It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
This session will discuss the current state of platform security, and explore alternative approaches proposed by leading members of the security industry. It will include discussions around Cloud, CASB, Google’s BeyondCorp framework, and others. The intent is to bring to light why so many industry leaders are calling for a new approach to security, and define what is needed in this new model.
When it comes to cybersecurity, the threat landscape is changing every day. From ransomware attacks to the security of the Internet of Things, there’s a lot to take in. Let our experts break it down for you. Join Kaspersky to learn about trends from the past year and predictions for the future of cybersecurity. This talk will give you a sharper focus on how to protect your business and how to plan for your future IT security needs.
Help your business mitigate the risk from Ransomware by learning how to minimize the risk of ransomware attacks on your IT infrastructure, together with tips and tricks for effective data protection, recovery and replication.
KJ Wilson • Sr. Information Security Analyst, Electronic Transaction Consultants
Dione McBride • Data Protection, Privacy, and Security Professional, PS Innovations
Gregory Streder • Internal Audit Manager, Sabre Holdings
Gregory Wilson • Head of Information Security, 1st Global
Scott Geye • Assessments and Compliance Consultant, Accudata Systems
Compliance is often defined as a systematic approach to governance and designed to ensure that an institution meets its obligations under applicable laws, regulations, contractual obligations, institutional policies, and best practices and standards. So, is a compliant organization more secure? And how does a U.S. organization demonstrate privacy compliance? This panel discussion will bring together business and technical stakeholders who will review common and unique challenges in global information security, privacy and compliance. This includes their experience and concerns as global regulations such as the Global Data Protection Regulation (GDPR) go into effect in the coming months.
John Woods • VP, Information Security, PDX-NHIN
Patrick Bouldin • Consultant, PDB IT Consulting
Jarrod Johnston • Vice President of Information Technology, PDX-NHIN
Kevin Dunn • Chief Information Officer, InRoll+
The Cloud Economics 101 group will discuss what cost factors should be considered when planning a cloud migration. We’ll talk about a few myth busters, some things that surprised us once we got into deployment, and what we did about them. Also, we’ll discuss a part of cloud that makes the economics much greater than you thought, such as the use of microservices and a server less REST API.
We are living in a very uncertain world, where every facet of business and society is subjected to disruptive trends. Digital technologies have not only given us amenities that has transformed the world around us, but they have also made information more accessible, at times to the wrong hands. While traditional enterprise information security has morphed in many ways to meet the current needs, there are too many moving parts around people, processes, and technology, with competing needs for attention and resources. This talk will discuss the various aspects of digital disruption and how businesses can elevate their cybersecurity posture to benefit from the digital innovation.
Valmiki (Val) is a globally recognized expert in cyber and cloud security industry with focus on innovation and collaboration to address the information security needs of the future. He is a Cyber Futurist, Diplomat and Evangelist who promotes international cooperation and collaboration on Trusted Cyber.
Val is considered an original thought leader in the domain of Cyber Peace and in 2014 established the Cyber Peace Alliance, a global think/do tank of cybersecurity and policy experts advancing the concept of a secure and trusted Cyberspace. In September 2015, Val founded the Cyber Future Foundation and its constituents including the Cyber Peace Alliance to take the initiative forward.
Val is known for his commitment to the information security community and is constantly engaged as a leader and contributor within many standards initiatives, security alliances and consortiums. Val is a leader in the Global Cloud Security Alliance community, founder of North Texas Regional Cloud Security Alliance Organization and also a member of NIST Standard Development Organization efforts.
Val is also one of the original SMEs of Cloud based Security as a Service domain and contributed directly to the growth and adoption of the domain through his involvement at the Cloud Security Alliance.
Val, in various progressive leadership roles, has served as a catalyst for many business and practices in the cybersecurity domain. Val is a visionary strategist who has helped leading global organizations with strategy & roadmap, cyber program management, and cyber transformation initiatives. He is a trusted advisor to the Boardroom, C-Suite and Executive owners of Cybersecurity, Cloud and Information Risk Management programs of several leading global organizations.
Specialties: Organization Building • Leadership Development in Cyber • International Relationships • Cybersecurity Subject Matter Expertise • Executive Strategy & Roadmap • Cyber Transformation Advisory • Policy Development
As corporations are moving to infrastructure service providers, line of business applications are also moving to the hosted cloud. The traffic patterns for today’s corporations are changing. Gone are the days of a central data center with a hub and spoke designed WAN with one Internet connection. Today the traffic patterns are different and the demands are higher for reliable efficient Internet services.
In addition, the volume of Internet traffic is growing exponentially and the size of Internet connections required for organizations to compete in this economy are growing at an increasing rate. The goal is to provide reliable services to the user at an affordable price to the organization. One of the keys to this solution is a new technology called software defined wide area network.
Come learn how this technology is helping to define the new corporate topography and help control Internet traffic.
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true Disaster Recovery for the business. What types of disasters will impact the business? Learn about Disaster Recovery scenarios, and also the questions to ask and answer when planning your Disaster Recovery solution to drive true IT resilience. Learn which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
The data storage market is going through tectonic shifts these days. Flash is being used to accelerate applications and IT leaders are moving from project based purchasing to building private clouds to concurrently hosting a multitude of applications. Join this session and learn how to take advantage of these changes; hear how IT leaders at a national credit union are consolidating workloads to increase IT agility while conserving budgets.
Year after year, the cybersecurity landscape continues to change for the worse, with more and more companies being breached and then pursued in legal and regulatory actions. If one thing has become certain, it is that cybersecurity has become a legal issue and an overall business risk, not just an information technology issue. While this may be the perfect scenario for selling FUD — fear, uncertainty, and doubt — there is hope, and that is where we should focus. In this presentation, we will discuss how cybersecurity professionals can help empower companies to do what is reasonable, even if they can’t do everything.
Using this backdrop, we will discuss several recent legal and regulatory compliance developments and examine how they encourage companies to take this reasonableness approach. We will also examine some of the more wide-reaching regulations that will be implemented in 2017 and 2018 and how they impact this approach. We will then discuss some critical action items to take from these that virtually all companies can implement to better prepare in this regard – especially if they find themselves in a breach situation.
Even if we focus on the nuanced sophistication of external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply insufficient to combat new and evolving attacks; no human cyber analyst can watch or react quickly enough. In order to avoid full-blown crises, a new fundamental approach to cyber defense is imperative in order to detect and investigate preexisting threats inside the network.
Self-learning systems represent a critical step-change in automated cyber defense. Organizations around the world rely on these systems, which can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s “patterns of life.” Hence, such security systems can spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
If you have a WAN infrastructure and are looking to control scalability, control network management as well as technology evolution and latency then Dark Fiber is worth consideration.
Virtualization, hyper-convergence, mobility, and cloud services are transforming IT in organizations world-wide, but far too many companies are being left behind as they cope with rigid legacy data center infrastructure built upon of standalone storage. This technical session will tackle traditional workloads, deploy new scale-out applications, simplify operations, reduce costs and make your data center infrastructure invisible by embracing these disruptive new technologies. The talk will also cover performance and availability best practices for storage, networking, and computer virtualization for high performance databases, applications, and server workloads, as well as explore a few examples of production deployments on HCI.
Geographically distributed enterprises are embracing SD-WAN at an accelerating pace. As applications continue to move to the cloud, networking professionals are quickly realizing that traditional WANs were never architected for a dynamic, internet-based environment and recognize that backhauling traffic from the branch to headquarters doesn’t make sense. Furthermore, end users often find their business apps run faster over their home Internet service, or even on their mobile device.
69% of organizations reported that they experienced attempted or successful data theft or corruption by corporate insiders during the prior 12 months. The threat to security and safety of the enterprise is now more than just the hacker from beyond network walls, but insiders already within them. Who are these insiders, what are their motives, and how can an organization prevent and monitor these threats? Join Andy Thompson of CyberArk to discuss all that and more – including a series of case studies centering on malicious insiders and corporate espionage that range from stealing industry secrets to physical damage to critical IT infrastructure. Learn about the defense of the “Insider Threat”, with a demonstration of the “Insider Threat kill-chain”, and discover the technical controls that need to be implemented to mitigate the risk of the “Insider Threat”. Employees are an organization’s weakest link, but with the proper prevention & monitoring insider threat can be defended against.
|Alan Chuang||Director, Information Technology||Trinity Consultants|
|Arnold Maki||Senior Investigator Asset Protection / Corporate Security||AT&T|
|Bob Carver||Manager, Network Security||Verizon|
|Colin Edgar||Information Security Manager||Pioneer Natural Resources|
|Cory Roese||Director, Information technology Infrastructure||CTI Foods|
|Debi Lohr||Information Security Officer||Trintech|
|Denis Sheridan||Chapter Leader||OWASP|
|Dione McBride||Data Protection, Privacy, and Security Professional||PS Innovations|
|Drew Robertson||Vice President, Information Technology||Medieval Times|
|Earl Shipman||Information Technology Director||City of Cedar Hills|
|Frank Day||Vice President||AITP|
|Garreth Cada||Manager, Information Technology||City Credit Union|
|Gary Petroski||Information Systems Security Officer||National Weather Service|
|Geoff Hughes||Program Manager, INFOSEC||Capegemini|
|George Turrentine||Manager, Information Security||Verizon|
|Glenn Johnson||Vice President, Information Technology Infrastructure||Howard Hughes Corp|
|Gregory Wilson||Head of Information Security||First Global|
|Hamid Khaleghipour||Director, Information Technology||City of Addison|
|Jaimin Shah||Information Security Officer||Greystar|
|Jeanie Anirudhan||Information Technology Manager||Texas Instruments|
|Jeff Shaffer||Manager||Price Waterhouse-Cooper|
|Jerry Lundy||Manager, Security Operations||Verizon|
|Jessie White||Vice President of Information Technology||Hill College|
|John Jordan||Security Architect, Information Technology||Texas Instruments|
|John Woods||Vice Presient, Information Security||PDX-NHIN|
|Johnny Berry||Solutions Architect||Verizon|
|Jomon Nadukkudiy||Seniorr Information Technology Architect||Verizon Communications|
|Joshua Tooley||Associate Director of Information Technology Support||TCU|
|JP Hill||President||ISC2 Dallas|
|Ken Comrie||Information Technology Director||Ameripipe Supply Inc.|
|Kevin Dunn||Chief Information Officer||InRoll+|
|Kim (KJ) Wilson||Senior Information Security Analyst||Electronic Transaction Consultants|
|Kumar Nandigam||Director||TEKPROS Inc|
|Lon Fairless||Director, Information Technology||City of Carrollton|
|Marco Thornton||Chief Information Officer||Baron & Budd|
|Mark Armour||President||ACP Dallas|
|Mart Nelson||Chief Technology Officer||Avistas|
|Michael Cole||Chief Information Security Officer||First Finanical Bank|
|Peter Beasley||Chief Technology Officer||Netwatch Solutions|
|Robert Polvado||Sr. Manager for systems security engineering||Verizon|
|Roberto Ruiz||Information Technology Manager for the Americas||Expeditors International|
|Sanjana Landry||Cyber Security Specialist||HPE|
|Scott Geye||Risk Advisory Services||Whitley Penn|
|Steve Pettit||Manager, Operations Information Technology – Applications Security||Verizon|
|Val Mukherjee||Executive Director, Cyber Advisory||Ernst & Young|
|Victor DeMaria||Director, Information Technology||America’s Auto Auction, Inc|
|Yoshi Salvat||Manager, Infrastructure Support||Expeditors International|
Irving Convention Center
500 W Las Colinas Blvd.
Irving, TX 75039
From DFW International Airport
From Love Field Airport
For more information, please visit: