It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
In today’s world of security breaches that cost companies millions, understanding how incidents can occur gives insight into protecting the network and managing risk. With the number of incidents on the rise, it’s no longer an option to simply be content with mitigating a breach after the fact, you must also detect any breaches of security before they can cause damage and prevent further intrusions.
The Engineers at Fortinet will walk you through the life cycle of advanced threats, pointing out their common methods of avoiding detection. Additionally, you’ll be shown how a proper security framework gives you multiple options to detect and mitigate an attack before it has the opportunity to inflict damage; costing you time, money, and public confidence.
When it comes to cybersecurity, the threat landscape is changing every day. From ransomware attacks to the security of the Internet of Things, there’s a lot to take in. Let our experts break it down for you. Join Kaspersky to learn about trends from the past year and predictions for the future of cybersecurity. This talk will give you a sharper focus on how to protect your business and how to plan for your future IT security needs.
There is an ancient Chinese proverb that states: “When the winds of change blow, some build walls, others build windmills.” This is a perfect guiding principle when it comes to developing a cloud strategy. Some businesses will build windmills that harness the power of the cloud and turn that into new opportunities, while others focus on understanding where and why each strategy makes sense. This presentation discusses key points that businesses small and large must address as they develop their cloud strategy.
Join JT Ash, First VP and Director of Information Security at American Savings Bank, as he moderates a discussion about vendor IT auditing. JT and his panelist will discuss what specific items are important to you when starting a new relationship with a mainland vendor and what is different when you monitor a vendor from 3,000 miles away. These experts will also talk about what to do when there is trouble, for instance, in the case of a data breach or breach of contract, when you are far away.
Panel Moderated by: James “JT” Ash • First VP & Director Information Security at American Savings Bank
Kelly McCanlies • Director, Privacy Programs at Hawaiian Electric Company, Inc.
Brad Boynton • Corporate Information Security Manager at Hawaii Health Systems Corporation
Andrew Le • Manager, Risk and Resilience, Deloitte and Touche LLP
IT workforce development is a critical juncture for all of us. Our community is working together to align market demands with education and training pathways. In recent months, we have been able to bring together public and private employers, including our friends at multiple 3-letter agencies. We have also been able to bend the ears of educators throughout the state to help shape future STEM pathways to look to enhance opportunities for our students and future leaders. This session will provide a current update to all of these efforts, and suggest a path forward to help grow and strengthen Hawaii’s future IT workforce.
State of Hawaii’s CIO, Todd Nacapuy feels so strongly about the importance of innovation that he changed his title from “Chief Information Officer” to “Chief Innovation Officer”. Todd will discuss the current state of IT and goals toward improvements for Hawaii. In addition to developing an IT workforce development, shifting the state’s existing platform, and creating services-oriented infrastructure, Todd’s long-term goal is to bring greater efficiency and transparency within the government. Come join Todd as he leads Hawaii on the innovation front to explore new frontiers.
Appointed by Governor David Y. Ige in April 2015, Todd Nacapuy formally stepped into the role of the State of Hawaii’s Chief Information Officer (CIO) on May 4, 2015. Shortly after taking the technological helm for the state, Mr. Nacapuy announced the initiation of efforts to consolidate the Information and Communication Services Division (of the Department of Accounting and General Services) and the Office of Information Management and Technology to form a unified and cohesive Office of Enterprise Technology Services (ETS).
Priorities for his technology team include IT workforce development, IT governance, enterprise shared services, projects and programs, open government, and cyber security, ensuring that the right systems and processes are in place to facilitate an effective, efficient, and transparent government. Nacapuy brings to the task a breadth and depth of experience in application development, vendor selection and management, and infrastructure acquisition, as well as project management, reengineering, enterprise-wide implementation IT strategy and systems planning, and corporate strategy.
Nimble Storage will discuss at a high level what the benefits of an all flash solution are and what the detriments are in contrast with a hybrid solution. We will cover why an all flash array might not be the right fit for all environments and why a combination of all flash and hybrid might be the best solution.
Come learn how to solve your Enterprise Campus challenges with Juniper’s Cloud Enabled Campus solution. We will be discussing exciting new ways to leverage “Cloud Scale” to build out highly resilient Enterprise class networks. Free up IT staff for more important things than baby sitting networks!
The world of Identity Management is dangerously fragmented and needlessly complex. Don’t settle for half a solution when you need full protection for both end users and privileged users.
Centrify secures enterprise identities against cyber threats that target today’s hybrid IT environment of cloud, mobile and on-premises. The Centrify Identity Platform protects against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s internal and external users as well as its privileged accounts.
In this session, we will discuss a platform approach to securing enterprise identities and:
What exactly is Ransomware? We’ll take a look at Ransomware, its historical presence and evolution into today’s most common threats, like CryptoLocker and CryptoWall. Most importantly, we will share best practices for Ransomware defense – how to prepare, prevent and respond.
Are your clouds secure? How can you be sure? Security for cloud environments can be daunting. Do you find yourself asking, “How do I secure a network without a border?” With a few key points, you will understand how to effectively secure your public and private cloud networks with advanced dynamic security to stay one step ahead in a cloudy world.
|Allen Ito||Information Security Officer||Hawaii Pacific Health|
|Allen Zhang||Manager, Information Protection & Privacy||Hawaii Medical Services Association|
|Andrew Lanning||Co-Founder||Integrated Security Technologies|
|Brad Boynton||Chief Information Security Officer||Hawaii Health Systems Corporation|
|Bryan Tepper||Information Assurance Manager||Hawaiian Electric Company, Inc.|
|Craig Riley||Information System Security Manager||GISA Pacific|
|Curt Dodds||Manager, Information Technology||U of H, Institute for Astronomy|
|Dana Mendoza||Information Technology Manager||HHSC|
|Diane Stephens||Corporate Account Manager/President of HICTA||Hawaiian Telecom|
|Dwight Victor||Systems & Network Team Lead||General Dynamics Missile Systems|
|Eran Agmon||President||ComTest Technologies Inc.|
|Garret Yoshimi||Vice President, Information Technology & Chief Information Officer||University of Hawaii|
|Greg Wolf||Director, Information Services||Shriners Hospitals for Children|
|Hamilton Hung||Director, ERP Administration||Hawaiian Electric Company, Inc.|
|James Ash||Director, Information Security||American Savings Bank|
|Kathy O’Brien||Business Solution Architect||Hawaiian Electric Company, Inc.|
|Kelly McCanlies||Director||Hawaiian Electric Company, Inc.|
|Mark Savage||Vice President, Applications and Development||First Hawaiian Bank|
|Nicole Picciotto||Vice President||Kali Systems|
|Robin Pressly||President||ISACA Hawaii|
|Robyn Wolfe||Account Executive||Gartner|
|Russell Seeney||President||InfraGard Hawaii|
|Todd Nacapuy||Chief Information Officer||State of Hawaii|
|Vladimir Abadzhiev||Director, Enterprise Systems & Infrastructure||Hawaii Pacific University|
|Zac Pachero||Fraud Analyst||American Savings Bank|
The Sheraton Waikiki is located 9 miles from Honolulu International Airport on world renown Waikiki Beach.
From Honolulu International Airport