It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
Unite Private Networks will provide an overview of the benefits and features of Dark Fiber. In this presentation you will also learn about leveraging Dark Fiber to optimize a Wide Area Network.
When it comes to cybersecurity, the threat landscape is changing every day. From ransomware attacks to the security of the Internet of Things, there’s a lot to take in. Let our experts break it down for you. Join Kaspersky to learn about trends from the past year and predictions for the future of cybersecurity. This talk will give you a sharper focus on how to protect your business and how to plan for your future IT security needs.
Innovation Matters. Without innovation IT is stuck in the 80/20 rule. IT can’t keep up with data demands, data protection and data mobility. Innovation is important to IT as we try to help reduce costs and manage data.
There is a significant push in the market for ‘digitization’ of everything. This is demonstrated by the digitization of our personal information, from fitness to social engagements, to how companies communicate with market – on demand digital insights, and personalized curated products. In all these, there is one aspect common and constant: Digital Economy is a Connected ‘Cyber’ Economy. Digitization means nothing in itself unless it is connected and sharing, and that’s where the Cyber aspect comes. Digital economy is usually enabled by the scale and flexibility of cloud. This brings in the cloud aspect of all things Digital. Together Cyber and Cloud make for a heady mix of challenges. In this session we will discuss a number of issues related to cloud security requirements for the digital economy and explore on the solution options that exist.
Moderated by Val Mukherjee, CISSP, CRISC
Founder & Chairman, Cyber Future Foundation
Chairman, Cloud Security Alliance NT
Executive Director, Cyber Advisory, EY
Harold Collum • Chairman, Cyber Crime Committee, North Texas Crime Commission
James Carpenter • CISO, Texas Scottish Rights Hospital
Matt Fearin • CISO, Epsilon
With new breaches reported nearly every day, IT professionals have an increasing list of security challenges to deal with. Join us for a session designed by the INTERFACE-Dallas Advisory Council. This panel will cover topics around security training in the disciplines of identity management, secure software development, and cyber threat intelligence sharing and usage.
Moderated By: JP Hill • President, ISC2 Dallas-Fort Worth Chapter
Gregory Wilson • Head of Information Security, 1st Global
John Jordan • Security Architect, IT, Texas Instruments
Stephen Pettit • DMTS, Verizon
Let’s take your Wheaties and Cheerios’ off the table, and then remove your eggs & bacon. Following that, we’ll take your glass of water and your heat (no tea, coffee or gas fireplace…let alone central heating). Quite simply, if your capabilities to provide for yourself don’t extend beyond the keyboard, you should come to this talk with a bottle of BBQ sauce and a self-adhesive sticker. Be prepared to lather yourself in the sauce and scribe “eat me” on the label. Accept you are nothing more than a walking snack for the rest of us.
We started by focusing on extending research we’d done a few years ago on crop production…and ended up removing all the basic survival requirements for the civilized human race.
If you think you understand the world of IT security, you’re probably only scratching the surface. Yesterday’s normal doesn’t cut it in today’s environment, and what does work today will be of little service in the future is what you will typically hear from Chris Roberts – One of the world’s foremost authorities on IT Security. His presentation is great a mix of dry wit and humor, with a slap to the face dose of reality. Entertaining and engaging, you’ll be sure to walk away with a new way to look at IT and the world around you.
Venture Capital money is pouring into companies that promise “next generation” endpoint capability. Us security professionals know that “next gen” is just a marketing term. So what is the reality? This presentation will examine real life attacks on machines with different endpoint technologies and view the efficacy against undetected malware. We will also discuss example requirements to determine when and if evaluating these new tools make sense for your
Unlike other storage systems on the market today, Datrium’s server powered storage solutions split server-powered speed from appliance- based durable capacity, dramatically simplifying storage performance management while reducing costs. Performance is offloaded to the host, can be isolated to the host, and can scale with commodity SSDs directed by DVX Hyperdriver software. Writes go synchronously to a network attached storage appliance, the NetShelf, where data is kept durable, allowing servers to be stateless for easier host administration. Storage is agile and simple to operate as VMs, providing radical improvements in price/performance for enterprise workloads. Come visit us to learn more!
Most of today’s malware is polymorphic and highly adept at changing its identity to evade standard, signature-based security platforms. Alone, these platforms will not recognize many of these threats. Advanced persistent threats, or APTs, increase the threat level by employing sophisticated evasion capabilities to get payloads past a network’s defenses where they persist, undetected. APTs are targeted to an organization or a specific technology and often leverage zero day vulnerabilities – flaws for which no patch is available and no signature has been written. Any organization can become a victim.
Modern elastic cloud infrastructure is fundamentally breaking traditional security approaches. Public cloud has no natural perimeter and network segmentation leaving individual cloud servers exposed. In private cloud, malicious East-West traffic inside the network is a serious threat. As new workloads are added and retired dynamically, change control becomes more difficult, and updating granular firewall rules and security policies becomes a risky, manual process. Join us and learn the 6 Critical Criteria to secure your public, private or hybrid cloud – on-demand, anywhere, at any scale.
Even with a focus on business outcomes, many technology decisions are still made short-sided without ensuring the purchase is future-proof and modular enough to meet future needs. Cloud-based security has inherent flexibility that can meet security objectives while also enabling IT and business strategy.
In today’s world of security breaches that cost companies millions, understanding how incidents can occur gives insight into protecting the network and managing risk. With the number of incidents on the rise, it’s no longer an option to simply be content with mitigating a breach after the fact, you must also detect any breaches of security before they can cause damage and prevent further intrusions.
The Engineers at Fortinet will walk you through the life cycle of advanced threats, pointing out their common methods of avoiding detection. Additionally, you’ll be shown how a proper security framework gives you multiple options to detect and mitigate an attack before it has the opportunity to inflict damage; costing you time, money, and public confidence.
No one thinks they need disaster recovery until they do. The fact is that most “disasters” and datacenter outages are not caused my hurricanes or severe weather. Random power outages, human errors and many other non-weather factors are the typical causes of service interruptions. Join us to see the results of a survey of IT professionals just like you and learn:
We will cover two use cases which outline gaps in their DR strategy and how you are able to overcome these gaps. Join us to learn more!
It’s 2016, but organizations still struggle to deliver consistent and predictable performance for their cloud and virtualized applications. Even with advances in flash technology, storage remains designed for physical, not virtual, workloads, and it shows with unpredictable performance, difficult troubleshooting and fragile scalability. Storage needs to be aligned to virtualization, but what is VM-Aware Storage besides a buzzword? We will investigate the five requirements of VM-Aware Storage, and which technologies enable those requirements.
Demand for storing and processing information is at historic levels, while vendor selection and management of those resources seems to be becoming more complex. While Flash storage is currently very popular, emerging technologies such as NVMe and Machine Learning further complicate the goal of ensuring that your datacenter is “future ready”.
During this topic we will discuss: emerging technologies, popular models for staying ahead of resource demands, explore the differences between “easy to use” and “easy to consume”, while ultimately learning how to predictively keep the hunger for more resources under control.
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why unsupervised machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
|Adam Billmeier||Information Technology Solutions Manager||Landmark Structures|
|Ayman Kawache||Vice President, Information Technology||Andrews Logistics, Inc|
|Bob Carver||Manager, Network Security||Verizon|
|Debi Lohr||Information Security Officer||Trintech|
|Dione McBride||Information Security Officer||Sabre Holdings Corporation|
|Drew Robertson||Vice President, Information Technology||Mideval Times|
|Earl Shipman||Information Technology Director||City of Cedar Hills|
|Frank Day||Vice President||AITP|
|Geoff Hughes||Program Manager, Information Security||Capegemini|
|George Turrentine||Manager, Information Security||Verizon|
|Gregory Wilson||Head of Information Security||First Global|
|Harish Rajagoplan||Senior Director||Quadrant 4 System Corporation|
|Jason Penney||Director, Information Technology & Security||Press Ganey|
|Jeanie Anirudhan||Information Technology Manager||Texas Instruments|
|John Jordan||Security Architect, Information Technology||Texas Instruments|
|John Woods||Vice President, Information Security||PDX-NHIN|
|JP Hill||President||ISC2 Dallas|
|Justin Moret||Manager, Information Technology Audit||Baylor, Scott & White Health|
|Kelly Short||Vice President, Program Management||JP Morgan Chase|
|Lon Fairless||Director, Information Technology||City of Carrollton|
|Marius Bratan||Programs Director||NTX ISSA|
|Mark Craig||Information Security GRC||Texas Health Resources|
|Michael Cole||Chief Information Security Officer||First Finanical Bank|
|Nadim Kathree||Manager, Information Technology Security||Dallas Independent School Dist.|
|Randolph Lopez||Executive Director||JP Morgan Chase|
|Robert Polvado||Associate Director||Verizon|
|Ron Dinwiddie||Chief Information Officer||Texas Trust Credit Union|
|Scott Geye||Risk Advisory Services||Whitley Penn|
|Scott Jersa||Information Technology Director||Carlson Capital|
|Stephen Pettit||Distinguished Member of Technical Staff||Verizon|
|Tuck Goh||Manager, Information Security||Santander Consumer USA|
From DFW International Airport
From Love Field Airport
For more information, please visit: