMI|
|Mark Ruble||Director, Information Technology||iMFLUX|
|Nick Ritter||Deputy Chief Informaiton Security Officer||Fifth Third Bank|
|Randy Smith||Director of Information Technology||Clark Schaefer Hacket|
|Rick Mattingly||Manager, Information Systems||The Kroger Co.|
|Sharon West||Board Member||DAMA|
|Stephen Hahn||Global Information Technology Leader||Michelman|
|Steve Casson||2nd Vice President, Enterprise Infrastructure||Ohio National Financial Services|
|Suresh Manchella||Director, Information Technology Infrastructure & Security||Apex Supply Chain Technologies|
Duke Energy Convention Center
525 Elm St,
Cincinnati, OH 45202
The Duke Energy Convention Center is located on 525 Elm Street, Cincinnati, OH 45202. The main entrance to the Center is located at the intersection of Fifth Street and Elm Street in downtown Cincinnati, just off I-75 (exit 1B) and I-71 (US 50 exit from I-71 South).
The Duke Energy Convention Center’s main entrance is located at the intersection of Fifth Street and Elm Street in downtown Cincinnati. Over 5,000 parking spaces are located immediately surrounding the Center in metered street spaces, private flat lots and privately managed garages. The garages offer direct entry to the convention center via Cincinnati’s Skywalk System.