It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
The world of Identity Management is dangerously fragmented and needlessly complex. Don’t settle for half a solution when you need full protection for both end users and privileged users. Secure enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. Protect against the leading point of attack used in data breaches compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.
In this session, we will discuss a platform approach to securing enterprise identities and:
When it comes to cybersecurity, the threat landscape is changing every day. From ransomware attacks to the security of the Internet of Things, there’s a lot to take in. Let our experts break it down for you. Join Kaspersky to learn about trends from the past year and predictions for the future of cybersecurity. This talk will give you a sharper focus on how to protect your business and how to plan for your future IT security needs.
Cyber-attacks were once mainly the concern of governments, large corporations and other highly visible networks. Not anymore. The financial rewards generated from the theft of credit card information and other sensitive data gave rise to a new breed of malware, the polymorphic threat, and with it, the amount of malware has skyrocketed.
Most of today’s malware is polymorphic and highly adept at changing its identity to evade standard, signature-based security platforms. Alone, these platforms will not recognize many of these threats. Advanced persistent threats, or APTs, increase the threat level by employing sophisticated evasion capabilities to get payloads past a network’s defenses where they persist, undetected. APTs are targeted to an organization or a specific technology and often leverage zero day vulnerabilities – flaws for which no patch is available and no signature has been written. Any organization can become a victim.
The changing IT landscape has reshaped the way in which we approach and maintain technology in organizations. Millennials are the most technologically savvy group to join the work force to date and leaders need to prepare and adapt to this fact of life. The evolution of IT will require leadership to be focused on emotional intelligence and keeping the attention of this highly adaptive workforce.
Bryce Arii • Senior IT Consultant/Advisory Council Member
Al Gardiner • Director of Information Technology, Inspirato
Let’s take your Wheaties and Cheerios off the table, and then remove your eggs & bacon. Following that, we’ll take your glass of water and your heat (no tea, coffee or gas fireplace…let alone central heating). Quite simply, if your capabilities to provide for yourself don’t extend beyond the keyboard, you should come to this talk with a bottle of BBQ sauce and a self-adhesive sticker. Be prepared to lather yourself in the sauce and scribe “eat me” on the label. Accept you are nothing more than a walking snack for the rest of us.
We started by focusing on extending research we’d done a few years ago on crop production…and ended up removing all the basic survival requirements for the civilized human race.
Yesterday’s normal doesn’t cut it in today’s environment, and what does work today will be of little service in the future, is what you will typically hear from Chris Roberts – One of the world’s foremost authorities on IT Security. His presentations are a mix of complex IT topics, combined with a dose of reality and topped off with dry wit and humor. Entertaining and engaging, you’ll be sure to walk away with a new way to look at IT and the world around you.
Hyperconverged infrastructure represents the logical next step in the evolution of infrastructure convergence. Hyperconvergence delivers simplification and savings by consolidating all required functionality into a single infrastructure stack running on an efficient, elastic pool of x86 resources. The underlying data architecture has been completely reinvented, allowing data management to be radically simplified. As a result, hyperconverged infrastructure delivers on the promise of the Software Defined Data Center (SDDC) at the technological level. It also carries forward the benefits of convergence, including a single shared resource pool. Hyperconvergence goes far beyond servers and storage, bringing into the convergence fold many services that make some legacy services obsolete.
Innovation Matters. Without innovation IT is stuck in the 80/20 rule. IT can’t keep up with data demands, data protection and data mobility. Innovation is important to IT as we try to help reduce costs and manage data.
It’s 2016, but organizations still struggle to deliver consistent and predictable performance for their cloud and virtualized applications. Even with advances in flash technology, storage remains designed for physical, not virtual, workloads, and it shows with unpredictable performance, difficult troubleshooting and fragile scalability. Storage needs to be aligned to virtualization, but what is VM-Aware Storage besides a buzzword? We will investigate the five requirements of VM-Aware Storage, and which technologies enable those requirements.
In today’s world of security breaches that cost companies millions, understanding how incidents can occur gives insight into protecting the network and managing risk. With the number of incidents on the rise, it’s no longer an option to simply be content with mitigating a breach after the fact, you must also detect any breaches of security before they can cause damage and prevent further intrusions.
The Engineers at Fortinet will walk you through the life cycle of advanced threats, pointing out their common methods of avoiding detection. Additionally, you’ll be shown how a proper security framework gives you multiple options to detect and mitigate an attack before it has the opportunity to inflict damage; costing you time, money, and public confidence.
The adoption of Software-as-a-Service and Cloud technologies is adding more pressure to Network Administrators who manage Wide Area Networks. More than ever before, end users expect to be connected at all times and have their applications load immediately. In this demanding environment, it’s important to quickly detect and troubleshoot network and application issues. A new breed of monitoring tools, based on active sensors, is deployed in today’s networks to simplify troubleshooting. In this session, we will review how Network Administrators can efficiently manage and support large and complex enterprise networks.
Usually when you hear someone talking about fast disaster recovery, they’re talking about fancy new technologies that give you a leg up on your recovery. Sure, virtualization, image-based backup, and cloud computing can all contribute to fast recoveries, but there’s something else you can do to make sure you have fast, reliable recoveries and it doesn’t cost you a dime. What is it? Creating solid documentation and using it to make a plan. In this presentation, we’ll show you how to actually do this, from start to finish.
Nabbing criminals would be easy if they just wore orange jumpsuits in public…but they don’t. Stopping malware is no different. Despite this fact, the majority of enterprises rely on security controls that have one shot at accurately separating good traffic from bad. This approach not only creates a significant point of failure, but the average enterprise has massive blind spots due to their network architecture, corporate policies and misplaced trust.
Security hygiene is a familiar topic to most security professionals. Yet, so few practitioners seem to have the time or resources to consistently keep up their organization’s hygiene. What’s worse, security vendors continue pushing a message that silver-bullet products replace the need for solid hygiene. Join Red Canary’s CTO Chris Rothe and Carbon Black VP of Threat Jim Treinen as they talk through the importance of secuirty hygiene and give you practical steps to improve your security.
The cost and consequences of downtime and lost data pose a significant challenge to ensuring business continuity and the availability of applications and data. Join us for a discussion on how to deliver Availability for the Always-On Enterprise through integration with your storage provider. This discussion will detail how an Availability Suite takes advantage of this integration and how your organization can leverage this to perform frequent crash-consistent and application-consistent storage snapshots. As well as replicate to a secondary array for lower a lower RPO, meet strict RTO’s by performing granular recoveries from snapshots on both primary and secondary arrays, and finally how backups from storage snapshots will significantly reduce the impact from data protection activities on production workloads.
No one thinks they need disaster recovery until they do. The fact is that most “disasters” and datacenter outages are not caused my hurricanes or severe weather. Random power outages, human errors and many other non-weather factors are the typical causes of service interruptions. Join us to see the results of a survey of IT professionals just like you and learn:
We will cover two use cases which outline gaps in their DR strategy and how you are able to overcome these gaps. Join us to learn more!
Data center storage is on the verge of another significant shift in architecture. Flash storage is now mainstream as evident from the availability of many flash storage arrays and the increase in server based flash that is leveraged within platforms such as hyper converged infrastructures (HCI). The shift is causing changes in economics – the cost of storage, performance – the placement of storage, and manageability – the administration of storage. Virtualization is driving this change with private cloud results driving the momentum. This session will review trends and developments in the data center storage solutions and how Datrium is working within this evolving open convergence technology base.
This session will show attendees how flash technology in the datacenter is transforming applications, performance, and the financial impacts of this revolution. This presentation will demonstrate the impact that legacy storage platforms have on your applications, and how the next generation of all flash arrays address the shortcomings of disk technologies. We will also attempt to dispel some of the myths that make customers hesitant to seek out all-flash alternatives to traditional storage arrays.
As enterprises look beyond traditional IT workloads including cloud-native applications and DevOps, they should consider how technologies such as software-defined infrastructure and cloud can drive real-world benefits. Learn how IT can move away from traditional environments to hyperconverged infrastructure and onward to Enterprise Clouds to handle all their challenging applications and business needs with clear agility, productivity and availability/security benefits.
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network – before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why unsupervised machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
Today, many organizations are faced with an urgent need to migrate to a modern desktop to ensure that they remain supported, secure and capable of consuming services in a rapidly changing world. In this presentation, we will discuss how simplifying Windows migration can help you with:
|Al Gonzales||Director, Information Technology||Great-West Financial|
|Al Gardiner||Director, Information Technology||Inspirato|
|Andy Atencio||Chief Technology Officer||City of Greenwood Village|
|Attilio Framarini||Cyber Security Project Manager||Regional Transportation District|
|Brett Grooms||Manager, Microsoft Platform Service||Pearson|
|Bruce Beam||Director, Information Security||CoreSite|
|Bruce Engelbert||Information Technology Director||Intermap Technologies, Inc.|
|Bryce Arii||Senior Consultant||Brycearii.com|
|Carl Mersman||Manager, Information Technology||Plaza Home Mortgage|
|Chris Steffen||Chief Evangelist-HPE Cloud Security||Hewlett Packard Enterprise|
|Chuck Steigerwalt||Information Tech Security Officer||Regis University|
|Clint Andrews||Director, Information Technology||City of Fort Collins|
|Dan Van Soest||Information Technology Director||Hall & Evans, LLC|
|Dan Park||Chief Information Officer||Virtual.com|
|Daniel Johnson||Chief Technology Officer||U.S. Department of Veterans Affairs|
|Darrell Oliphant||Manager, Information Technology||Collegiate Peaks Bank|
|David Arbaiza||Director, Information Technology||Venoco Inc|
|Diana Mitchell||Chief Information Officer||Harrison School District|
|Dona Stines||Director, Information Technology||Rampart Supply|
|Donald Lutz||Chief Technology Officer||Technetronic Solutions, Inc.|
|Elinor Gallelli||Information System Security Manager||USDA|
|Fernando Pedroza||Chief Information Security Officer||University of Colorado Health|
|George Craft||Director, Information Technology||Motorolla|
|Gyan Saxena||Chief Information Officer||DatamanUSA|
|Heather Hobson||FBI Denver InfraGard Coordinator||Denver InfraGard|
|Isaac Martinez||Chief Information Officer||Colorado Army National Guard|
|Jason Wilcox||Chief Information Officer||Chess, Inc|
|Jesse Egge||Information Systems Manager||MSI Tec, Inc.|
|Jim Creese||Assistant Information Technology Director||City Of Boulder|
|Joe Moll||Vice President, Information Security||Bank of America|
|John Nord||Manager, Information Technology& Business Systems||Corden Pharma Colorado|
|Katherine Pope-Hooper||Information Technology Director||Aurora School District|
|Keith Frambro||Director, Information Technology||Development Disabilities Resource Center|
|Keith Oligney||Manager, Information Technology Infrastructure||Denver Water Department|
|Kelly Fuller||CEO/Founder||Risx LLC|
|Ken Connors||Senior Director, Information Technology||CBR International Corp|
|Kirk Moore||Director, Information Technology||University of Colorado – Colorado Sprgs|
|Michael Zwarg||Manager, Information Technology||Knott Laboratory, LLC|
|Michael Schroeder||System Engineering Manager||Lewan Technology|
|Paul Langfield||Vice President, Information Technology||McWHINNEY|
|Randy Raitz||Manager, Information Technology & Operations||Ecovate d.b.a. ReadyTalk|
|Randy Kuehntopp||Information Technology Director||Colorado Imaging Associates|
|Ray Caplinger||Director, Network and Telecom||Colorado Springs School District 11|
|Rich Schliep||Chief Information Security Officer||CO Dept of State|
|Robert Beaman||Lead Systems Engineer||DirectNET|
|Robert Brady||Director, Information Technology||CRB Consulting Engineers|
|Sara Harmer||Program Manager||Office of the Clerk and Recorder|
|Shane Hasert||Director, Business Compliance||Randian|
|Stephen Swanson||Principal Engineer, InfoSec and Governance||WOW Inc.|
|Terry Read||Director of Computer Services||Cimarex Energy|
|Thomas Clark||Chief Technology Officer||Elk Creek Computers|
|Tim Roundy||Director Information Security||TeleTech|
|Tim Budzon||Director, Information Technology||Wendy’s of Colorado Springs|
From Denver Airport
Take the ramp onto Peña Blvd
Merge onto I-70 W, Take exit 274 toward Colo Springs,
Follow signs for I-25 S
Keep right at the fork, follow signs for 38th Ave/Park Ave
Keep right at the fork, follow signs for Park Ave/Downtown and merge onto Park Ave W
Continue onto 22nd St
Slight right onto Broadway
Slight right onto Champa St
Turn left onto 14th St
Destination will be on the right
Take the exit onto I-25 S toward Denver
Take exit 213 toward 38th Ave/Park Ave
Keep left at the fork, follow signs for Park Ave/Downtown and merge onto Park Ave W
Continue onto 22nd St
Slight right onto Broadway
Slight right onto Champa St
Turn left onto 14th St
Destination will be on the right
Turn left to merge onto I-25 N
Take exit 210A for US-40/US-287/Colfax Ave
Turn right onto U.S. 287 S/US-40 E/W Colfax Ave
Turn left onto Kalamath St
Continue onto Stout St
Turn right onto 14th St
Destination will be on the right
Park up to 8 Hours: $12.00
Park up to 12 Hours: $15.00
Park up to 18 Hours: $17.00
Park up to 24 Hours: $25.00
For more information visit: http://denverconvention.com/attend-an-event/