It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
Many organizations are exerting top-down pressure to examine cloud and as-a-service models in general. To the IT managers and administrators in the data center, losing control of your data and/or applications can be a scary thing. There is also a complex web of fiscal and technical items that must be considered.
In this presentation, we will help you build a base understanding of the three core as-a-service models. We will then go on to discuss what we see working with our customers in the real world; these are opportunities that can offload some of the drudgery in your data center, while at the same time demonstrating to your organization that you are embracing the cloud. This presentation provides an in depth discussion surround the pros and cons of moving applications, and or infrastructure over to cloud and managed services.
When it comes to cybersecurity, the threat landscape is changing every day. From ransomware attacks to the security of the Internet of Things, there’s a lot to take in. Let our experts break it down for you. Join Kaspersky to learn about trends from the past year and predictions for the future of cybersecurity. This talk will give you a sharper focus on how to protect your business and how to plan for your future IT security needs.
Are cyber criminals hiding in your small business or government agency? Nearly half of small business have been victims of cyber-attack. We will reveal why small and midsize businesses are hackers’ favorite new targets, describe where these new threats are coming from, and explain how to keep them out of your network. Learn how to protect your business, even without big-time IT resources.
Let’s face it, the evolution of technology has moved so quickly over the last few years that is nearly impossible to keep up. While you may be utilizing cloud solutions right now, you have questions. Join Blue Coat Systems and the INTERFACE Advisory Council for an interactive panel discussion that will cover data visibility, security, vendor management, and much more. You must always have control of your data and you will hear plenty of advice about the proper management of your cloud providers. Also, we will cover what you need to know about your providers and how this pertains to your operations.
Panel Moderated by Leeron Laizerovich • Senior Systems Engineer, Cloud Security, Blue Coat Systems
Jim Burkholder • Information Technology Manager, Mediware
Shogo Cottrell • Principal Security Architect, Advisory Council Member
Virgil Hayes • Corporate Information Security Manager, Payless Shoes
This panel discussion will present effective ways to speak about security to your C-Suite and Board Members. Join us to discuss tools, tactics, and techniques to translate your security concerns and expenditures into the universal language of risk. By being able to effectively speak to security in terms of risk, your company leaders will be better able to understand your security strategy and its impact on the business.
Britney Hommertzhiem • Information Security Manager, AMC Theatres
John Godfrey • Chief Information Security Officer, University of Kansas Medical Center
Paul Pauesick • Director of Information Technology, Board of Public Utilities of Kansas
How many times have you heard: “Defenders have to get security right every time, an attacker only has to get it right once.”? In this presentation, we will explore the phases of a cyber attack, identifying the stages more expensive for the attacker than the defender, and describe ways to exploit them. By changing our perceptions and understanding of the inevitable attack, defenders can develop capabilities to gain an upper hand against the attackers. After this presentation defenders will be prepared to tell those attackers: “Bring it”.
Bill Swearingen has 15 years of experience in information security and the protection of critical infrastructure from advanced cyber threats. Bill’s technical expertise and understanding of the inherit risks corporations face today has given him a unique ability to build strong cyber defenses to detect, degrade, or disrupt cyber threats. Bill has a proven track record of creating, developing, and managing strong technical teams needed to provide Incident Response, Digital Forensics, Vulnerability Assessment, Penetration Testing, and Policy enforcement for large (Fortune 150) corporations such as CenturyLink and Sprint.
Bill is the Director of Cyber Defense for CenturyLink, the third largest telecommunications company in the United States and a recognized leader in the network services market. CenturyLink is a global leader in internet service provision, cloud infrastructure, and hosted IT solutions for enterprise customers and governments. CenturyLink provides data, voice and managed services in local, national and select international markets through its high-quality advanced fiber optic network and multiple data centers for businesses and consumers.
Over the past few years, Bill has focused on reduction of Mean Time to Detect through the continuous development and improvement of real-time alerting on cyber events utilizing Open Source, privately shared, and internally developed threat intelligence; external partnerships, and Incident Readiness Exercises (IREs) that simulate real attacks on the CenturyLink infrastructure.
This session will show attendees how flash technology in the datacenter is transforming applications, performance, and the financial impacts of this revolution. This presentation will demonstrate the impact that legacy storage platforms have on your applications, and how the next generation of all flash arrays address the shortcomings of disk technologies. We will also attempt to dispel some of the myths that make customers hesitant to seek out all-flash alternatives to traditional storage arrays.
Innovation Matters. Without innovation IT is stuck in the 80/20 rule. IT can’t keep up with data demands, data protection and data mobility. Innovation is important to IT as we try to help reduce costs and manage data.
Unite Private Networks will provide an overview of the benefits and features of Dark Fiber. In this presentation you will also learn about leveraging Dark Fiber to optimize a Wide Area Network.
This presentation serves as a simple 7 step approach to smarter backup. Most organizations are not adequately prepared for the numerous causes of potential data loss and costly consequential downtime. The purpose of this presentation is to challenge the audience and question their ability to fully restore their critical systems with the current strategies and technology they have in place. The statistical data, coupled with the 7 steps are to encourage the audience to backup their critical data in a fashion that that truly decreases or eliminates the chance of data loss and downtime to the best of their abilities.
The presentation will include the following:
No one thinks they need disaster recovery until they do. The fact is that most “disasters” and datacenter outages are not caused my hurricanes or severe weather. Random power outages, human errors and many other non-weather factors are the typical causes of service interruptions. Join us to see the results of a survey of IT professionals just like you and learn:
We will cover two use cases which outline gaps in their DR strategy and how you are able to overcome these gaps. Join us to learn more!
It’s 2016, but organizations still struggle to deliver consistent and predictable performance for their cloud and virtualized applications. Even with advances in flash technology, storage remains designed for physical, not virtual, workloads, and it shows with unpredictable performance, difficult troubleshooting and fragile scalability. Storage needs to be aligned to virtualization, but what is VM-Aware Storage besides a buzzword? We will investigate the five requirements of VM-Aware Storage, and which technologies enable those requirements.
Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files unless a ransom is paid. More modern ransomware families, collectively categorized as crypto-ransomware, encrypt certain file types on infected systems and forces users to pay the ransom through certain online payment methods to get a decrypt key.
Join us to learn the history of ransomware, the many variations and ensure your company never has to pay.
Investments in the digital workplace started in the last decade, with start-ups creating fancy, attractive workplace environments to attract the best and brightest talent in a tech-savvy, “always-on” generation. Fast forward to present day – we’ve hit an infliction point as that phenomenon is hits mainstream enterprise.
Traditional enterprises are now looking for the same benefits to meet the needs of their workforce and run a more efficient infrastructure plant and real estate floor plate. The ability of these traditional enterprises to leverage technology to improve business efficiencies, recruit and retain employees, reduce expenses and increase revenues while keeping security front-of-mind will ultimately impact their future as a viable entity.
A true Hybrid IT environment gives you the flexibility to consider the best way to manage key infrastructure elements such as databases, operating systems, security, etc. Managed IT isn’t just about filling in the gaps, It’s also about utilizing the resources you have even more efficiently while releasing their full potential.
With ransomware running rampant, this presentation will help with understanding how it operates, how to identify the threats, and how to respond to minimize the damage. Ultimately, prevention is better than a cure, so we will also discuss some technical and administrative means to help prevent becoming a victim.
How To (Effectively) Prevent Ransomware Infections – Next Generation Endpoint Security. An in-depth examination of current techniques utilized by endpoint security companies and the pros and cons of each.
This session is all about system availability and coming to grips with your backups. Engineers from both Veeam Software and Exagrid will come together in this lively session to ensure you leave with industry best practices for “Future Proofing” your backups and achieving “Always On” availability for your enterprise.
|Adrian Guerrero||Director of Operations||Kansas State Board of Nursing|
|Albert Stadler||Chief Information Officer||Missouri Southern State University|
|Amy Botts||Manager Information Technology Internal Audit||Hallmark Cards, Inc.|
|Andrew Spidle||Director, Information Technology||Axcet HR Solutions|
|Anita Mosley||Information Technology Director||Wipro, LTD|
|Ben Clayton||National Director / Senior Administrator||VMUG/ DST Systems|
|Britney Hommertzheim||Manager, Information Security||AMC Theatres|
|Charna Bean||Data Operations Manager||JMA Information Technology|
|Chris Harper||Director, Business Architecture||Kansas University Medical Center|
|Chris Mann||Executive Vice President/Chief Information Officer||DH Pace|
|Dave Ireland||Associate Chief Information Officer||USDA – OCIO – National IT Center|
|David Daniel||Information Technology Security Officer (ITSO)||Blue Ridge Bank & Trust|
|David Green||Director, Information Technology||Jewish Community Center, Greater Kansas|
|David Witte||Director, Information Technology||Jackson County Missouri|
|Dawn Hilderbrand||Manager, Information Technology||City of Kansas City|
|Ed Bell||Director Global Engineering & Security||Cartesian|
|Eirick Luraas||Technology Architect||Cerner|
|Eric Baer||Chief, Information Technology Operations||US Deptartment of Agriculture – RMA|
|Florian Yanez||Director, Information Security||Helzberg Diamonds|
|Gregory Jecker||Vice President, Information Security Assurance||Nations Holding Company|
|Harry Maroudas||Information Systems Security Office||USDA – Risk Management Agency|
|Ian Murphy||System Administrator II||Populous|
|Ivan Winfield||Chief Information Officer||Seabord Corporation|
|James Pointer||Manger, Information Security||Store Financial|
|Jason Baity||Manager, Information Technology||KanEquip|
|Jason Spainhour||Director, Information Systems||Skill Path Seminars|
|Jeff Blackmon||Board Member||InfraGard|
|Jeff Caldwell||Chief, Information Systems Security||USDA|
|Jenya Sablin||Manger, Information Technology||Black Knight Financial Services|
|Jim Burkholder||Information Technology Manager||Mediware Information Systems, Inc.|
|Jim O’Brian||Chief Information Security Officer||Choice Solutions LLC|
|Joe Lear||Director, Information Systems||Kansas State University|
|Joe Spiser||Information Security Officer||Kaw Valley Bank|
|John Godfrey||Chief Information Security Officer||University of Kansas Medical Center|
|Julie Fugett||Information Security Officer||University of Kansas|
|Kara Speciale||Chief Information Security Officer||NBH Bank|
|Ken Clark||Technology Director||Bonner Springs School District|
|Kevin Tillock||Software Architect, Information Services||Jack Cooper Holdings Corp.|
|Kip Ballinger||Security Auditor||Kansas Highway Patrol|
|Lana Kapustin||Manager, Technology||YRC Freight|
|Lora Baugher||Director, Information Technology||Village Shalom, Inc.|
|Mary Miller||Chief Information Officer||City of Kansas City|
|Melissa Tebbenkamp||Director of Technology||Raytown Quality Schools|
|Michael Neale||Chief Information Officer||Card Compliant|
|Michael Nixon||Information Management Technician||Kansas Legislative Division of Post Audit|
|Michael Whited||Information Technology Manager||Western Forms, Inc|
|Naeem Babri||Risk Manager/President||Sprint/ISSA|
|Nancy Baker||Information Technology Manager||University of Kansas|
|Nathan Ensz||Director||KS Office of IT Services|
|Nathan Powell||Information Technology Administrator||Lewis Rice & Fingersh|
|Neil Romary||Director, Information Security||Staples Promotional Products|
|Paul Pauesick||Director, Information Technology||Board of Public Utilities of Kansas|
|Richard Reihs||Information Technology Security Manager||Nebraska Furniture Mart|
|Rob Arnold||Director of Information Security||Polsinelli PC|
|Rochelle Boyd||Manager, Information Security||Johnson County Community College|
|Scott Harris||Information Security Officer||Lockton Companies|
|Shannon Billinger||Vice President, Information Technology||Landmark National Bank|
|Shaun Bender||Director, Information Technology||Sullivan Law Firm|
|Shelby Huddleston||Technology Coordinator||Fredonia Unified SD 484|
|Shogo Cottrell||Chief Security Strategist||Hewlett Packard Enterprise|
|Stan Rumford||Manager, Information Technology||Exchange National Bank & Trust|
|Ted Tartenaar||Information Technology Services Manager||Johnson County Park & Recreation District|
|Tim Miller||Senior Vice President & Manager, Information Technology||First National Bank of Hutchinnson|
|Vernon Turner||ITS Operations Center Manager||Kansas State University|
|Virgil Hayes||Corporate Information Security Manager||Payless ShoeSource|
From the Kansas City International Airport
Take 435 West
Take 435 South (which turns into 435 East)
Right on Metcalf Exit (#169)
Left on College Boulevard
Left on Woodson
Directions From I-35 Northbound
Take I-35 North
I-435 East Exit
Nall Avenue South Exit
West on College Boulevard
Right on Woodson
From I-35 Southbound
Take I-35 South (through Kansas City)
69 South Exit
College Boulevard East Exit
Left on Woodson
From I-70 Eastbound
Take I-70 East
435 South Exit (which turns into 435 East)
Right on Metcalf Exit (#169)
Left on College Boulevard
Left on Woodson
From I-70 Westbound
Take I-70 West
435 South Exit (which turns into 435 West)
Left on Metcalf Exit
Left on College Boulevard
Left on Woodson
PARKING: Complimentary Self Park