It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch this much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to threats that are already inside the network before they turn into a full-blown crisis.
Self-learning systems, which represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life’. They can spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat. Discover why autonomous response and machine learning are the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
Today’s dynamic business environment requires modern businesses to pay more attention to the cyber security challenges they face. To address these risks, businesses need to think differntly about security and how your business can benifit from unified defense accross multivendor environments.
In this presentation, we will discuss the ever-changing security threat landscape and provide example of what we will see in the future. We will show ways to combat it and take necessary action against these threats, and finally, describe how to prevent these attacks from taking place within your company’s environment.
Crypto currencies are becoming popular with banks, consumers and various industries. There is a need for consumers to understand the basic underlying technology behind these crypto currencies and the underlying security risks and concerns. This presentation provides a broad overview of the topic and the benefits/risks involved.
Join several of our educators here in Hawaii and learn about various learning options and hear some ideas on how to retain students after they graduate.
Geoff Milford • President (ISC)2 Hawaii Chapter
Jodi Ito • University of Hawaii
Dave Stevens • Kapiolani Community College
Aaron Tanaka • Hawaii Community College
Bob Monroe • Hacker Highschool
Jake Ross • Cyber Hui
This presentation will focus on the FBI’s definition of the ransomware threat, what the FBI has been seeing in complaints and information related to ransomware incidents and the current ransomware landscape. We will also discuss the FBI’s strategy for combating ransomware, how ransomware is evolving and the emerging threats related to ransomware.
Will Bales entered on duty as a Special Agent with the FBI in 2008. Will was assigned to the Los Angeles FBI field office where he worked on criminal cyber investigations and intellectual property rights crimes. In 2014‐2015, he served as the Cyber ALAT in Seoul, Korea addressing matters such as the Sony Pictures intrusion and the attack on the US Ambassador to South Korea. He was then promoted to Supervisory Special Agent and assigned to the Major Cyber Crimes Unit, Cyber Division, where he was responsible for leading the FBI’s effort against ransomware. In 2017, Will was promoted to supervisor over FBI’s Honolulu Cyber squad. Prior to the FBI, Will worked in private industry for eight years providing technical support and network administration. He holds a Bachelor’s Degree in Computer Information Systems.
Flash memory is revolutionizing data storage, bringing an unprecedented level of performance that legacy storage systems simply can’t match. Learn how to simplify your data management process through deep integration and get the power of array-based snapshots, replication and cloning without being storage experts.
The data storage market is going through tectonic shifts these days. Flash is being used to accelerate applications and IT leaders are moving from project based purchasing to building private clouds to concurrently hosting a multitude of applications. Join this session and learn how to take advantage of these changes; hear how IT leaders at a national credit union are consolidating workloads to increase IT agility while conserving budgets.
This session will provide attendees with an overview of the evolution and adoption of Flash and what to expect from this rapidly changing technology in 2017 and beyond. This session will discuss how Flash can impact your application performance and what to
consider when making an investment for a specific critical application or a storage platform. Flash has multiple benefits for an organization including performance gains and costefficiencies. Come learn why not all storage is the same!
The increase in mobile device and Internet of Things (IoT) and the migration of applications from on-premise servers to the cloud, has meant new challenges to security and access policies. Join Ashur Kanoon, Senior Director of Technical Marketing at Pulse Secure, to learn more about what organizations and administrators must consider ensuring secure, effortless access for people, devices, things, and services.
|Alan Ito||Information Security Officer||Hawaii Pacific Health|
|Allen Zhang||Manager, Information Protection & Privacy||Hawai‘i Medical Service Association|
|Andrew Lanning||Co-Founder||Integrated Security Technologies|
|Bryan Tepper||Information Assurance Manager||Hawaiian Electric|
|Cody Down||Chief Information Officer and Associate Vice President||Hawaii Pacific University|
|Curt Dodds||Manager, Information Technology||U of H, Institute for Astronomy|
|Dana Mendoza||Manager, Information Technology||Maui Memorial Medical Center|
|Dr. Debasis Bhattacharya||Faculty||University of Hawaii Maui College|
|Dwight Victor||Systems & Network Team Lead||General Dynamics Missile Systems|
|Geno Baruffi||Vice President, Information Technology||Bank of Hawaii|
|Greg Wolf||Director of Information Services||Shriners Hospital for Children|
|Hamilton Hung||Director, ERP Administration||Hawaiian Electric|
|Jim Sleutel||Vice President, Information Protection||Finance Factors|
|Karl Kageno||Information Technology Manager||Aqua Engineers Inc.|
|Kelly McCanlies||Director, Privacy Programs||Hawaiian Electric|
|Keng-Wei Chang||Director of Information Technology||HIE Holdings, Inc. (Hawwaiian Isles Kona Coffee co.)|
|Lawrence Agcaoili||Manager, Information Technology Systems||HI Dept of Land & Natural Resources|
|Michael Marcum||Chief, Information Technology||USACE Enterprise IT Services (ACE-IT)|
|Mike Meyer||Director, Information Technology||University of Hawaii Systems|
|Ollie Ocampo||IT Co-Director||Hina Mauka|
|Robin Pressly||Information Technology Audit and Controls Lead||Hawai‘i Medical Service Association|
|Ryan Doi||Corporate Director of Information Systems||Prince Resorts Hawaii|
|Tiger Li||Manager, Information Technology||Office of Hawaiian Affairs|
|Vito Nozza||Director – Solutions Engineering||Hawaiian Telcom|
|Vladimir Abadzhiev||Director, Enterprise Systems & Infrastructure||Hawaii Pacific University|
2255 Kalakaua Ave
Honolulu, HI 96815
The Sheraton Waikiki is located 9 miles from Honolulu International Airport on world renown Waikiki Beach.
From Honolulu International Airport
Parking is available adjacent to the hotel: $10/Self-parking, $15/Valet parking