It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
Most of today’s malware is polymorphic and highly adept at changing its identity to evade standard, signature-based security platforms. Alone, these platforms will not recognize many of these threats. Advanced persistent threats, or APTs, increase the threat level by employing sophisticated evasion capabilities to get payloads past a network’s defenses where they persist, undetected. APTs are targeted to an organization or a specific technology and often leverage zero day vulnerabilities – flaws for which no patch is available and no signature has been written. Any organization can become a victim.
With new breaches reported nearly every day, IT professionals have an increasing list of security challenges to deal with. Join us for a session designed by the INTERFACE-Iowa Advisory Council. This panel will cover topics around security training in the disciplines of identity management, secure software development, and cyber threat intelligence sharing and usage.
Tammi Reyes • Operational Risk Manager, Wells Fargo Home Mortgage
Steve Peterson • Program Coordinator, Iowa Public Radio
Bruce Forshay • IT Manager, Mason City Clinic
John Baldwin • Manager, IT Architecture & Projects
You know it’s not a question of IF your systems will fail, but WHEN. What you struggle with is finding the necessary budget for Disaster Recovery (DR) and convincing top level management that DR is a necessity, not a luxury. Security and Disaster Recovery often go hand-in-hand. Often what begins as a security concern can lead into a need for resolution through DR. The panelists for this discussion are comprised of DR and Security experts and will discuss two scenarios to illustrate the use-case for DR in a way that management will be receptive, and how to strategically approach the conversation to ensure your vision for DR is heard.
Jeff Franklin • Deputy Chief Information Security Officer for the State of Iowa, Office of the Chief Information Officer (OCIO)
The Office of the Chief Information Officer is the department responsible for managing and delivering infrastructure services to State agencies, establishing standards, reviewing, and governing all information technology procurements and projects.
Darwin Larrison • Chief Information Security Officer for UnityPoint
Darwin Larrison joined UnityPoint Health as Corporate Information Security Officer on December 11, 2014. Previously, Darwin was the Director of Information Protection for FBL Financial Group (the Public Company side of the Iowa Farm Bureau). Darwin currently serves as the Chairman of the Technology Association of Iowa CISO Roundtable, and is an active member of Infragard Iowa and the Information Systems Security Association. He is also a sitting member on the Symantec Healthcare Advisory Board.
Denny Fisher • Senior Consultant of Risk Management for ACS
As Senior Consultant of Risk Management for ACS, Denny advises companies across the Midwest on best practices for Disaster Recovery, IT Risk Management, and Managed Services. Prior to his time at ACS, Denny was the CIO for one of the top lumber wholesale companies nationwide. As CIO, he transformed the way his company recognized DR-related expenditures, transitioning them from an IT budget expense to a corporate Insurance expense.
According to a recent report from Forrester, more than half (57%) of CISOs from large organizations are mainly tech-focused, and a similar amount report into IT (56%), leaving only around 4% of technology decision-makers that have a more rounded, non-technology centric view of security and risk.
The reality is, CISOs must now more than ever before, consider overall business risk, crisis communications, internal marketing, metrics, budget and organizational design. This article will focus on specific ways the role of the CISO is shifting and how CEOs, advisory boards and CISOs themselves can pivot to incorporate and seize on this new executive role for a more secure organization.
As the CISO for Optiv, Jonathan Trull is responsible for working with Optiv’s growing customer base todevelop and share security best practices, researching real world threats and collaborating on how to address them. Before joining Optiv, Jonathan was the CISO for the State of Colorado, where he oversaw the information security operations for 17 executive branch departments, encompassing approximately 26,000 employees and 150,000 systems. In cooperation with federal and state partners, Jonathan formed the State’s first Cyber Crime Task Force, which is charged with conducting criminal investigations into computer crimes, developing and sharing cyber intelligence, and working with local government and private sector partners to increase cyber resiliency.
Jonathan is a Certified Information Systems Auditor, Offensive Security Certified Professional, and holds a master’s degree from the University of North Texas. He is a frequent speaker at security events such as RSA and Gartner and was recently named by the SANS Institute as one of the 2013 People Who Made a Difference in Cyber Security. Jonathan also serves his country as a cyber warrior in the U.S. Navy Reserves.
Most recently, Jonathon has become a member of the Colorado Cyber Sub-Committee of the Homeland Security and All-Hazards Senior Advisory Committee.
Secure enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. Protect against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.
In this session, we will discuss a platform approach to securing enterprise identities and:
• Discover a new way to protect against the #1 point of attack in data breaches
• Defend both end users & privileged users with a single platform solution
• Centralized authentication, authorization, policy, and auditing for IT resources
• Establish Identity as the new perimeter across cloud, mobile, and data center.
The top causes of downtime are everyday events, like power failures and IT hardware failure…not natural disasters. These happen daily, and cause enormous headaches and huge costs for companies of all sizes.
There are 4.6M instances of data loss each year, and an average downtime cost of $5,600 each minute. How confident are you in your strategies and technologies?
Davenport Group and Dell will cover key steps to take to ensure your data is backed up properly, and how to develop a solid disaster recovery plan, including:
– Quantifying the cost of downtime and how much data can you afford to lose, to justify 2016 DR projects.
– Segmenting your data among static, business vital and mission critical applications, then creating a DR plan to match each segment.
– Building a defense-in-depth approach, leveraging snapshots, replication, local backups and offsite/cloud options.
– Conducting on-going tests to verify backup accuracy/integrity, and more importantly, complete data recoverability.
We will cover two use cases which outline gaps in their DR strategy and how you are able to overcome these gaps. Join us to learn more!
Organizations have a responsibility to their stakeholders to prepare for unforeseen risks to continued operations. Chris Sevey, Enseva’s Owner and CTO, will discuss the trend of combining business continuity and disaster recovery plans collaboratively rather then developing them in isolation.
We’ll discuss the technology hype and true trends that affect datacenters long-term. He’ll discuss how enterprises are choosing to backup their data in the cloud with an overview of disaster recovery with real world company examples; providing benefits of developing a business continuity plan. The objective of this session is to begin to formulate a clear strategy that minimizes downtime and maximizes migration to the cloud.
|AJ Boonstra||Information Technology Network Engineer||Medical Associates|
|Brian Larkin||Business Information Security Officer||The Principal Financial Group, Inc.|
|Bruce Forshay||Information Technology Manager||Mason City Clinic|
|Bryan Dreiling||Business Services||Office of the CIO, State of Iowa|
|Chad Larson||Information Technology Manager||Nyemaster Goode|
|Cyndi Chizek||Manager, Information Technology||TeamQuest Corporation|
|Darwin Larrison||Corporate Information Security Officer||Unitypoint Health|
|David Birchmier||Chief Executive||ASKMPA.COM|
|Duke Burrell||Chief Information Officer||Dept. Of Public Defense, State of Iowa|
|Heather Gray||Director, Information Technology||Iowa Association of Realtors|
|Jeremy Witte||Information Technology Director||Mittera Group|
|Jon Brantner||Systems Support Technician||Earl May Seed & Nursery|
|Josh Holst||Vice President, Information Systems||Hills Bank and Trust Company|
|Kenny Nedder||Information Technology Manager||Pella Corp|
|Kim Balk||Information Technology Manager||Ahlers&Cooney, P.C.|
|LeAnn Ely||Information Technology Director||Diversified Management Services|
|Lee Weers||Director of IT Infrastructure||Central College|
|Magda Dabrowska||Systems Adminstrator||Bank Iowa|
|Mark Wiseley||Chief Information Officer||Palmer College of Chiropractic|
|Mike Johnson||Information Technology Manager||Don Hummer Trucking|
|Nate Olson-Daniel||Principal Engineer||LightEdge|
|Randy Ratekin||Business Continuity Manager||Shazam Network|
|Roni Argetstinger||Technology Manager||Diocese of Des Moines|
|Ryan Sinnwell||Manager, Infrastructure||The Weitz Company|
|Steve Petersen||Program Coordinator||Iowa Public Radio|
|Steven Larson||Bureau Chief, Enterprise Application||Office of the CIO, State of Iowa|
|Ted Hughes||Vice President, Information Services||American Equity|
|Todd Struthers||Information Technology Manager||Des Moines Area Regional Transportation|
Iowa Events Center
Grand Ballroom A
730 Third Street
Des Moines, IA 50309
From Interstate 35 from the North
Follow I-235 West into downtown Des Moines and take the Third Street exit to the Iowa Events Center. Parking is available on-site, with additional street and ramp parking within walking distance.
From Interstate 35 from the South
Merge onto I-235 East exit and travel east towards downtown Des Moines. Take the downtown exit and proceed to the Third Street exit. Parking is available on-site, with additional street and ramp parking within walking distance.
From Interstate 80 from the East
Headed west on I-80, take the I-235 West exit and continue towards downtown Des Moines. Take the 3rd Street exit (Downtown Des Moines) and go south to the Iowa Events Center complex. Parking is available on-site, with additional street and ramp parking within walking distance.
From Interstate 80 from the West
Headed east on I-80, take the I-235 East exit and continue towards downtown Des Moines. Take the Iowa Events Center exit (Third Street) and turn right. Parking is available on-site, with additional street and ramp parking within walking distance of our complex.